Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4.7.exe

Overview

General Information

Sample name:4.7.exe
Analysis ID:1502478
MD5:d71d9ce33e1d1f7cca026ee9d8a84455
SHA1:210e8f26480bd6ec8cefb3a0e06b742ea553f468
SHA256:b0e1e030ad98fe4164d26e7f6a0e6e9a4ecb229b504f816ca7772b119996ad3e
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found pyInstaller with non standard icon
Hides threads from debuggers
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 4.7.exe (PID: 6172 cmdline: "C:\Users\user\Desktop\4.7.exe" MD5: D71D9CE33E1D1F7CCA026EE9D8A84455)
    • 4.7.exe (PID: 6472 cmdline: "C:\Users\user\Desktop\4.7.exe" MD5: D71D9CE33E1D1F7CCA026EE9D8A84455)
      • cmd.exe (PID: 4176 cmdline: C:\Windows\system32\cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 3604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 4.7.exeReversingLabs: Detection: 13%
Source: 4.7.exeVirustotal: Detection: 19%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E4470 PyCMethod_New,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,clock,clock,clock,clock,CryptReleaseContext,1_2_655E4470
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACB83F0 EVP_PKEY_CTX_new,EVP_PKEY_derive_init,EVP_PKEY_derive_set_peer,EVP_PKEY_derive,CRYPTO_malloc,EVP_PKEY_derive,CRYPTO_clear_free,EVP_PKEY_CTX_free,1_2_00007FFDFACB83F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA129E CRYPTO_THREAD_run_once,1_2_00007FFDFACA129E
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1163 EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACA1163
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1A0A CRYPTO_zalloc,memcpy,memcpy,memcpy,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACA1A0A
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACDFAE0 CRYPTO_realloc,1_2_00007FFDFACDFAE0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACD7A70 CRYPTO_free,1_2_00007FFDFACD7A70
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA176C CRYPTO_free,CRYPTO_malloc,memcmp,CRYPTO_memdup,1_2_00007FFDFACA176C
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACE7C50 CRYPTO_free,CRYPTO_strndup,1_2_00007FFDFACE7C50
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACD7BF0 CRYPTO_free,1_2_00007FFDFACD7BF0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACAE2E0 CRYPTO_malloc,1_2_00007FFDFACAE2E0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA20FE BN_bin2bn,BN_is_zero,CRYPTO_free,CRYPTO_strdup,CRYPTO_clear_free,1_2_00007FFDFACA20FE
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA13B6 CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACA13B6
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACF42B0 CRYPTO_malloc,memcpy,1_2_00007FFDFACF42B0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA2293 CRYPTO_free,CRYPTO_memdup,1_2_00007FFDFACA2293
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACBC280 CRYPTO_zalloc,ERR_put_error,CRYPTO_THREAD_lock_new,ERR_put_error,CRYPTO_free,1_2_00007FFDFACBC280
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1A00 CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,1_2_00007FFDFACA1A00
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA8410 CRYPTO_zalloc,ERR_put_error,1_2_00007FFDFACA8410
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1E7E CRYPTO_free,CRYPTO_malloc,1_2_00007FFDFACA1E7E
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1CBC CRYPTO_clear_free,1_2_00007FFDFACA1CBC
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACBE3C0 CRYPTO_THREAD_run_once,1_2_00007FFDFACBE3C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACB8130 CRYPTO_free,CRYPTO_memdup,1_2_00007FFDFACB8130
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA195B EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,EVP_MD_CTX_md,EVP_MD_size,CRYPTO_memcmp,EVP_MD_CTX_md,EVP_MD_CTX_md,EVP_MD_size,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,CRYPTO_memcmp,strncmp,strncmp,strncmp,strncmp,strncmp,1_2_00007FFDFACA195B
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA2590 CRYPTO_free,CRYPTO_strdup,1_2_00007FFDFACA2590
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACD80F0 CRYPTO_free,1_2_00007FFDFACD80F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA40BA BIO_get_data,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,CRYPTO_zalloc,ERR_put_error,BIO_set_init,BIO_clear_flags,BIO_get_data,BIO_set_shutdown,BIO_push,BIO_set_next,BIO_up_ref,BIO_set_init,1_2_00007FFDFACA40BA
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACAE0B0 CRYPTO_malloc,CRYPTO_free,CRYPTO_malloc,1_2_00007FFDFACAE0B0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACBE090 CRYPTO_mem_ctrl,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,OPENSSL_sk_push,OPENSSL_sk_sort,CRYPTO_mem_ctrl,1_2_00007FFDFACBE090
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1131 CRYPTO_free,1_2_00007FFDFACA1131
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACB61F8 CRYPTO_free,CRYPTO_strdup,1_2_00007FFDFACB61F8
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACBE180 COMP_zlib,CRYPTO_mem_ctrl,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,COMP_get_name,OPENSSL_sk_push,OPENSSL_sk_sort,CRYPTO_mem_ctrl,1_2_00007FFDFACBE180
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACFE730 OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,memcmp,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,CRYPTO_memcmp,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACFE730
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA218A CONF_parse_list,ERR_put_error,CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACA218A
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA13FC EVP_MD_CTX_new,EVP_MD_CTX_free,CRYPTO_memcmp,memcpy,memcpy,1_2_00007FFDFACA13FC
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1AC8 CRYPTO_malloc,ERR_put_error,CRYPTO_free,1_2_00007FFDFACA1AC8
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA46C0 BIO_get_data,BIO_get_shutdown,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,1_2_00007FFDFACA46C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACE883B CRYPTO_clear_free,1_2_00007FFDFACE883B
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAD00830 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,CRYPTO_memdup,OPENSSL_cleanse,1_2_00007FFDFAD00830
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACE0820 CRYPTO_free,CRYPTO_free,1_2_00007FFDFACE0820
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACDA850 CRYPTO_free,CRYPTO_memdup,1_2_00007FFDFACDA850
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1C08 CRYPTO_malloc,memset,memcpy,memcpy,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,OPENSSL_cleanse,1_2_00007FFDFACA1C08
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA101E CRYPTO_free,CRYPTO_free,1_2_00007FFDFACA101E
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA222A CRYPTO_free,1_2_00007FFDFACA222A
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA2225 CRYPTO_free,CRYPTO_memdup,1_2_00007FFDFACA2225
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACE0550 CRYPTO_memdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,CRYPTO_free,1_2_00007FFDFACE0550
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACC24E0 CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,1_2_00007FFDFACC24E0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1DD4 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,OPENSSL_cleanse,_time64,memcpy,OPENSSL_cleanse,OPENSSL_cleanse,EVP_MD_size,1_2_00007FFDFACA1DD4
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA22C5 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_put_error,1_2_00007FFDFACA22C5
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA2414 CRYPTO_free,BIO_clear_flags,BIO_set_flags,BIO_snprintf,ERR_add_error_data,memcpy,1_2_00007FFDFACA2414
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA84C0 CRYPTO_zalloc,ERR_put_error,BUF_MEM_grow,1_2_00007FFDFACA84C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA4497 CRYPTO_zalloc,ERR_put_error,BIO_set_init,BIO_set_data,BIO_clear_flags,1_2_00007FFDFACA4497
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1F14 CRYPTO_free,1_2_00007FFDFACA1F14
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1762 ERR_put_error,CRYPTO_realloc,CRYPTO_realloc,ERR_put_error,1_2_00007FFDFACA1762
Source: 4.7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665190455.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665307425.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb source: 4.7.exe, 00000001.00000002.1780629825.00007FFE0CFD3000.00000002.00000001.01000000.0000001D.sdmp, win32api.pyd.0.dr
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb!! source: 4.7.exe, 00000001.00000002.1780629825.00007FFE0CFD3000.00000002.00000001.01000000.0000001D.sdmp, win32api.pyd.0.dr
Source: Binary string: ucrtbase.pdb source: 4.7.exe, 00000001.00000002.1780283365.00007FFDFBA85000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1664994016.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1u 30 May 2023built on: Wed May 31 23:27:41 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFAF9F000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: crypto\asn1\a_dup.cASN1_item_dupType=%scompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specific.dllCPUINFO: crypto\initthread.cOPENSSL_ia32cap0 source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665362596.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: 4.7.exe, 00000000.00000003.1663150388.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783449377.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781762423.00007FFE11518000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: 4.7.exe, 00000000.00000003.1663257258.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782278928.00007FFE120C5000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: 4.7.exe, 00000001.00000002.1782561105.00007FFE126F0000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781284671.00007FFE10307000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC3.1.1built on: Tue May 30 20:56:58 2023 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptoOPENSSL_atexitcrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_asyncio.pdb source: 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1664934310.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\pyexpat.pdb source: pyexpat.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782110641.00007FFE11EDC000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782418234.00007FFE126CD000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32security.pdb source: 4.7.exe, 00000001.00000002.1780519200.00007FFE0CFA4000.00000002.00000001.01000000.0000001F.sdmp
Source: Binary string: ucrtbase.pdbUGP source: 4.7.exe, 00000001.00000002.1780283365.00007FFDFBA85000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781936722.00007FFE11EA8000.00000002.00000001.01000000.0000000C.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: 4.7.exe, 00000000.00000003.1663257258.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782278928.00007FFE120C5000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665493791.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.0.dr
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb source: 4.7.exe, 00000001.00000002.1780744019.00007FFE0E140000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: 4.7.exe, 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-jyfjmawu\src\rust\target\release\deps\cryptography_rust.pdb source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: 4.7.exe, 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: C:\Users\oxyn\Desktop\dev\guardshield-main\dll\x64\Release\AntiDBG.pdb source: 4.7.exe, 00000001.00000002.1781399202.00007FFE110F4000.00000002.00000001.01000000.00000023.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb** source: 4.7.exe, 00000001.00000002.1780744019.00007FFE0E140000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFAF9F000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_overlapped.pdb source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: 4.7.exe, 00000000.00000003.1663150388.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783449377.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665240082.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFB021000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: 4.7.exe, 00000001.00000002.1778835941.00007FFDFB77B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: 4.7.exe, 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783171349.00007FFE13303000.00000002.00000001.01000000.0000000D.sdmp, select.pyd.0.dr
Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665559746.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782110641.00007FFE11EDC000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_uuid.pdb source: 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781582368.00007FFE11502000.00000002.00000001.01000000.0000001E.sdmp, _uuid.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782813005.00007FFE130C3000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1776065779.000001E07FE40000.00000002.00000001.01000000.00000007.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32file.pdb source: 4.7.exe, 00000001.00000002.1780862407.00007FFE0E175000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665078119.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665425885.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: 4.7.exe, 00000001.00000002.1781109024.00007FFE1024D000.00000002.00000001.01000000.00000011.sdmp, _ssl.pyd.0.dr
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E8D00 FindFirstFileExW,FindClose,0_2_00007FF6385E8D00
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F8670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386026C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6386026C4
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F8670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI61722\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\Jump to behavior
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewIP Address: 162.159.128.233 162.159.128.233
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655D3135 gethostbyname,socket,setsockopt,setsockopt,setsockopt,htons,sendto,sendto,recvfrom,recvfrom,ntohl,ntohl,ntohl,closesocket,WSACleanup,WSAGetLastError,closesocket,WSACleanup,SetLastError,WSAGetLastError,WSACleanup,SetLastError,1_2_655D3135
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: global trafficDNS traffic detected: DNS query: discord.com
Source: 4.7.exe, 00000001.00000002.1773307876.000001E002350000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.../back.jpeg
Source: 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.)
Source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
Source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co)
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
Source: 4.7.exe, 00000001.00000002.1775851468.000001E07FB7A000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crlZ
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl5j
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crlG
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crlj
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crlv
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crlAria
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crlb
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl252
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crlz
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: 4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crlAr
Source: 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicer
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: pyexpat.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.o
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: 4.7.exe, 00000001.00000003.1753057627.000001E001AD5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772934758.000001E002050000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019CD000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752691538.000001E001B69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html
Source: 4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E0018AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
Source: 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E00188E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es4
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
Source: 4.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crlC_TIME=C
Source: 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
Source: 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htms
Source: 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htmz
Source: 4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
Source: 4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/
Source: 4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/Q
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/r.l
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750078791.000001E0018A0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1669683958.000001E0F33FC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1672072738.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1670388695.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774471617.000001E002AC6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
Source: 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E00188E000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750390174.000001E001439000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750078791.000001E0018A0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
Source: 4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: 4.7.exe, 00000001.00000003.1753057627.000001E001AD5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019CD000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752691538.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E0018AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwwsearch.sf.net/):
Source: 4.7.exe, 00000001.00000003.1740006444.000001E0015BE000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1740431097.000001E00152A000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bugs.python.org/issue42195.
Source: 4.7.exe, 00000001.00000002.1780407783.00007FFE0046C000.00000002.00000001.01000000.00000021.sdmpString found in binary or memory: https://cffi.readthedocs.io/en/latest/using.html#callbacks
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io
Source: METADATA.0.drString found in binary or memory: https://cryptography.io/
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/changelog/
Source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmpString found in binary or memory: https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/installation/
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/security/
Source: 4.7.exe, 00000000.00000003.1674556319.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Connection
Source: 4.7.exe, 00000001.00000002.1774623780.000001E002CC0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1272555550906781748/SDSkrny-LnA_9UuXZkezuid-OBsW-UH4MtGNGhNapUk-Ee3
Source: 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750390174.000001E001497000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1751482947.000001E001497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
Source: 4.7.exe, 00000001.00000002.1773405056.000001E002480000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1773307876.000001E002350000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/socket.html#socket.socket.connect_ex
Source: 4.7.exe, 00000001.00000002.1772308007.000001E001710000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Ousret/charset_normalizer
Source: 4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: 4.7.exe, 00000000.00000003.1673306614.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1780791110.00007FFE0E151000.00000002.00000001.01000000.0000001C.sdmp, 4.7.exe, 00000001.00000002.1780673872.00007FFE0CFE1000.00000002.00000001.01000000.0000001D.sdmp, 4.7.exe, 00000001.00000002.1780563402.00007FFE0CFB3000.00000002.00000001.01000000.0000001F.sdmp, 4.7.exe, 00000001.00000002.1780913393.00007FFE0E183000.00000002.00000001.01000000.0000001A.sdmp, win32api.pyd.0.drString found in binary or memory: https://github.com/mhammond/pywin32
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/actions?query=workflow%3ACI
Source: METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/issues
Source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmpString found in binary or memory: https://github.com/pyca/cryptography/issues/8996
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
Source: 4.7.exe, 00000001.00000002.1775727024.000001E07F978000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: 4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: 4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: 4.7.exe, 00000001.00000002.1772308007.000001E001710000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
Source: 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
Source: 4.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
Source: 4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
Source: 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
Source: 4.7.exe, 00000001.00000002.1773307876.000001E002350000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/get
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/post
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://img.shields.io/pypi/v/cryptography.svg
Source: 4.7.exe, 00000001.00000002.1773307876.000001E002430000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
Source: 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
Source: 4.7.exe, 00000001.00000002.1774783209.000001E002D90000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774783209.000001E002E7C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: 4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mahler:8092/site-updates.py
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://mail.python.org/mailman/listinfo/cryptography-dev
Source: 4.7.exe, 00000001.00000002.1772206112.000001E001610000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
Source: 4.7.exe, 00000001.00000002.1778835941.00007FFDFB77B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.drString found in binary or memory: https://peps.python.org/pep-0263/
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://pypi.org/project/cryptography/
Source: 4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://readthedocs.org/projects/cryptography/badge/?version=latest
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1773307876.000001E002430000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://requests.readthedocs.io
Source: tk.tcl.0.drString found in binary or memory: https://support.apple.com/en-us/HT201236
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
Source: 4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB7A000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
Source: 4.7.exe, 00000001.00000002.1772934758.000001E002050000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
Source: 4.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
Source: 4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsN
Source: 4.7.exe, 00000000.00000003.1666519520.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.apache.org/licenses/
Source: 4.7.exe, 00000000.00000003.1666519520.000001E0F33FF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1666519520.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1666583923.000001E0F33FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.apache.org/licenses/LICENSE-2.0
Source: 4.7.exe, 00000000.00000003.1724007233.000001E0F33F3000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmp, 4.7.exe, 00000001.00000002.1778128810.00007FFDFB098000.00000002.00000001.01000000.00000013.sdmpString found in binary or memory: https://www.openssl.org/H
Source: 4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org
Source: 4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/
Source: 4.7.exe, 00000001.00000002.1775727024.000001E07F8F0000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732504637.000001E07FBCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
Source: 4.7.exe, 00000001.00000002.1779042409.00007FFDFB818000.00000004.00000001.01000000.00000005.sdmp, python311.dll.0.drString found in binary or memory: https://www.python.org/psf/license/
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/
Source: 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
Source: 4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB0CBB70 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,1_2_00007FFDFB0CBB70
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655D3135 gethostbyname,socket,setsockopt,setsockopt,setsockopt,htons,sendto,sendto,recvfrom,recvfrom,ntohl,ntohl,ntohl,closesocket,WSACleanup,WSAGetLastError,closesocket,WSACleanup,SetLastError,WSAGetLastError,WSACleanup,SetLastError,1_2_655D3135
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638607A9C0_2_00007FF638607A9C
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E7B600_2_00007FF6385E7B60
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638606B500_2_00007FF638606B50
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E9D9B0_2_00007FF6385E9D9B
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F86700_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386017200_2_00007FF638601720
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E10000_2_00007FF6385E1000
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386017200_2_00007FF638601720
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F2A940_2_00007FF6385F2A94
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638604A600_2_00007FF638604A60
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F22740_2_00007FF6385F2274
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FF3200_2_00007FF6385FF320
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F42D40_2_00007FF6385F42D4
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E92D00_2_00007FF6385E92D0
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FECA00_2_00007FF6385FECA0
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F24800_2_00007FF6385F2480
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FAC500_2_00007FF6385FAC50
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F84BC0_2_00007FF6385F84BC
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F35400_2_00007FF6385F3540
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386075500_2_00007FF638607550
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638606DCC0_2_00007FF638606DCC
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F26840_2_00007FF6385F2684
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638604EFC0_2_00007FF638604EFC
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F8EF40_2_00007FF6385F8EF4
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386026C40_2_00007FF6386026C4
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F3ED00_2_00007FF6385F3ED0
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385EA76D0_2_00007FF6385EA76D
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E9F3B0_2_00007FF6385E9F3B
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F67500_2_00007FF6385F6750
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FE80C0_2_00007FF6385FE80C
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF63860A7D80_2_00007FF63860A7D8
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F86700_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F28900_2_00007FF6385F2890
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F20700_2_00007FF6385F2070
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655C64C01_2_655C64C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655C50701_2_655C5070
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_656165201_2_65616520
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655C75101_2_655C7510
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_656175C51_2_656175C5
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E45F01_2_655E45F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655D74401_2_655D7440
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655D54801_2_655D5480
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_656197701_2_65619770
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_656277201_2_65627720
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E67101_2_655E6710
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E37C01_2_655E37C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655D46401_2_655D4640
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E06701_2_655E0670
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E96301_2_655E9630
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655EC6F01_2_655EC6F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_655E81B01_2_655E81B0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAAF18A01_2_00007FFDFAAF18A0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC113501_2_00007FFDFAC11350
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC266F01_2_00007FFDFAC266F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC29B101_2_00007FFDFAC29B10
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2DB101_2_00007FFDFAC2DB10
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2FF101_2_00007FFDFAC2FF10
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2C6D01_2_00007FFDFAC2C6D0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2B2C01_2_00007FFDFAC2B2C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC32A701_2_00007FFDFAC32A70
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2D4301_2_00007FFDFAC2D430
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2C0201_2_00007FFDFAC2C020
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2AC401_2_00007FFDFAC2AC40
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC1D7F01_2_00007FFDFAC1D7F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC18C101_2_00007FFDFAC18C10
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC553B01_2_00007FFDFAC553B0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2EBD01_2_00007FFDFAC2EBD0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC147C01_2_00007FFDFAC147C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC31F601_2_00007FFDFAC31F60
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC32F901_2_00007FFDFAC32F90
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC24B901_2_00007FFDFAC24B90
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2CD501_2_00007FFDFAC2CD50
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC1C5501_2_00007FFDFAC1C550
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC141401_2_00007FFDFAC14140
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC308F01_2_00007FFDFAC308F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC11CE01_2_00007FFDFAC11CE0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC254B01_2_00007FFDFAC254B0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC334C01_2_00007FFDFAC334C0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC1C0701_2_00007FFDFAC1C070
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2E2501_2_00007FFDFAC2E250
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC33A501_2_00007FFDFAC33A50
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC132401_2_00007FFDFAC13240
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC13A001_2_00007FFDFAC13A00
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC25DD01_2_00007FFDFAC25DD0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2B9701_2_00007FFDFAC2B970
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC2F5701_2_00007FFDFAC2F570
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA114F1_2_00007FFDFACA114F
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA195B1_2_00007FFDFACA195B
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACF02401_2_00007FFDFACF0240
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA1DD41_2_00007FFDFACA1DD4
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFACA25721_2_00007FFDFACA2572
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAD084601_2_00007FFDFAD08460
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB0C53801_2_00007FFDFB0C5380
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB1891F01_2_00007FFDFB1891F0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB1875AE1_2_00007FFDFB1875AE
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB0C14701_2_00007FFDFB0C1470
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB0E40601_2_00007FFDFB0E4060
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB1985701_2_00007FFDFB198570
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB131BD01_2_00007FFDFB131BD0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB135BB01_2_00007FFDFB135BB0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB159BB01_2_00007FFDFB159BB0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB12BBE01_2_00007FFDFB12BBE0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB15DBF01_2_00007FFDFB15DBF0
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB16DC401_2_00007FFDFB16DC40
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFB1ABA601_2_00007FFDFB1ABA60
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 655DD140 appears 143 times
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 00007FFDFAD0E055 appears 35 times
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 65662C68 appears 32 times
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 00007FFDFAD0DFBF appears 36 times
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 00007FF6385E2B10 appears 47 times
Source: C:\Users\user\Desktop\4.7.exeCode function: String function: 00007FFDFACA12EE appears 138 times
Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: _overlapped.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: pyarmor_runtime.pyd.0.drStatic PE information: Number of sections : 11 > 10
Source: api-ms-win-crt-stdio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-math-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-locale-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-time-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-utility-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-filesystem-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-convert-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-runtime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: python3.dll.0.drStatic PE information: No import functions for PE file found
Source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_overlapped.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663150388.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1671008446.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepyexpat.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665078119.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665190455.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1673673855.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcl86.dllP vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_uuid.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665240082.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664934310.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_multiprocessing.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_asyncio.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663632638.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663257258.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1673306614.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepywintypes311.dll0 vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665362596.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_tkinter.pyd. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665425885.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665559746.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665493791.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1664994016.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1665307425.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 4.7.exe
Source: 4.7.exe, 00000000.00000003.1670532253.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsslH vs 4.7.exe
Source: 4.7.exeBinary or memory string: OriginalFilename vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782480351.00007FFE126D2000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782198282.00007FFE11EE5000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1783495400.00007FFE1A477000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpBinary or memory string: OriginalFilenametk86.dllP vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1781817213.00007FFE1151E000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: OriginalFilename_tkinter.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780791110.00007FFE0E151000.00000002.00000001.01000000.0000001C.sdmpBinary or memory string: OriginalFilenamepywintypes311.dll0 vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780673872.00007FFE0CFE1000.00000002.00000001.01000000.0000001D.sdmpBinary or memory string: OriginalFilenamewin32api.pyd0 vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782892908.00007FFE130C6000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780178861.00007FFDFB9B7000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython311.dll. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1778648142.00007FFDFB3E8000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: OriginalFilenametcl86.dllP vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1783217940.00007FFE13306000.00000002.00000001.01000000.0000000D.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1781657817.00007FFE11504000.00000002.00000001.01000000.0000001E.sdmpBinary or memory string: OriginalFilename_uuid.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpBinary or memory string: OriginalFilenamelibsslH vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780338638.00007FFDFBAC2000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1775851468.000001E07FB7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1778128810.00007FFDFB098000.00000002.00000001.01000000.00000013.sdmpBinary or memory string: OriginalFilenamelibcryptoH vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782024096.00007FFE11EB2000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780563402.00007FFE0CFB3000.00000002.00000001.01000000.0000001F.sdmpBinary or memory string: OriginalFilenamewin32security.pyd0 vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1781327559.00007FFE1030E000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1781216140.00007FFE10265000.00000002.00000001.01000000.00000011.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1780913393.00007FFE0E183000.00000002.00000001.01000000.0000001A.sdmpBinary or memory string: OriginalFilenamewin32file.pyd0 vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782333167.00007FFE120C9000.00000002.00000001.01000000.0000001B.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1776065779.000001E07FE40000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs 4.7.exe
Source: 4.7.exe, 00000001.00000002.1782610226.00007FFE126FB000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs 4.7.exe
Source: classification engineClassification label: mal72.evad.winEXE@6/981@2/2
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E8770 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF6385E8770
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3604:120:WilError_03
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722Jump to behavior
Source: 4.7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\4.7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 4.7.exeReversingLabs: Detection: 13%
Source: 4.7.exeVirustotal: Detection: 19%
Source: 4.7.exeString found in binary or memory: -startline must be less than or equal to -endline
Source: 4.7.exeString found in binary or memory: -help
Source: C:\Users\user\Desktop\4.7.exeFile read: C:\Users\user\Desktop\4.7.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\4.7.exe "C:\Users\user\Desktop\4.7.exe"
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Users\user\Desktop\4.7.exe "C:\Users\user\Desktop\4.7.exe"
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Users\user\Desktop\4.7.exe "C:\Users\user\Desktop\4.7.exe"Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: libffi-8.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: tcl86t.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: tk86t.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: libcrypto-1_1.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: libssl-1_1.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: libcrypto-1_1.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: pywintypes311.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\4.7.exeSection loaded: fwpuclnt.dllJump to behavior
Source: 4.7.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 4.7.exeStatic file information: File size 16488692 > 1048576
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 4.7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: 4.7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665190455.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665307425.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb source: 4.7.exe, 00000001.00000002.1780629825.00007FFE0CFD3000.00000002.00000001.01000000.0000001D.sdmp, win32api.pyd.0.dr
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb!! source: 4.7.exe, 00000001.00000002.1780629825.00007FFE0CFD3000.00000002.00000001.01000000.0000001D.sdmp, win32api.pyd.0.dr
Source: Binary string: ucrtbase.pdb source: 4.7.exe, 00000001.00000002.1780283365.00007FFDFBA85000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1664994016.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1u 30 May 2023built on: Wed May 31 23:27:41 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFAF9F000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: crypto\asn1\a_dup.cASN1_item_dupType=%scompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specific.dllCPUINFO: crypto\initthread.cOPENSSL_ia32cap0 source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665362596.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: 4.7.exe, 00000000.00000003.1663150388.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783449377.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: 4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781762423.00007FFE11518000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: 4.7.exe, 00000000.00000003.1664110854.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: 4.7.exe, 00000000.00000003.1663257258.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782278928.00007FFE120C5000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: 4.7.exe, 00000001.00000002.1782561105.00007FFE126F0000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: 4.7.exe, 00000000.00000003.1663912486.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781284671.00007FFE10307000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC3.1.1built on: Tue May 30 20:56:58 2023 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptoOPENSSL_atexitcrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_asyncio.pdb source: 4.7.exe, 00000000.00000003.1663330704.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1664934310.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\pyexpat.pdb source: pyexpat.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782110641.00007FFE11EDC000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: 4.7.exe, 00000000.00000003.1663414358.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782418234.00007FFE126CD000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32security.pdb source: 4.7.exe, 00000001.00000002.1780519200.00007FFE0CFA4000.00000002.00000001.01000000.0000001F.sdmp
Source: Binary string: ucrtbase.pdbUGP source: 4.7.exe, 00000001.00000002.1780283365.00007FFDFBA85000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: 4.7.exe, 00000000.00000003.1664315946.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781936722.00007FFE11EA8000.00000002.00000001.01000000.0000000C.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: 4.7.exe, 00000000.00000003.1663257258.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782278928.00007FFE120C5000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665493791.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.0.dr
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb source: 4.7.exe, 00000001.00000002.1780744019.00007FFE0E140000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: 4.7.exe, 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-jyfjmawu\src\rust\target\release\deps\cryptography_rust.pdb source: 4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmp
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: 4.7.exe, 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: C:\Users\oxyn\Desktop\dev\guardshield-main\dll\x64\Release\AntiDBG.pdb source: 4.7.exe, 00000001.00000002.1781399202.00007FFE110F4000.00000002.00000001.01000000.00000023.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb** source: 4.7.exe, 00000001.00000002.1780744019.00007FFE0E140000.00000002.00000001.01000000.0000001C.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFAF9F000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_overlapped.pdb source: 4.7.exe, 00000000.00000003.1664177720.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: 4.7.exe, 00000000.00000003.1663150388.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783449377.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665240082.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: 4.7.exe, 00000001.00000002.1777964904.00007FFDFB021000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: 4.7.exe, 00000001.00000002.1778835941.00007FFDFB77B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: 4.7.exe, 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: 4.7.exe, 00000000.00000003.1673450709.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1783171349.00007FFE13303000.00000002.00000001.01000000.0000000D.sdmp, select.pyd.0.dr
Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665559746.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: 4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782110641.00007FFE11EDC000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_uuid.pdb source: 4.7.exe, 00000000.00000003.1664866877.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1781582368.00007FFE11502000.00000002.00000001.01000000.0000001E.sdmp, _uuid.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: 4.7.exe, 00000000.00000003.1664250407.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1782813005.00007FFE130C3000.00000002.00000001.01000000.00000016.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: 4.7.exe, 00000000.00000003.1671180007.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1776065779.000001E07FE40000.00000002.00000001.01000000.00000007.sdmp
Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32file.pdb source: 4.7.exe, 00000001.00000002.1780862407.00007FFE0E175000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665078119.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: 4.7.exe, 00000000.00000003.1665425885.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: 4.7.exe, 00000001.00000002.1781109024.00007FFE1024D000.00000002.00000001.01000000.00000011.sdmp, _ssl.pyd.0.dr
Source: 4.7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 4.7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 4.7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 4.7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 4.7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: ucrtbase.dll.0.drStatic PE information: 0x81CF5D89 [Wed Jan 5 14:32:41 2039 UTC]
Source: pyarmor_runtime.pyd.0.drStatic PE information: real checksum: 0x9d096 should be: 0x9f813
Source: pywintypes311.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x2d638
Source: win32api.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x2a25c
Source: _cffi_backend.cp311-win_amd64.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x2fd5b
Source: tmp14ykmm5n.dx.1.drStatic PE information: real checksum: 0x0 should be: 0xa991
Source: md__mypyc.cp311-win_amd64.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x2b1ad
Source: _rust.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x657c95
Source: win32security.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x27d50
Source: win32file.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x2ec43
Source: _cffi.cp311-win_amd64.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xa8f9a
Source: md.cp311-win_amd64.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x5ce2
Source: backend_c.cp311-win_amd64.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x8c9ed
Source: 4.7.exeStatic PE information: section name: _RDATA
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
Source: libcrypto-1_1.dll.0.drStatic PE information: section name: .00cfg
Source: libssl-1_1.dll.0.drStatic PE information: section name: .00cfg
Source: python311.dll.0.drStatic PE information: section name: PyRuntim
Source: pyarmor_runtime.pyd.0.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC34CBC push 2B41C88Bh; iretd 1_2_00007FFDFAC34CC1
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC34196 push 2B41C88Bh; iretd 1_2_00007FFDFAC3419B

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\4.7.exeProcess created: "C:\Users\user\Desktop\4.7.exe"
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32security.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\tmp14ykmm5n.dxJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\select.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\libffi-8.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_overlapped.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\tk86t.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography\hazmat\bindings\_rust.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_multiprocessing.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\ucrtbase.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\pyarmor_runtime_000000\pyarmor_runtime.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\pyexpat.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_uuid.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32file.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\libssl-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140_1.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\backend_c.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_cffi_backend.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\_cffi.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32api.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl86t.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\pywin32_system32\pywintypes311.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\python311.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI61722\_asyncio.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeFile created: C:\Users\user\AppData\Local\Temp\tmp14ykmm5n.dxJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E53F0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF6385E53F0

Malware Analysis System Evasion

barindex
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHSANDBOXIECONTROLWNDCLASSC:\SANDBOXIESBIEDLL.DLLOLLYDBG - [CPU]IMMUNITY DEBUGGER - [CPU]CHEATENGINE-X86_64.EXEOLLYDBG.EXEIDA.EXEIDA64.EXERADARE2.EXEHTTPDEBUGGER.EXETCPVIEW.EXEFIDDLER.EXEFIDDLER.WEBUI.EXEX32DBG.EXEX64DBG.EXEX96DBG.EXEHTTP TOOLKIT.EXEHTTPDEBUGGERUI.EXEWIRESHARK.EXEFIDDLER.EXECHARLES.EXEPROCESSHACKER.EXEHTTPDEBUGGERUI.EXEVMTOOLSD.EXEVGAUTHSERVICE.EXEVMACTHLP.EXEVMSRVC.EXEVMUSRVC.EXEPRL_CC.EXEPRL_TOOLS.EXEKSDUMPERCLIENT.EXEKSDUMPER.EXEPYINJECT.EXENATIVEINJECTOR.EXE[WARNING] IT IS IMPOSSIBLE TO CHECK PROCESS LIST.QEMU-GA.EXEOLLYDBGIDNTDLL.DLLNTQUERYINFORMATIONPROCESSNTSETINFORMATIONTHREADKVMKVMKVMMICROSOFT HVVMWAREVMWAREXENVMMXENVMMPRL HYPERV VBOXVBOXVBOXFUNCTION HOOKING ERRORPYRUN_SIMPLESTRINGFLAGSPY_SETPROGRAMNAMEPYEVAL_INITTHREADSPYGILSTATE_RELEASEPYGILSTATE_ENSURE@
Source: 4.7.exe, 00000001.00000002.1781399202.00007FFE110F4000.00000002.00000001.01000000.00000023.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\4.7.exeRDTSC instruction interceptor: First address: 7FFE110F225D second address: 7FFE110F227A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [ecx], edx 0x00000005 dec eax 0x00000006 mov dword ptr [ecx+08h], eax 0x00000009 dec eax 0x0000000a xor eax, eax 0x0000000c dec eax 0x0000000d mov eax, 00000005h 0x00000013 dec eax 0x00000014 shr eax, 02h 0x00000017 dec eax 0x00000018 sub eax, ebx 0x0000001a dec eax 0x0000001b cmp eax, ecx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\pyexpat.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_uuid.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32file.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp14ykmm5n.dxJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32security.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\select.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_overlapped.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\backend_c.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_cffi_backend.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography\hazmat\bindings\_rust.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\_cffi.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32api.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_multiprocessing.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\python311.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\pyarmor_runtime_000000\pyarmor_runtime.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_asyncio.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI61722\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\4.7.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-18182
Source: C:\Users\user\Desktop\4.7.exeAPI coverage: 8.4 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385E8D00 FindFirstFileExW,FindClose,0_2_00007FF6385E8D00
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F8670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386026C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6386026C4
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385F8670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6385F8670
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI61722\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeFile opened: C:\Users\user\Jump to behavior
Source: 4.7.exe, 00000000.00000003.1666055194.000001E0F33F0000.00000004.00000020.00020000.00000000.sdmp, cacert.pem.0.drBinary or memory string: j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU
Source: 4.7.exe, 00000001.00000003.1751482947.000001E0014C1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0014CC000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1746302555.000001E0014DA000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748115831.000001E0014CF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750390174.000001E0014C1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1749211401.000001E0014D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
Source: cacert.pem.0.drBinary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd
Source: 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Unknown exceptionbad array new lengthSandboxieControlWndClassC:\Sandboxiesbiedll.dllOllyDbg - [CPU]Immunity Debugger - [CPU]cheatengine-x86_64.exeollydbg.exeida.exeida64.exeradare2.exeHTTPDebugger.exetcpview.exeFiddler.exeFiddler.WebUi.exex32dbg.exex64dbg.exex96dbg.exehttp toolkit.exehttpdebuggerui.exewireshark.exefiddler.execharles.exeprocesshacker.exeHTTPDebuggerUI.exevmtoolsd.exevgauthservice.exevmacthlp.exevmsrvc.exevmusrvc.exeprl_cc.exeprl_tools.exeksdumperclient.exeksdumper.exepyinject.exeNativeInjector.exe[Warning] It is impossible to check process list.qemu-ga.exeOLLYDBGIDntdll.dllNtQueryInformationProcessNtSetInformationThreadKVMKVMKVMMicrosoft HvVMwareVMwareXenVMMXenVMMprl hyperv VBoxVBoxVBoxFunction hooking errorPyRun_SimpleStringFlagsPy_SetProgramNamePyEval_InitThreadsPyGILState_ReleasePyGILState_Ensure@
Source: C:\Users\user\Desktop\4.7.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\4.7.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\4.7.exeOpen window title or class name: ollydbg - [cpu]
Source: C:\Users\user\Desktop\4.7.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\4.7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FB3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6385FB3CC
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6386042D0 GetProcessHeap,0_2_00007FF6386042D0
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385ECA9C SetUnhandledExceptionFilter,0_2_00007FF6385ECA9C
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385FB3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6385FB3CC
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385EC030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6385EC030
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385EC8BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6385EC8BC
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAAF2A90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFDFAAF2A90
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAAF3058 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFDFAAF3058
Source: C:\Users\user\Desktop\4.7.exeCode function: 1_2_00007FFDFAC7EC00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFDFAC7EC00
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Users\user\Desktop\4.7.exe "C:\Users\user\Desktop\4.7.exe"Jump to behavior
Source: C:\Users\user\Desktop\4.7.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"Jump to behavior
Source: 4.7.exe, 00000001.00000002.1774623780.000001E002D1C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DOF_PROGMAN
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF63860A620 cpuid 0_2_00007FF63860A620
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\certifi VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography-41.0.1.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography-41.0.1.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography-41.0.1.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography-41.0.1.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8\8.4 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8\8.5 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl8 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\opt0.4 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\ucrtbase.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\_bz2.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\_lzma.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\Desktop\4.7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\win32 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\pywin32_system32 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-convert-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-heap-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-locale-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-math-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-runtime-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-stdio-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-time-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-utility-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI61722\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF6385EC7A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6385EC7A0
Source: C:\Users\user\Desktop\4.7.exeCode function: 0_2_00007FF638606B50 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF638606B50
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
12
Process Injection
1
Masquerading
1
Input Capture
2
System Time Discovery
Remote Services1
Input Capture
22
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory431
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials122
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
4.7.exe13%ReversingLabs
4.7.exe19%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_asyncio.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_cffi_backend.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_ctypes.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_decimal.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_multiprocessing.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_overlapped.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_queue.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_ssl.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_tkinter.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\_uuid.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-locale-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-math-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-runtime-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-time-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\api-ms-win-crt-utility-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\charset_normalizer\md__mypyc.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\cryptography\hazmat\bindings\_rust.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\libcrypto-1_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\libffi-8.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\libssl-1_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\pyarmor_runtime_000000\pyarmor_runtime.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\pyexpat.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\python3.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\python311.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\pywin32_system32\pywintypes311.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\tcl86t.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\tk86t.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\ucrtbase.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\unicodedata.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32api.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32file.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\win32\win32security.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\_cffi.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI61722\zstandard\backend_c.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tmp14ykmm5n.dx0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
keyauth.win0%VirustotalBrowse
discord.com0%VirustotalBrowse
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
https://tools.ietf.org/html/rfc2388#section-4.40%URL Reputationsafe
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%URL Reputationsafe
https://peps.python.org/pep-0205/0%URL Reputationsafe
http://crl.dhimyotis.com/certignarootca.crl0%URL Reputationsafe
http://curl.haxx.se/rfc/cookie_spec.html0%URL Reputationsafe
http://ocsp.accv.es0%URL Reputationsafe
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%URL Reputationsafe
https://httpbin.org/get0%URL Reputationsafe
https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
https://httpbin.org/0%URL Reputationsafe
https://wwww.certigna.fr/autorites/0%URL Reputationsafe
http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%URL Reputationsafe
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%URL Reputationsafe
http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
http://wwwsearch.sf.net/):0%URL Reputationsafe
http://tools.ietf.org/html/rfc6125#section-6.4.30%URL Reputationsafe
http://www.cert.fnmt.es/dpcs/0%URL Reputationsafe
http://www.accv.es000%URL Reputationsafe
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%URL Reputationsafe
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
https://foss.heptapod.net/pypy/pypy/-/issues/35390%URL Reputationsafe
https://github.com/pyca/cryptography/issues/89960%Avira URL Cloudsafe
http://www.accv.es/legislacion_c.htms0%Avira URL Cloudsafe
https://github.com/mhammond/pywin320%Avira URL Cloudsafe
http://crl.securetrust.com/SGCA.crl0%URL Reputationsafe
https://github.com/pyca/cryptography/actions?query=workflow%3ACI0%Avira URL Cloudsafe
https://httpbin.org/post0%URL Reputationsafe
http://www.firmaprofesional.com/cps00%URL Reputationsafe
http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%URL Reputationsafe
https://html.spec.whatwg.org/multipage/0%URL Reputationsafe
http://www.quovadisglobal.com/cps00%URL Reputationsafe
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings0%URL Reputationsafe
http://www.iana.org/time-zones/repository/tz-link.html0%URL Reputationsafe
https://requests.readthedocs.io0%URL Reputationsafe
http://repository.swisssign.com/0%URL Reputationsafe
http://ocsp.accv.es00%URL Reputationsafe
https://json.org0%URL Reputationsafe
http://www.quovadisglobal.com/cps0%URL Reputationsafe
https://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
http://crl.dhimyotis.com/certignarootca.crlG0%Avira URL Cloudsafe
https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
https://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
https://github.com/pyca/cryptography/issues/89960%VirustotalBrowse
https://github.com/mhammond/pywin320%VirustotalBrowse
http://www.accv.es/legislacion_c.htms0%VirustotalBrowse
http://cacerts.)0%Avira URL Cloudsafe
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
http://crl.dhimyotis.com/certignarootca.crlG0%VirustotalBrowse
https://keyauth.win/api/1.2/0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
http://crl.dhimyotis.com/certignarootca.crl5j0%Avira URL Cloudsafe
http://crl.securetrust.com/STCA.crl2520%Avira URL Cloudsafe
https://keyauth.win/api/1.2/0%VirustotalBrowse
https://github.com/pyca/cryptography/actions?query=workflow%3ACI0%VirustotalBrowse
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
https://www.apache.org/licenses/0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main0%Avira URL Cloudsafe
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file0%Avira URL Cloudsafe
http://crl.securetrust.com/STCA.crlz0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main0%VirustotalBrowse
https://www.apache.org/licenses/0%VirustotalBrowse
https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
http://crl.dhimyotis.com/certignarootca.crl5j0%VirustotalBrowse
https://discord.com/api/webhooks/1272555550906781748/SDSkrny-LnA_9UuXZkezuid-OBsW-UH4MtGNGhNapUk-Ee30%Avira URL Cloudsafe
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file0%VirustotalBrowse
https://cryptography.io/en/latest/installation/0%Avira URL Cloudsafe
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
https://www.python.org/psf/license/0%Avira URL Cloudsafe
http://www.cert.fnmt.es/dpcs/r.l0%Avira URL Cloudsafe
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%VirustotalBrowse
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt00%Avira URL Cloudsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
http://www.accv.es/legislacion_c.htm0%Avira URL Cloudsafe
http://crl.securetrust.com/STCA.crlz0%VirustotalBrowse
https://cryptography.io/en/latest/security/0%Avira URL Cloudsafe
https://www.python.org/psf/license/0%VirustotalBrowse
https://cffi.readthedocs.io/en/latest/using.html#callbacks0%Avira URL Cloudsafe
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt00%VirustotalBrowse
http://crl.xrampsecurity.com/XGCA.crl00%Avira URL Cloudsafe
https://google.com/mail0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
http://www.accv.es/legislacion_c.htm0%VirustotalBrowse
https://github.com/pyca/cryptography/issues0%Avira URL Cloudsafe
http://crl.xrampsecurity.com/XGCA.crl00%VirustotalBrowse
https://cffi.readthedocs.io/en/latest/using.html#callbacks0%VirustotalBrowse
https://cryptography.io/en/latest/installation/0%VirustotalBrowse
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%VirustotalBrowse
https://readthedocs.org/projects/cryptography/badge/?version=latest0%Avira URL Cloudsafe
https://discord.com/api/webhooks/1272555550906781748/SDSkrny-LnA_9UuXZkezuid-OBsW-UH4MtGNGhNapUk-Ee30%VirustotalBrowse
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/issues0%VirustotalBrowse
http://google.com/0%Avira URL Cloudsafe
https://mahler:8092/site-updates.py0%Avira URL Cloudsafe
http://.../back.jpeg0%Avira URL Cloudsafe
https://github.com/pyca/cryptography0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
keyauth.win
104.26.1.5
truefalseunknown
discord.com
162.159.128.233
truefalseunknown
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/pyca/cryptography/issues/89964.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.accv.es/legislacion_c.htms4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/mhammond/pywin324.7.exe, 00000000.00000003.1673306614.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1780791110.00007FFE0E151000.00000002.00000001.01000000.0000001C.sdmp, 4.7.exe, 00000001.00000002.1780673872.00007FFE0CFE1000.00000002.00000001.01000000.0000001D.sdmp, 4.7.exe, 00000001.00000002.1780563402.00007FFE0CFB3000.00000002.00000001.01000000.0000001F.sdmp, 4.7.exe, 00000001.00000002.1780913393.00007FFE0E183000.00000002.00000001.01000000.0000001A.sdmp, win32api.pyd.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.dhimyotis.com/certignarootca.crl04.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACI4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://tools.ietf.org/html/rfc2388#section-4.44.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.apache.org/licenses/LICENSE-2.04.7.exe, 00000000.00000003.1666519520.000001E0F33FF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1666519520.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1666583923.000001E0F33FF000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base644.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750390174.000001E001497000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1751482947.000001E001497000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.dhimyotis.com/certignarootca.crlG4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329634.7.exe, 00000001.00000002.1772308007.000001E001710000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0205/4.7.exe, 00000001.00000002.1772206112.000001E001610000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.dhimyotis.com/certignarootca.crl4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://curl.haxx.se/rfc/cookie_spec.html4.7.exe, 00000001.00000003.1753057627.000001E001AD5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772934758.000001E002050000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019CD000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752691538.000001E001B69000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://ocsp.accv.es4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://cacerts.)4.7.exe, 00000000.00000003.1664410086.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://keyauth.win/api/1.2/4.7.exe, 00000001.00000002.1774783209.000001E002D90000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774783209.000001E002E7C000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy4.7.exe, 00000001.00000002.1772934758.000001E002050000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6884.7.exe, 00000001.00000002.1775727024.000001E07F978000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://httpbin.org/get4.7.exe, 00000001.00000002.1773307876.000001E002350000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.dhimyotis.com/certignarootca.crl5j4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://wwww.certigna.fr/autorites/0m4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.securetrust.com/STCA.crl2524.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://httpbin.org/4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.apache.org/licenses/4.7.exe, 00000000.00000003.1666519520.000001E0F33F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://wwww.certigna.fr/autorites/4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file4.7.exe, 00000001.00000002.1776795608.00007FFDFA96A000.00000002.00000001.01000000.00000020.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750078791.000001E0018A0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.securetrust.com/STCA.crlz4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://discord.com/api/webhooks/1272555550906781748/SDSkrny-LnA_9UuXZkezuid-OBsW-UH4MtGNGhNapUk-Ee34.7.exe, 00000001.00000002.1774623780.000001E002CC0000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5354.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E00188E000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/installation/4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy4.7.exe, 00000001.00000003.1733865827.000001E07FB59000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB40000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.python.org/psf/license/4.7.exe, 00000001.00000002.1779042409.00007FFDFB818000.00000004.00000001.01000000.00000005.sdmp, python311.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.cert.fnmt.es/dpcs/r.l4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/STCA.crl4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://wwwsearch.sf.net/):4.7.exe, 00000001.00000003.1753057627.000001E001AD5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019CD000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752691538.000001E001B69000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E0018AF000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt04.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.accv.es/legislacion_c.htm4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.34.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/security/4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://cffi.readthedocs.io/en/latest/using.html#callbacks4.7.exe, 00000001.00000002.1780407783.00007FFE0046C000.00000002.00000001.01000000.00000021.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.xrampsecurity.com/XGCA.crl04.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.cert.fnmt.es/dpcs/4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://google.com/mail4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.accv.es004.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py4.7.exe, 00000001.00000003.1732975815.000001E07FB59000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750078791.000001E0018A0000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/pyca/cryptography/issuesMETADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latest4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/35394.7.exe, 00000001.00000002.1772308007.000001E001710000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752777501.000001E0019AD000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://google.com/4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E0018AF000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://mahler:8092/site-updates.py4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/SGCA.crl4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://.../back.jpeg4.7.exe, 00000001.00000002.1773307876.000001E002350000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • Avira URL Cloud: safe
unknown
https://www.python.org/download/releases/2.3/mro/.4.7.exe, 00000001.00000002.1775727024.000001E07F8F0000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1732504637.000001E07FBCC000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://cryptography.io/METADATA.0.drfalse
  • Avira URL Cloud: safe
unknown
https://httpbin.org/post4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsN4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography/4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/Ousret/charset_normalizer4.7.exe, 00000001.00000002.1772421041.000001E001B69000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.firmaprofesional.com/cps04.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774471617.000001E002AC6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/urllib3/urllib3/issues/29204.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/SGCA.crl04.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://yahoo.com/4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/STCA.crl04.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-64.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1753095195.000001E00188E000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://cacerts.digicert.co4.7.exe, 00000000.00000003.1664005635.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000000.00000003.1663766035.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://html.spec.whatwg.org/multipage/4.7.exe, 00000001.00000002.1772421041.000001E001852000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.quovadisglobal.com/cps04.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl4.7.exe, 00000001.00000002.1774371959.000001E002A57000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002930000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings4.7.exe, 00000001.00000002.1773125718.000001E002150000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl04.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://cryptography.io/en/latest/changelog/4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • Avira URL Cloud: safe
unknown
http://www.iana.org/time-zones/repository/tz-link.html4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750390174.000001E001439000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://mail.python.org/mailman/listinfo/cryptography-dev4.7.exe, 00000000.00000003.1666662467.000001E0F33F4000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • Avira URL Cloud: safe
unknown
https://requests.readthedocs.io4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1773307876.000001E002430000.00000004.00001000.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.xrampsecurity.com/XGCA.crlAr4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://repository.swisssign.com/4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://ocsp.accv.es44.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.xrampsecurity.com/XGCA.crl4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002951000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.dhimyotis.com/certignarootca.crlj4.7.exe, 00000001.00000002.1774471617.000001E002A87000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.python.org4.7.exe, 00000001.00000003.1750950990.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1747666762.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1748995191.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1771796915.000001E0015B5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1752921975.000001E0015D5000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000003.1750283446.000001E0015D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.accv.es/legislacion_c.htm0U4.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Connection4.7.exe, 00000000.00000003.1674556319.000001E0F33F2000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/SGCA.crlb4.7.exe, 00000001.00000002.1774371959.000001E002A45000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl3.digicer4.7.exe, 00000000.00000003.1664782026.000001E0F33EF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.accv.es04.7.exe, 00000001.00000002.1774371959.000001E002A2C000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.python.org/4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://json.org4.7.exe, 00000001.00000002.1771796915.000001E001410000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.dhimyotis.com/certignarootca.crlv4.7.exe, 00000001.00000002.1774212983.000001E002990000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crlC_TIME=C4.7.exe, 00000001.00000002.1774212983.000001E002930000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://twitter.com/4.7.exe, 00000001.00000003.1753357552.000001E001986000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1775851468.000001E07FB7A000.00000004.00000020.00020000.00000000.sdmp, 4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.cert.fnmt.es/dpcs/Q4.7.exe, 00000001.00000002.1772421041.000001E0019C6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/SGCA.crlAria4.7.exe, 00000001.00000002.1773873861.000001E00276C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.quovadisglobal.com/cps4.7.exe, 00000001.00000002.1772421041.000001E001912000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
104.26.1.5
keyauth.winUnited States
13335CLOUDFLARENETUSfalse
162.159.128.233
discord.comUnited States
13335CLOUDFLARENETUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502478
Start date and time:2024-09-01 19:13:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:4.7.exe
Detection:MAL
Classification:mal72.evad.winEXE@6/981@2/2
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 69%
  • Number of executed functions: 92
  • Number of non-executed functions: 235
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): SIHClient.exe
  • Excluded IPs from analysis (whitelisted): 40.127.169.103
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtCreateFile calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
104.26.1.5SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
    SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Win64.Evo-gen.25703.16605.exeGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.Win64.MalwareX-gen.5842.23757.exeGet hashmaliciousUnknownBrowse
          https://app.slidebean.com/p/mbice9jyuy/Get hashmaliciousUnknownBrowse
            162.159.128.233file.exeGet hashmaliciousLummaC, Glupteba, PureLog Stealer, RisePro Stealer, SmokeLoader, Stealc, zgRATBrowse
            • discord.com/phpMyAdmin/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            keyauth.winSecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
            • 172.67.72.57
            SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
            • 104.26.0.5
            SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
            • 104.26.1.5
            SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
            • 172.67.72.57
            SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
            • 104.26.1.5
            SecuriteInfo.com.Win64.MalwareX-gen.26384.14234.exeGet hashmaliciousUnknownBrowse
            • 104.26.0.5
            SecuriteInfo.com.Trojan.GenericKD.73779679.12724.23011.exeGet hashmaliciousUnknownBrowse
            • 104.26.0.5
            SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
            • 172.67.72.57
            SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
            • 172.67.72.57
            PmTPg1LYm4.exeGet hashmaliciousUnknownBrowse
            • 104.26.0.5
            bg.microsoft.map.fastly.nethttps://sites.google.com/view/bzwyy/accueilGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            https://sites.google.com/view/xxwws/homeGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            SEAL CAAST C-K23 DIA 410_PDF.exeGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            https://danadompetdigital.zesty.my.id/Get hashmaliciousHTMLPhisherBrowse
            • 199.232.210.172
            http://www.uyapdosyasorgula.com/e-devlet/Get hashmaliciousUnknownBrowse
            • 199.232.214.172
            https://bfb76b24ef4f39994db41677dff3eb5ffaa8600730bf804477ddba0f4e.pages.dev/Get hashmaliciousHTMLPhisherBrowse
            • 199.232.210.172
            http://telstra-105864.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
            • 199.232.214.172
            http://icloud-lphone.info/icloud2022-esp.php/Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://att-108937.weeblysite.com/Get hashmaliciousUnknownBrowse
            • 199.232.214.172
            http://telstra-104325.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
            • 199.232.210.172
            discord.comstub.exeGet hashmaliciousStealeriumBrowse
            • 162.159.136.232
            get wifi info temp.exeGet hashmaliciousBabuk, TrojanRansomBrowse
            • 162.159.135.232
            soinjector.exeGet hashmaliciousUnknownBrowse
            • 162.159.128.233
            N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
            • 162.159.135.232
            N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
            • 162.159.136.232
            http://relay.csgoze520.com/Get hashmaliciousUnknownBrowse
            • 162.159.138.232
            ibero.batGet hashmaliciousSilverRatBrowse
            • 162.159.136.232
            Invoice0.exeGet hashmaliciousSilverRatBrowse
            • 162.159.135.232
            spglr64.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
            • 162.159.136.232
            obvious.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
            • 162.159.136.232
            fp2e7a.wpc.phicdn.nethttp://virastman.irGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            https://sites.google.com/view/bzwyy/accueilGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            https://sites.google.com/view/xxwws/homeGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            https://mychaseexclusive.ru/case?tokenGet hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            https://uppholldlgins.mystrikingly.com/Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            http://juno-100505.weeblysite.com/Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            https://danadompetdigital.zesty.my.id/Get hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            http://www.chacararecantodosol.com.br/wp-admin/js/milissa/swisssa2024/swisscom/index2.phpGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            http://6b5b555f2a01cd6960fbc4a3facee2c37f07856d013f850d27993a35f2.pages.dev/Get hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            http://www.uyapdosyasorgula.com/e-devlet/Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, StealcBrowse
            • 172.64.41.3
            stub.exeGet hashmaliciousStealeriumBrowse
            • 162.159.136.232
            firmware.mipsel.elfGet hashmaliciousUnknownBrowse
            • 104.30.194.47
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 172.64.41.3
            file.exeGet hashmaliciousAmadey, StealcBrowse
            • 172.64.41.3
            ^=L@test_PC_FilE_2024_as_P@ssKey=^.zipGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
            • 188.114.97.3
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 172.64.41.3
            http://virastman.irGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, StealcBrowse
            • 172.64.41.3
            stub.exeGet hashmaliciousStealeriumBrowse
            • 162.159.136.232
            firmware.mipsel.elfGet hashmaliciousUnknownBrowse
            • 104.30.194.47
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 172.64.41.3
            file.exeGet hashmaliciousAmadey, StealcBrowse
            • 172.64.41.3
            ^=L@test_PC_FilE_2024_as_P@ssKey=^.zipGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
            • 188.114.97.3
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 172.64.41.3
            http://virastman.irGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.97.3
            snake.mal.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140.dllSecuriteInfo.com.Win64.Malware-gen.7824.9882.exeGet hashmaliciousPython Stealer, Stink StealerBrowse
              RebelCracked.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                Vjy8d2EoqK.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
                  aznuril.exeGet hashmaliciousXWormBrowse
                    Mega.nz Spreader.exeGet hashmaliciousLaplas Clipper, Meduza StealerBrowse
                      Built.exeGet hashmaliciousBlank GrabberBrowse
                        LisectAVT_2403002A_424.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                          LisectAVT_2403002A_424.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                            LisectAVT_2403002A_441.exeGet hashmaliciousUnknownBrowse
                              Lisect_AVT_24003_G1B_83.exeGet hashmaliciousUnknownBrowse
                                C:\Users\user\AppData\Local\Temp\_MEI61722\VCRUNTIME140_1.dllaznuril.exeGet hashmaliciousXWormBrowse
                                  Lisect_AVT_24003_G1B_83.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.SpywareX-gen.27721.19030.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                      access_version_x32-64_pack.exeGet hashmaliciousUnknownBrowse
                                        https://c51k11nyj56k.pettisville.sbs/lander/FileRotator_ID428/download.phpGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.FileRepMalware.5539.23420.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.FileRepMalware.5539.23420.exeGet hashmaliciousUnknownBrowse
                                              SecuriteInfo.com.MacOS.ReverseShell-C.30585.8425.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                                MDE_File_Sample_1e64554c1e3e257c1c52d34ca908eb9958a6bbf7.zipGet hashmaliciousUnknownBrowse
                                                  MDE_File_Sample_1e64554c1e3e257c1c52d34ca908eb9958a6bbf7.zipGet hashmaliciousPython StealerBrowse
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):4
                                                    Entropy (8bit):2.0
                                                    Encrypted:false
                                                    SSDEEP:3:qn:qn
                                                    MD5:3F1D1D8D87177D3D8D897D7E421F84D6
                                                    SHA1:DD082D742A5CB751290F1DB2BD519C286AA86D95
                                                    SHA-256:F02285FB90ED8C81531FE78CF4E2ABB68A62BE73EE7D317623E2C3E3AEFDFFF2
                                                    SHA-512:2AE2B3936F31756332CA7A4B877D18F3FCC50E41E9472B5CD45A70BEA82E29A0FA956EE6A9EE0E02F23D9DB56B41D19CB51D88AAC06E9C923A820A21023752A9
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:blat
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):109392
                                                    Entropy (8bit):6.641929675972235
                                                    Encrypted:false
                                                    SSDEEP:1536:GcghbEGyzXJZDWnEzWG9q4lVOiVgXjO5/woecbq8qZHg2zuCS+zuecL:GV3iC0h9q4v6XjKwoecbq8qBTq+1cL
                                                    MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
                                                    SHA1:489CFFF1B19ABBEC98FDA26AC8958005E88DD0CB
                                                    SHA-256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
                                                    SHA-512:D78260C66331FE3029D2CC1B41A5D002EC651F2E3BBF55076D65839B5E3C6297955AFD4D9AB8951FBDC9F929DBC65EB18B14B59BCE1F2994318564EB4920F286
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: SecuriteInfo.com.Win64.Malware-gen.7824.9882.exe, Detection: malicious, Browse
                                                    • Filename: RebelCracked.exe, Detection: malicious, Browse
                                                    • Filename: Vjy8d2EoqK.exe, Detection: malicious, Browse
                                                    • Filename: aznuril.exe, Detection: malicious, Browse
                                                    • Filename: Mega.nz Spreader.exe, Detection: malicious, Browse
                                                    • Filename: Built.exe, Detection: malicious, Browse
                                                    • Filename: LisectAVT_2403002A_424.exe, Detection: malicious, Browse
                                                    • Filename: LisectAVT_2403002A_424.exe, Detection: malicious, Browse
                                                    • Filename: LisectAVT_2403002A_441.exe, Detection: malicious, Browse
                                                    • Filename: Lisect_AVT_24003_G1B_83.exe, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........u...u...u.E.t...u.....u...t...u..v...u..q...u..p...u..u...u......u..w...u.Rich..u.........PE..d..._#;..........." ...".....`......................................................=.....`A........................................`C..4....K...............p.......\..PO...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......D..............@....pdata.......p.......H..............@..@_RDATA..\............T..............@..@.rsrc................V..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):49520
                                                    Entropy (8bit):6.65700274508223
                                                    Encrypted:false
                                                    SSDEEP:768:YEgYXUcHJcUJSDW/tfxL1qBSHGm6Ub/I2Hi09z0XQKBcRmuU9zuKl:YvGS8fZ1esJwUpz0X3B+d8zuKl
                                                    MD5:7E668AB8A78BD0118B94978D154C85BC
                                                    SHA1:DBAC42A02A8D50639805174AFD21D45F3C56E3A0
                                                    SHA-256:E4B533A94E02C574780E4B333FCF0889F65ED00D39E32C0FBBDA2116F185873F
                                                    SHA-512:72BB41DB17256141B06E2EAEB8FC65AD4ABDB65E4B5F604C82B9E7E7F60050734137D602E0F853F1A38201515655B6982F2761EE0FA77C531AA58591C95F0032
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: aznuril.exe, Detection: malicious, Browse
                                                    • Filename: Lisect_AVT_24003_G1B_83.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Win64.SpywareX-gen.27721.19030.exe, Detection: malicious, Browse
                                                    • Filename: access_version_x32-64_pack.exe, Detection: malicious, Browse
                                                    • Filename: , Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.5539.23420.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.5539.23420.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.MacOS.ReverseShell-C.30585.8425.exe, Detection: malicious, Browse
                                                    • Filename: MDE_File_Sample_1e64554c1e3e257c1c52d34ca908eb9958a6bbf7.zip, Detection: malicious, Browse
                                                    • Filename: MDE_File_Sample_1e64554c1e3e257c1c52d34ca908eb9958a6bbf7.zip, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............L...L...L...M...L...M...L.FL...L...L...L...M...L...M...L...M...L...M...L..*L...L...M...LRich...L........................PE..d....J.$.........." ...".<...8.......A....................................................`A........................................0m.......m..x....................r..pO......D....c..p...........................pb..@............P..h............................text...0:.......<.................. ..`.rdata..."...P...$...@..............@..@.data................d..............@....pdata...............f..............@..@.rsrc................l..............@..@.reloc..D............p..............@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):65304
                                                    Entropy (8bit):6.186171767195339
                                                    Encrypted:false
                                                    SSDEEP:1536:a2icaMc9070S1Qx+gTKnEzBIPOnr07SyLLDPx:a2icrcj2Qx+gTOEzBIPOnYxXx
                                                    MD5:79F71C92C850B2D0F5E39128A59054F1
                                                    SHA1:A773E62FA5DF1373F08FEAA1FB8FA1B6D5246252
                                                    SHA-256:0237739399DB629FDD94DE209F19AC3C8CD74D48BEBE40AD8EA6AC7556A51980
                                                    SHA-512:3FDEF4C04E7D89D923182E3E48D4F3D866204E878ABCAACFF657256F054AEAFAFDD352B5A55EA3864A090D01169EC67B52C7F944E02247592417D78532CC5171
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../T..A...A...A.......A...@...A...D...A...E...A...B...A.~.@...A...@...A...@.2.A.~.L...A.~.A...A.~.....A.~.C...A.Rich..A.........PE..d......d.........." ...".R..........`.....................................................`.............................................P...`...d......................../..........`w..T........................... v..@............p...............................text....P.......R.................. ..`.rdata..~J...p...L...V..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):84760
                                                    Entropy (8bit):6.570831353064175
                                                    Encrypted:false
                                                    SSDEEP:1536:PdQz7pZ3catNZTRGE51LOBK5bib8tsfYqpIPCV17SyQPx:VQz9Z5VOwiItsAqpIPCV1Gx
                                                    MD5:3859239CED9A45399B967EBCE5A6BA23
                                                    SHA1:6F8FF3DF90AC833C1EB69208DB462CDA8CA3F8D6
                                                    SHA-256:A4DD883257A7ACE84F96BCC6CD59E22D843D0DB080606DEFAE32923FC712C75A
                                                    SHA-512:030E5CE81E36BD55F69D55CBB8385820EB7C1F95342C1A32058F49ABEABB485B1C4A30877C07A56C9D909228E45A4196872E14DED4F87ADAA8B6AD97463E5C69
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A}...............d`.....J`......J`......J`......J`......J`.......`......Nd..........Z....`.......`.......`.......`......Rich............PE..d......d.........." ...".....^......L........................................P.......`....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text............................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):181760
                                                    Entropy (8bit):6.176962076839488
                                                    Encrypted:false
                                                    SSDEEP:3072:jm3K87nKna75PQrBjfFKYG50nzkL+CrXfU+PS7KiSTLkKKYYg4UO:jmb7Ma7KdFKEnOrXf7biSTLLIXUO
                                                    MD5:FDE9A1D6590026A13E81712CD2F23522
                                                    SHA1:CA99A48CAEA0DBACCF4485AFD959581F014277ED
                                                    SHA-256:16ECCC4BAF6CF4AB72ACD53C72A1F2B04D952E07E385E9050A933E78074A7D5B
                                                    SHA-512:A522661F5C3EEEA89A39DF8BBB4D23E6428C337AAC1D231D32B39005EA8810FCE26AF18454586E0E94E51EA4AC0E034C88652C1C09B1ED588AEAC461766981F4
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......._......C...C...C..NC...CI..B...C}. C...CI..B...CI..B...CI..B...C..B...Cz..B...C...C...C..B...C..HC...C..B...C."C...C..B...CRich...C........................PE..d...m.b.........." .........B..............................................0............`..........................................g..l....g..................<............ .......M...............................M..8............................................text...x........................... ..`.rdata..............................@..@.data....\.......0...x..............@....pdata..<...........................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):123664
                                                    Entropy (8bit):6.058417150946148
                                                    Encrypted:false
                                                    SSDEEP:3072:c7u5LnIx1If3yJdqfLI2AYX5BO89IPLPPUxdF:cwxfijqfLI29BO8VF
                                                    MD5:BD36F7D64660D120C6FB98C8F536D369
                                                    SHA1:6829C9CE6091CB2B085EB3D5469337AC4782F927
                                                    SHA-256:EE543453AC1A2B9B52E80DC66207D3767012CA24CE2B44206804767F37443902
                                                    SHA-512:BD15F6D4492DDBC89FCBADBA07FC10AA6698B13030DD301340B5F1B02B74191FAF9B3DCF66B72ECF96084656084B531034EA5CADC1DD333EF64AFB69A1D1FD56
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........G...&...&...&...^...&...Z...&...Z...&...Z...&...Z...&..$Z...&...^...&...^...&..-Z...&...&...&..$Z...&..$Z...&..$Zv..&..$Z...&..Rich.&..........................PE..d...!..d.........." ..."............p\..............................................|o....`.........................................pP.......P.........................../..............T...........................`...@............................................text............................... ..`.rdata...l.......n..................@..@.data...$=...p...8...^..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):253200
                                                    Entropy (8bit):6.559097478184273
                                                    Encrypted:false
                                                    SSDEEP:6144:7t9gXW32tb0yf6CgLp+E4YECs5wxvj9qWM53pLW1Apw9tBg2YAp:7ngXW3wgyCiE4texvGI4Ap
                                                    MD5:65B4AB77D6C6231C145D3E20E7073F51
                                                    SHA1:23D5CE68ED6AA8EAABE3366D2DD04E89D248328E
                                                    SHA-256:93EB9D1859EDCA1C29594491863BF3D72AF70B9A4240E0D9DD171F668F4F8614
                                                    SHA-512:28023446E5AC90E9E618673C879CA46F598A62FBB9E69EF925DB334AD9CB1544916CAF81E2ECDC26B75964DCEDBA4AD4DE1BA2C42FB838D0DF504D963FCF17EE
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nyR.............w.......s.......s.......s.......s.......s.......w.........._....s.......s.......s.......s.......s......Rich............PE..d......d.........." ...".v...<......L...............................................Rn....`..........................................T..P...`T...................&......./......P.......T...........................P...@............................................text....u.......v.................. ..`.rdata..<............z..............@..@.data....*...p...$...R..............@....pdata...&.......(...v..............@..@.rsrc...............................@..@.reloc..P...........................@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):65304
                                                    Entropy (8bit):6.222786912280051
                                                    Encrypted:false
                                                    SSDEEP:1536:6TO+CPN/pV8ETeERZX/fchw/IpBIPOIVQ7SygPx:mClZZow/IpBIPOIVQyx
                                                    MD5:4255C44DC64F11F32C961BF275AAB3A2
                                                    SHA1:C1631B2821A7E8A1783ECFE9A14DB453BE54C30A
                                                    SHA-256:E557873D5AD59FD6BD29D0F801AD0651DBB8D9AC21545DEFE508089E92A15E29
                                                    SHA-512:7D3A306755A123B246F31994CD812E7922943CDBBC9DB5A6E4D3372EA434A635FFD3945B5D2046DE669E7983EF2845BD007A441D09CFE05CF346523C12BDAD52
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........F.u.'.&.'.&.'.&._,&.'.&.[.'.'.&.[.'.'.&.[.'.'.&.[.'.'.&._.'.'.&*[.'.'.&.'.&e'.&*[.'.'.&*[.'.'.&*[@&.'.&*[.'.'.&Rich.'.&........PE..d......d.........." ...".T...~......`?...............................................%....`.............................................P.......................,......../......\...0}..T............................{..@............p..(............................text...uR.......T.................. ..`.rdata...N...p...P...X..............@..@.data...8...........................@....pdata..,...........................@..@.rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):158992
                                                    Entropy (8bit):6.8491146526380025
                                                    Encrypted:false
                                                    SSDEEP:3072:A4lirS97HrdVmEkGCm5hAznf49mNo2NOvJ02pIPZ1wBExN:VlirG0EkTVAYO2NQ3w
                                                    MD5:E5ABC3A72996F8FDE0BCF709E6577D9D
                                                    SHA1:15770BDCD06E171F0B868C803B8CF33A8581EDD3
                                                    SHA-256:1796038480754A680F33A4E37C8B5673CC86C49281A287DC0C5CAE984D0CB4BB
                                                    SHA-512:B347474DC071F2857E1E16965B43DB6518E35915B8168BDEFF1EAD4DFF710A1CC9F04CA0CED23A6DE40D717EEA375EEDB0BF3714DAF35DE6A77F071DB33DFAE6
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*...D,..D,..D,...,..D,..E-..D,..A-..D,..@-..D,..G-..D,M.E-..D,..E-..D,..E,.D,M.I-..D,M.D-..D,M.,..D,M.F-..D,Rich..D,........PE..d...$..d.........." ...".b...........5....................................................`..........................................%..L...\%..x....p.......P.......>.../......8.......T...........................p...@............................................text....a.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):34584
                                                    Entropy (8bit):6.4080285175428715
                                                    Encrypted:false
                                                    SSDEEP:768:aHI6RwgJ5xe3Sc88GnJ8xIPWtpu5YiSyvDIqPxWEu:CIoJ5U3Sc88GJ8xIPWtpE7SyMqPx
                                                    MD5:827439C35A0CEE0DE6421AF039CA7FF9
                                                    SHA1:E7FDC4624C3D4380E527EE6997D4EBDEEC353EEA
                                                    SHA-256:B86E19E57A415AE9D65D4C0A86658DE2D2AD6A97617CB514A105449C9B679D89
                                                    SHA-512:92F2344253ECCF24CAFDA8F5559E2FA4C21D5B0889540139278032491596EC0AC743B18D4074AE12CB15060EDFED14B243A37B23434E7B2F15998FADDA3D15F3
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z*j.4yj.4yj.4yc..yh.4y%.5xh.4y%.1xg.4y%.0xb.4y%.7xi.4y..5xh.4yj.5y3.4y!.5xo.4y..9xh.4y..4xk.4y...yk.4y..6xk.4yRichj.4y........................PE..d......d.........." ...".....<......0...............................................Y.....`.........................................0D..`....D..x....p.......`.......X.../...........4..T...........................p3..@............0...............................text............................... ..`.rdata..^....0... ..."..............@..@.data........P.......B..............@....pdata.......`.......H..............@..@.rsrc........p.......L..............@..@.reloc...............V..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):50968
                                                    Entropy (8bit):6.432736275046285
                                                    Encrypted:false
                                                    SSDEEP:768:gwFMCcP4W1vqJiR5RMWlpX4Ju6r2VIPXtz5YiSyvbPxWEuw:ZFMiJifKJulVIPXt97SyjPx9
                                                    MD5:E5ACEAF21E82253E300C0B78793887A8
                                                    SHA1:C58F78FBBE8713CB00CCDFEB1D8D7359F58EBFDE
                                                    SHA-256:D950342686C959056FF43C9E5127554760FA20669D97166927DD6AAE5494E02A
                                                    SHA-512:517C29928D6623CF3B2BCDCD68551070D2894874893C0D115A0172D749B6FE102AF6261C0FD1B65664F742FA96ABBCE2F8111A72E1A3C2F574B58B909205937F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........){.G(.G(.G(...(.G(..F).G(..B).G(..C).G(..D).G(..F).G(.F(..G(..F).G(..C).G(..J).G(..G).G(..(.G(..E).G(Rich.G(........................PE..d......d.........." ...".B...X............................................................`.........................................0...X................................/......,....f..T...........................Pe..@............`...............................text...^A.......B.................. ..`.rdata..$5...`...6...F..............@..@.data................|..............@....pdata..............................@..@.rsrc...............................@..@.reloc..,...........................@..B........................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):32528
                                                    Entropy (8bit):6.448063770045404
                                                    Encrypted:false
                                                    SSDEEP:384:AuCvO+MZFryl9SDCP6rXv+mkWsniRq9IPQUkHQIYiSy1pCQqIPxh8E9VF0NykOBw:1+yF+6rX2mk599IPQUO5YiSyv3PxWEun
                                                    MD5:F00133F7758627A15F2D98C034CF1657
                                                    SHA1:2F5F54EDA4634052F5BE24C560154AF6647EEE05
                                                    SHA-256:35609869EDC57D806925EC52CCA9BC5A035E30D5F40549647D4DA6D7983F8659
                                                    SHA-512:1C77DD811D2184BEEDF3C553C3F4DA2144B75C6518543F98C630C59CD597FCBF6FD22CFBB0A7B9EA2FDB7983FF69D0D99E8201F4E84A0629BC5733AA09FFC201
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_X..1...1...1.......1...0...1...4...1...5...1...2...1.~.0...1...0...1...0...1.~.<...1.~.1...1.~.....1.~.3...1.Rich..1.........PE..d......d.........." ...".....8......................................................./....`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):79640
                                                    Entropy (8bit):6.290841920161528
                                                    Encrypted:false
                                                    SSDEEP:1536:0JltpedXL+3ujz9/s+S+pzpMoiyivViaE9IPLwj7SyZPx:07tp4i3ujz9/sT+pzqoavVpE9IPLwjHx
                                                    MD5:1EEA9568D6FDEF29B9963783827F5867
                                                    SHA1:A17760365094966220661AD87E57EFE09CD85B84
                                                    SHA-256:74181072392A3727049EA3681FE9E59516373809CED53E08F6DA7C496B76E117
                                                    SHA-512:D9443B70FCDC4D0EA1CB93A88325012D3F99DB88C36393A7DED6D04F590E582F7F1640D8B153FE3C5342FA93802A8374F03F6CD37DD40CDBB5ADE2E07FAD1E09
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......RXY..97..97..97..A...97.YE6..97.YE2..97.YE3..97.YE4..97..E6..97..96..97.]A6..97..E:..97..E7..97..E...97..E5..97.Rich.97.................PE..d... ..d.........." ...".l...........%.......................................P......V.....`.............................................P............0....... ..x......../...@..........T...............................@............................................text...:k.......l.................. ..`.rdata...t.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):161040
                                                    Entropy (8bit):6.029728458381984
                                                    Encrypted:false
                                                    SSDEEP:3072:LMaGbIQQbN9W3PiNGeA66l8rBk3xA87xfCA+nbUtFMsVjTNbEzc+pIPC7ODxd:LMaG0bN96oG1l8YA8ZMSR+E
                                                    MD5:208B0108172E59542260934A2E7CFA85
                                                    SHA1:1D7FFB1B1754B97448EB41E686C0C79194D2AB3A
                                                    SHA-256:5160500474EC95D4F3AF7E467CC70CB37BEC1D12545F0299AAB6D69CEA106C69
                                                    SHA-512:41ABF6DEAB0F6C048967CA6060C337067F9F8125529925971BE86681EC0D3592C72B9CC85DD8BDEE5DD3E4E69E3BB629710D2D641078D5618B4F55B8A60CC69D
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....8..p.......p.......p.......p.......p..N....p...p...q.......p..N....p..N....p..N.T..p..N....p..Rich.p..........................PE..d...'..d.........." ..."............l+..............................................NS....`.............................................d...t........`.......P.......F.../...p..8...0...T...............................@............................................text............................... ..`.rdata..............................@..@.data....j.......f..................@....pdata.......P......."..............@..@.rsrc........`......................@..@.reloc..8....p.......8..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):64280
                                                    Entropy (8bit):6.282551543531983
                                                    Encrypted:false
                                                    SSDEEP:768:yAh9v6FLQ04EmxQ1NX7TX8sd1T81LGAdU1PhQNxkoBIPOSr5YiSyv5PxWE3v:y+yFLXXB7h81CEA5QNpBIPOSV7SyRPx
                                                    MD5:758E6E2776585A3CA2E9551EDC21EDEB
                                                    SHA1:8D2268F1C2E6CF0D705BCF615EA17DC9460DB25C
                                                    SHA-256:F2A69B21C5043D567E79F0A2CEC4747E1D6F9107F3A4D4E381E41E1C37726C1D
                                                    SHA-512:827E68DEAB9357E226C946DC24BB2D36ACB232BC7EFA4EE8F8BB9343F659E2D89045CF57BD4D8CE4B7694A8D98A6D4A01F1894ACB5D0C4DAF7D8C9A912B74213
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................Y............................~....................d..~.....~.....~.5....~.....Rich...........................PE..d......d.........." ...".h...f............................................................`.............................................P.............................../......$......T...............................@............................................text...[f.......h.................. ..`.rdata...@.......B...l..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..$...........................@..B........................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):25360
                                                    Entropy (8bit):6.6307231018245325
                                                    Encrypted:false
                                                    SSDEEP:384:SR9ZfwFpEWE6ivQpIPZwGjHQIYiSy1pCQKzmPxh8E9VF0NyptVQcM:SRvqpEM4QpIPZw65YiSyvamPxWE3PS
                                                    MD5:46E9D7B5D9668C9DB5CAA48782CA71BA
                                                    SHA1:6BBC83A542053991B57F431DD377940418848131
                                                    SHA-256:F6063622C0A0A34468679413D1B18D1F3BE67E747696AB972361FAED4B8D6735
                                                    SHA-512:C5B171EBDB51B1755281C3180B30E88796DB8AA96073489613DAB96B6959A205846711187266A0BA30782102CE14FBFA4D9F413A2C018494597600482329EBF7
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h%p..K#..K#..K#.q.#..K#.uJ"..K#.uN"..K#.uO"..K#.uH"..K#.uJ"..K#.qJ"..K#..J#..K#.uC"..K#.uK"..K#.u.#..K#.uI"..K#Rich..K#................PE..d......d.........." ...".....&...... ........................................p.......p....`.........................................`)..L....)..x....P.......@.......4.../...`..@...`#..T........................... "..@............ ..8............................text...h........................... ..`.rdata....... ......................@..@.data........0.......$..............@....pdata.......@.......&..............@..@.rsrc........P.......(..............@..@.reloc..@....`.......2..............@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):15880
                                                    Entropy (8bit):6.447776302900069
                                                    Encrypted:false
                                                    SSDEEP:192:nM0wd8dc9cydWYhW2U/3XjDBQABJTHR/HsgKqnajVcBFN:M0wd8xydWYhW2mXjDBRJTH1MgKlxaFN
                                                    MD5:F1966E566459389D610B3773C3E065F1
                                                    SHA1:E123168541D78E792D8CDBAA6B473F28C1064954
                                                    SHA-256:DB128A378C682A0ACD5FB4D074B45FAD33AB57E70637F3EFF917562D8100923A
                                                    SHA-512:A0D2F959CD28B48791D60BF7488AA26231439C83DFC9E474F17144963BC57F143FD3E0F1904B63948334D3A83B9A5BDD3B2DAD81F2E6584303C1C9BFAA9A9C78
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...x............." .........................................................@............`.........................................0................0..................."..............T............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):13840
                                                    Entropy (8bit):6.6621084025322785
                                                    Encrypted:false
                                                    SSDEEP:192:jGnWlC0i5ClWYhWvlU/3XjDBQABJkCEAzNXO0vqnajVAiyODewc:qnWm5ClWYhWdmXjDBRJYY1lxwMm
                                                    MD5:25586E8F953667BBBB2A7F2E25949808
                                                    SHA1:9597DC051C9EF3C234D03C5856402964E8E36110
                                                    SHA-256:C6FF48E6EDB727FCA3971DB306E617462A4D692CBBBE2693D447F072720ECEE6
                                                    SHA-512:AF607633CBDEBAD127AD804B4C54957E74102D0F4FDE2F3229E163FDA7EFD9BFB923E812D25CDAC13332FD7F6584830BE8CFAAB4C84CCD78E5642A014E5A8B93
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...r..x.........." .........................................................0...........`.........................................0................ ..................."..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):12816
                                                    Entropy (8bit):6.590202979931445
                                                    Encrypted:false
                                                    SSDEEP:192:Xa9aY17aFBRAWYhWvNU/3XjDBQABJVQLa/A2u4V8gqnajV2OHQ:Xad9WYhWlmXjDBRJVQLoAJglxn
                                                    MD5:08F8E94021B233848DBC1624CB17BB7A
                                                    SHA1:8BDE9C791550226A6E139D86279D22D12054437B
                                                    SHA-256:7ECBC9B895AD5A70CCC45E85D3EE401AE0517B71040354351B63D00814D5428A
                                                    SHA-512:C8ED343189F6F0FBF89B060FF62053BBD17540D4AA7358B355448C57F6D18F988673806C3E4D103C47A9B09CBAAF0829EFC1C6D779F5B563E9BA326C5413B7F5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...h{............" .........................................................0......@I....`.........................................0................ ..................."..............T............................................................................rdata..F...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):12304
                                                    Entropy (8bit):6.701794840167942
                                                    Encrypted:false
                                                    SSDEEP:192:zWYhWvxU/3XjDBQABJPVgfR/HsgKqnajVcB5:zWYhWZmXjDBRJ6f1MgKlxa5
                                                    MD5:54A1DED1160D8E7A02307B63C191E42E
                                                    SHA1:BE3DE75C0FCC802D2CFCB759288313ABCFFD2EB9
                                                    SHA-256:ACC5C813E40E55C5C242057AB15F3D9049850D7345D8509F7044BC905DD3AA3A
                                                    SHA-512:41A1ED1393857B38137CCC91C5519DBF2D054826515F321F2CBB86A21D7086AD5098FE6A2DA9173F32B8D7FCC41A893C742DA0FDA99F8BA179254CD2097C59A0
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...+P............" .........................................................0......".....`.........................................0...e............ ..................."..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):21008
                                                    Entropy (8bit):6.217693406276633
                                                    Encrypted:false
                                                    SSDEEP:384:rJI2M4Oe59Ckb1hgmLhWYhW0mXjDBRJEbw1MgKlxaA:ri2Mq59Bb1jN4Xj1PEjg
                                                    MD5:B3937AE7171B6B3D02166BFA9CD6CA9E
                                                    SHA1:949C7DFFEB2A0957F741AF5CADE887D8FA0B89EB
                                                    SHA-256:84B21FD1737B7D8953E22BD4DF29CD933E3FC0A07D134598BF062F7ECF984AEB
                                                    SHA-512:00EFD098585546C25B4F8489673B8707E411FEB1CA0936F4FFB9FFBFDF160218EEF8E6870EA85CDB659C2FC243A473C28C7BD9B9D708163181BC9EB85EC416BC
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...IV............" .........,...............................................P.......d....`.........................................0....%...........@...............0..."..............T............................................................................rdata...&.......(..................@..@.rsrc........@.......,..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):16400
                                                    Entropy (8bit):6.462937749825311
                                                    Encrypted:false
                                                    SSDEEP:192:8eaajPrpJhhf4AN5/KixWYhWvr9U/3XjDBQABJffXafZvqnajVWhX/h6onUK:Dlbr7nWYhWD9mXjDBRJXaxlxWp/hJUK
                                                    MD5:AFD2D84FB1CDD0C03EE2888CE4FADAFC
                                                    SHA1:C2EBE9EDE75C0956F7D8431B0EA345672132A2D3
                                                    SHA-256:26CE526A30CEB11AAD52B71AA4F3EA65AFE2FD6987AB517B7E86823687BE6D2C
                                                    SHA-512:DEA9F4737881C4CE5591EBE9875E0981DC360DF56505D8CD9204FB15C08FC84C1B634957540A22B11C222A11F1C99A2B401DA50E55C8964C91262B186C030410
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...9..b.........." .........................................................@......./....`.........................................0...4............0..................."..............T............................................................................rdata..d...........................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):17936
                                                    Entropy (8bit):6.404137552120944
                                                    Encrypted:false
                                                    SSDEEP:384:z19OFVhTWYhWSmXjDBRJ8lJl0huHnPRoI:Z9OByXj1P8ShUPi
                                                    MD5:2D7B04CD3E93F0C32BC999A8DD06CA31
                                                    SHA1:2046473BFD777C1780E2FE51C840CA59CDCA8B8C
                                                    SHA-256:B8A352807A073F0D676C862812EB768744130C1553970FE1A32EEBFF9B55AE28
                                                    SHA-512:8A1C85504328F9F65A828D13F932BD6C7DB45736029F123C4E624FB77FEE8C7CEE4404224AC915C2F3B0BCEE0822BE5295B1DAAA290C269CC4008F4F31C2B862
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d.....v..........." ......... ...............................................@............`.........................................0...a............0...............$..."..............T............................................................................rdata..............................@..@.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):18472
                                                    Entropy (8bit):6.286011465843997
                                                    Encrypted:false
                                                    SSDEEP:384:+FvU4x0C5yguNvZ5VQgx3SbwA7yMVIkFGl/WYhWzmXjDBRJQP2ZlxS:y5yguNvZ5VQgx3SbwA71IkFwjXj1PP
                                                    MD5:5C1ECCF8F088C294E4FF4ADA4E559567
                                                    SHA1:BB8FC158E23445BC0DEF4BCBD4F9A622B340BB6E
                                                    SHA-256:F632698BBA686C32D5DE71D42EF2080D793B52C7A2EC409C8440D0AAA315E9AC
                                                    SHA-512:02CB60E4B843C4622D410ECFE48285B983A1C750242A6E894EC6556FDC35C5076437F176E7D4DADF5BBA819CE892B426F2717503C2A09B7DC1DC5FF6D3D830CC
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d......e.........." ........."...............................................@............`.........................................0................0...............&..("..............T............................................................................rdata..............................@..@.rsrc........0......."..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14352
                                                    Entropy (8bit):6.55464433278048
                                                    Encrypted:false
                                                    SSDEEP:192:Xy5NDSWYhWvVKU/3XjDBQABJjxOMAus/qnajVMWdjdY8:XU0WYhWtKmXjDBRJlOa0lxBjL
                                                    MD5:437B1F0308340DB8C5D0D7F3C72706D7
                                                    SHA1:C341A5D909855E08AC56FBFC627C61E941F7F7E7
                                                    SHA-256:77F3C912052578780F06D6F63CD3FEEC925F9C20C5F0218DAC9E9C0950644614
                                                    SHA-512:F622C662AA90D1F3C3A5CB316385B17DABE8AC201BBA07D8DA3B8DF8D96FD298ED39B651B4EBA1C116AD9C1C26B17A2DD32400B256DC30B5B3BCDB1D7D87FC89
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................." .........................................................0...........`.........................................0................ ..................."..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):12304
                                                    Entropy (8bit):6.694323930940949
                                                    Encrypted:false
                                                    SSDEEP:192:ZI6fHQduPWYhWvCU/3XjDBQABJaRkvzSEqnajVJMMu7lS1:Tf5WYhWKmXjDBRJa2zlxi7l6
                                                    MD5:6C82E6BDC1D0D0746803FADAA0C5FB7C
                                                    SHA1:88211EB2B86D17D343F4AEE7B338882258DE7E5F
                                                    SHA-256:C41EC07B44ED1CA5B4E2A32E31D7D4EA8C31F419F9D6C5795C246D9DCEE35A02
                                                    SHA-512:864ECC4856F235957EA44D84A5A71ACC1E48DF1575A606DC0150A10EFBF889FD312783C1C3E9466D715BE2A09E0DD6197E48197CBD5B82CD7D9E57BE10410995
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d.....t..........." .........................................................0............`.........................................0...^............ ..................."..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                    Category:dropped
                                                    Size (bytes):1438373
                                                    Entropy (8bit):5.591099413816708
                                                    Encrypted:false
                                                    SSDEEP:24576:mQR5pATuFRm4lUKdcubgAnyfbmG0iwhwdYfdP4s/HHK:mQR5p7RmyIH
                                                    MD5:C00E921C81BF4DF06689F6136E925E8F
                                                    SHA1:37D23B19C2B09EF52D7633EA007E9E43C6D6DE55
                                                    SHA-256:F54FED64F6E9ABAF56A8805FE04E0F6A139A7B32C778633369328EBF8209B277
                                                    SHA-512:16892206D62EA9338BDDBED53EB34989B2C1986BA25704274D8B6A8B023F33331DAE49CB14EEEAC834C990721EA3C692F34374AF645D3CED36AD13ADD7A8BAC1
                                                    Malicious:false
                                                    Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):292541
                                                    Entropy (8bit):6.048162209044241
                                                    Encrypted:false
                                                    SSDEEP:6144:QW1x/M8fRR1jplkXURrVADwYCuCigT/Q5MSRqNb7d8iu5NF:QWb/TRJLWURrI55MWavdF0D
                                                    MD5:D3E74C9D33719C8AB162BAA4AE743B27
                                                    SHA1:EE32F2CCD4BC56CA68441A02BF33E32DC6205C2B
                                                    SHA-256:7A347CA8FEF6E29F82B6E4785355A6635C17FA755E0940F65F15AA8FC7BD7F92
                                                    SHA-512:E0FB35D6901A6DEBBF48A0655E2AA1040700EB5166E732AE2617E89EF5E6869E8DDD5C7875FA83F31D447D4ABC3DB14BFFD29600C9AF725D9B03F03363469B4C
                                                    Malicious:false
                                                    Preview:.# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Label: "GlobalSign Root CA".# Serial: 4835703278459707669005204.# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a.# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c.# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG.A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv.b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw.MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i.YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT.aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ.jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp.xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):10752
                                                    Entropy (8bit):4.673454313041419
                                                    Encrypted:false
                                                    SSDEEP:96:KG+p72HzA5iJGhU2Y0hQMsQJCUCLsZEA4elh3XQMtCFliHUWQcX6g8cim1qeSju1:A2HzzU2bRYoeLHkcqgvimoe
                                                    MD5:723EC2E1404AE1047C3EF860B9840C29
                                                    SHA1:8FC869B92863FB6D2758019DD01EDBEF2A9A100A
                                                    SHA-256:790A11AA270523C2EFA6021CE4F994C3C5A67E8EAAAF02074D5308420B68BD94
                                                    SHA-512:2E323AE5B816ADDE7AAA14398F1FDB3EFE15A19DF3735A604A7DB6CADC22B753046EAB242E0F1FBCD3310A8FBB59FF49865827D242BAF21F44FD994C3AC9A878
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..............................M....................................... ...?.......?.......?.a.....?.......Rich............................PE..d...siAe.........." ...%.....................................................p............`..........................................'..p...`(..d....P.......@...............`..,...`#.............................. "..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...8....0......."..............@....pdata.......@.......$..............@..@.rsrc........P.......&..............@..@.reloc..,....`.......(..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):119296
                                                    Entropy (8bit):5.872097486056729
                                                    Encrypted:false
                                                    SSDEEP:1536:OzgMw0g+m/+rxC9Jtd960WsCyqPD1/bZMlDML48Be9zGTVmZRJIRbvB:OsTH+VC9Jtd9VdCr7fMp/8yGTVmzmZ
                                                    MD5:9EA8098D31ADB0F9D928759BDCA39819
                                                    SHA1:E309C85C1C8E6CE049EEA1F39BEE654B9F98D7C5
                                                    SHA-256:3D9893AA79EFD13D81FCD614E9EF5FB6AAD90569BEEDED5112DE5ED5AC3CF753
                                                    SHA-512:86AF770F61C94DFBF074BCC4B11932BBA2511CAA83C223780112BDA4FFB7986270DC2649D4D3EA78614DBCE6F7468C8983A34966FC3F2DE53055AC6B5059A707
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........C..r...r...r......r...s...r...s...r...w...r...v..r...q...r.#.s...r...s...r..8z...r..8r...r..8....r..8p...r.Rich..r.........................PE..d...siAe.........." ...%.*..........0........................................ ............`.........................................p...d..........................................Px...............................w..@............@...............................text...X).......*.................. ..`.rdata...X...@...Z..................@..@.data...8=.......0..................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):4
                                                    Entropy (8bit):1.5
                                                    Encrypted:false
                                                    SSDEEP:3:Mn:M
                                                    MD5:365C9BFEB7D89244F2CE01C1DE44CB85
                                                    SHA1:D7A03141D5D6B1E88B6B59EF08B6681DF212C599
                                                    SHA-256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508
                                                    SHA-512:D220D322A4053D84130567D626A9F7BB2FB8F0B854DA1621F001826DC61B0ED6D3F91793627E6F0AC2AC27AEA2B986B6A7A63427F05FE004D8A2ADFBDADC13C1
                                                    Malicious:false
                                                    Preview:pip.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):197
                                                    Entropy (8bit):4.61968998873571
                                                    Encrypted:false
                                                    SSDEEP:3:hWDncJhByZmJgXPForADu1QjygQuaAJygT2d5GeWreLRuOFEXAYeBKmJozlMHuO:h9Co8FyQjkDYc5tWreLBF/pn2mH1
                                                    MD5:8C3617DB4FB6FAE01F1D253AB91511E4
                                                    SHA1:E442040C26CD76D1B946822CAF29011A51F75D6D
                                                    SHA-256:3E0C7C091A948B82533BA98FD7CBB40432D6F1A9ACBF85F5922D2F99A93AE6BB
                                                    SHA-512:77A1919E380730BCCE5B55D76FBFFBA2F95874254FAD955BD2FE1DE7FC0E4E25B5FDAAB0FEFFD6F230FA5DC895F593CF8BFEDF8FDC113EFBD8E22FADAB0B8998
                                                    Malicious:false
                                                    Preview:This software is made available under the terms of *either* of the licenses.found in LICENSE.APACHE or LICENSE.BSD. Contributions to cryptography are made.under the terms of *both* these licenses..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):11360
                                                    Entropy (8bit):4.426756947907149
                                                    Encrypted:false
                                                    SSDEEP:192:nUDG5KXSD9VYUKhu1JVF9hFGvV/QiGkS594drFjuHYx5dvTrLh3kTSEnQHbHR:UIvlKM1zJlFvmNz5VrlkTS0QHt
                                                    MD5:4E168CCE331E5C827D4C2B68A6200E1B
                                                    SHA1:DE33EAD2BEE64352544CE0AA9E410C0C44FDF7D9
                                                    SHA-256:AAC73B3148F6D1D7111DBCA32099F68D26C644C6813AE1E4F05F6579AA2663FE
                                                    SHA-512:F451048E81A49FBFA11B49DE16FF46C52A8E3042D1BCC3A50AAF7712B097BED9AE9AED9149C21476C2A1E12F1583D4810A6D36569E993FE1AD3879942E5B0D52
                                                    Malicious:false
                                                    Preview:. Apache License. Version 2.0, January 2004. https://www.apache.org/licenses/.. TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. 1. Definitions... "License" shall mean the terms and conditions for use, reproduction,. and distribution as defined by Sections 1 through 9 of this document... "Licensor" shall mean the copyright owner or entity authorized by. the copyright owner that is granting the License... "Legal Entity" shall mean the union of the acting entity and all. other entities that control, are controlled by, or are under common. control with that entity. For the purposes of this definition,. "control" means (i) the power, direct or indirect, to cause the. direction or management of such entity, whether by contract or. otherwise, or (ii) ownership of fifty percent (50%) or more of the. outstanding shares, or (iii) beneficial ow
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):1532
                                                    Entropy (8bit):5.058591167088024
                                                    Encrypted:false
                                                    SSDEEP:24:MjUnoorbOFFTJJyRrYFTjzMbmqEvBTP4m96432s4EOkUTKQROJ32s3yxsITf+3tY:MkOFJSrYJsaN5P406432svv32s3EsIqm
                                                    MD5:5AE30BA4123BC4F2FA49AA0B0DCE887B
                                                    SHA1:EA5B412C09F3B29BA1D81A61B878C5C16FFE69D8
                                                    SHA-256:602C4C7482DE6479DD2E9793CDA275E5E63D773DACD1ECA689232AB7008FB4FB
                                                    SHA-512:DDBB20C80ADBC8F4118C10D3E116A5CD6536F72077C5916D87258E155BE561B89EB45C6341A1E856EC308B49A4CB4DBA1408EABD6A781FBE18D6C71C32B72C41
                                                    Malicious:false
                                                    Preview:Copyright (c) Individual contributors..All rights reserved...Redistribution and use in source and binary forms, with or without.modification, are permitted provided that the following conditions are met:.. 1. Redistributions of source code must retain the above copyright notice,. this list of conditions and the following disclaimer... 2. Redistributions in binary form must reproduce the above copyright. notice, this list of conditions and the following disclaimer in the. documentation and/or other materials provided with the distribution... 3. Neither the name of PyCA Cryptography nor the names of its contributors. may be used to endorse or promote products derived from this software. without specific prior written permission...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5308
                                                    Entropy (8bit):5.12808207864762
                                                    Encrypted:false
                                                    SSDEEP:96:DxEpqZink/QIHQIyzQIZQILuQIR8vtklGovxNx6FWHCbCcbGLrrg9BMMzVEQDjye:+JnkoBs/sqL+4TcbGLrrUiMzVEQDjyeh
                                                    MD5:4E5169613D93EC27EE0B3A0E80DB6640
                                                    SHA1:7D721C24EAD56B9CD623ED9B5E0811DE9A71B85B
                                                    SHA-256:855ED42CAAB9FBDCC6A95C098A02BC58C9035757D40129A9B715D8F7F4189624
                                                    SHA-512:14179FCA4596CBDF4201ED38E8C0866BCC67F334B880D2F0A447B283A7B7FB61F7FB75B0FDE98DD6918FF6C578FDC61654302595503062900EBBBD7CC98392F7
                                                    Malicious:false
                                                    Preview:Metadata-Version: 2.1..Name: cryptography..Version: 41.0.1..Summary: cryptography is a package which provides cryptographic recipes and primitives to Python developers...Author-email: The Python Cryptographic Authority and individual contributors <cryptography-dev@python.org>..License: Apache-2.0 OR BSD-3-Clause..Project-URL: homepage, https://github.com/pyca/cryptography..Project-URL: documentation, https://cryptography.io/..Project-URL: source, https://github.com/pyca/cryptography/..Project-URL: issues, https://github.com/pyca/cryptography/issues..Project-URL: changelog, https://cryptography.io/en/latest/changelog/..Classifier: Development Status :: 5 - Production/Stable..Classifier: Intended Audience :: Developers..Classifier: License :: OSI Approved :: Apache Software License..Classifier: License :: OSI Approved :: BSD License..Classifier: Natural Language :: English..Classifier: Operating System :: MacOS :: MacOS X..Classifier: Operating System :: POSIX..Classifier: Operating Syst
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:CSV text
                                                    Category:dropped
                                                    Size (bytes):15334
                                                    Entropy (8bit):5.553391343578044
                                                    Encrypted:false
                                                    SSDEEP:384:1XWU/ZfaigkeVJN5Z6FGotqw+x6uvnvLEC:1GUxfzpctZEC
                                                    MD5:C832BA86546E10199BF69A196AD3F880
                                                    SHA1:57E2627BBACF3B4AFC49103F4A6EDABE5928D37C
                                                    SHA-256:CB03DEE59AFDDA5668CBFAE5E8E9F1CAECA898E7C898B95CDD11CE5BB975298F
                                                    SHA-512:E6DE00FE86B5441FE48CD37E6F6B7A9EBC61FEAA597258552C3116E269D7EA20EA4E0209271951E7700B8357B9ED2112905E1337F74A0D00CA9E40A7D961179A
                                                    Malicious:false
                                                    Preview:cryptography-41.0.1.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4..cryptography-41.0.1.dist-info/LICENSE,sha256=Pgx8CRqUi4JTO6mP18u0BDLW8amsv4X1ki0vmak65rs,197..cryptography-41.0.1.dist-info/LICENSE.APACHE,sha256=qsc7MUj20dcRHbyjIJn2jSbGRMaBOuHk8F9leaomY_4,11360..cryptography-41.0.1.dist-info/LICENSE.BSD,sha256=YCxMdILeZHndLpeTzaJ15eY9dz2s0eymiSMqtwCPtPs,1532..cryptography-41.0.1.dist-info/METADATA,sha256=hV7ULKq5-9zGqVwJigK8WMkDV1fUASmptxXY9_QYliQ,5308..cryptography-41.0.1.dist-info/RECORD,,..cryptography-41.0.1.dist-info/REQUESTED,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0..cryptography-41.0.1.dist-info/WHEEL,sha256=AF8zPkSkcAhmODpLt1et9zmyR4I9Cg-zXEqffJFVfzk,100..cryptography-41.0.1.dist-info/top_level.txt,sha256=KNaT-Sn2K4uxNaEbe6mYdDn3qWDMlp4y-MtWfB73nJc,13..cryptography/__about__.py,sha256=X4SPKBQ74QTjSR70oBCtcO9O5AR7x7Wa_9nHGNUbL2I,445..cryptography/__init__.py,sha256=iVPlBlXWTJyiFeRedxcbMPhyHB34viOM10d72vGnWuE,364..cryptography/__pycache__/_
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):100
                                                    Entropy (8bit):4.987885415836538
                                                    Encrypted:false
                                                    SSDEEP:3:RtEeX7MWcSlVlhVMSgP+tkKc/SKQLn:RtBMwlVSZWKxDQLn
                                                    MD5:C20F485EC06558EB04B2EDCE8362FD4F
                                                    SHA1:D621F40B4522E88FD3E56EBEAA6332C7BDF40BED
                                                    SHA-256:005F333E44A4700866383A4BB757ADF739B247823D0A0FB35C4A9F7C91557F39
                                                    SHA-512:C701255A1793C5478F8B8FF7CBD86ADB4FE2320808C6A395461459B422D159312472519F01F337FD2801271D9732DB19F9F18E8BD4D0541C0F38387AF4A87F52
                                                    Malicious:false
                                                    Preview:Wheel-Version: 1.0.Generator: bdist_wheel (0.40.0).Root-Is-Purelib: false.Tag: cp37-abi3-win_amd64..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):13
                                                    Entropy (8bit):3.2389012566026314
                                                    Encrypted:false
                                                    SSDEEP:3:cOv:Nv
                                                    MD5:E7274BD06FF93210298E7117D11EA631
                                                    SHA1:7132C9EC1FD99924D658CC672F3AFE98AFEFAB8A
                                                    SHA-256:28D693F929F62B8BB135A11B7BA9987439F7A960CC969E32F8CB567C1EF79C97
                                                    SHA-512:AA6021C4E60A6382630BEBC1E16944F9B312359D645FC61219E9A3F19D876FD600E07DCA6932DCD7A1E15BFDEAC7DBDCEB9FFFCD5CA0E5377B82268ED19DE225
                                                    Malicious:false
                                                    Preview:cryptography.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):6596608
                                                    Entropy (8bit):6.572382884941062
                                                    Encrypted:false
                                                    SSDEEP:49152:TV69yYmQRuPHIVhUXSaA0e1WHP5HKQLIU6i4GtlqXVwASOzwMMBLkaLUhSDRiSBb:jk+LvlXl1Y+cy3u4d8QAPDOZ2m43
                                                    MD5:C43B06FF74532D3F019EC49B305B6691
                                                    SHA1:536DBD74295E2DE0FAB50AE763D32E04E8DEE4E4
                                                    SHA-256:66B292E36FDB53A3B827BB23959551D4772942DF2B300E99E719DE29144164F1
                                                    SHA-512:1F6AF3F6ABC231221C2DC708A6A838B5DBEC5EE8E7E5BEDD473CA2EB768C98783BAE5660FD064C115873AEDC0D5F55657B60498119A36710243D40C6C86DC37A
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......]\..=...=...=...E...=..A...=..A...=..A...=..A...=...A...=...H...=..RE...=...=...<...A..<>...@...=...=..=...@...=...@...=..Rich.=..........................PE..d...|.xd.........." ...#..L..@......0.L.......................................d...........`.........................................0._.p....._.h............0a.............. d.D...P.Z.T.....................Z.(.....Z.@.............L..............................text.....L.......L................. ..`.rdata..Dh....L..j....L.............@..@.data.........`......._.............@....pdata.......0a.......`.............@..@.reloc..D.... d.......c.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3445016
                                                    Entropy (8bit):6.099467326309974
                                                    Encrypted:false
                                                    SSDEEP:98304:+/+YgEQaGDoWS04ki7x+QRsZ51CPwDv3uFfJx:MLgEXGUZ37x+VZ51CPwDv3uFfJx
                                                    MD5:E94733523BCD9A1FB6AC47E10A267287
                                                    SHA1:94033B405386D04C75FFE6A424B9814B75C608AC
                                                    SHA-256:F20EB4EFD8647B5273FDAAFCEB8CCB2B8BA5329665878E01986CBFC1E6832C44
                                                    SHA-512:07DD0EB86498497E693DA0F9DD08DE5B7B09052A2D6754CFBC2AA260E7F56790E6C0A968875F7803CB735609B1E9B9C91A91B84913059C561BFFED5AB2CBB29F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........).h.z.h.z.h.z..Oz.h.z...{.h.z...{.h.z...{.h.z...{.h.z.h.zjh.z...{.h.z=..{.h.z=..{.j.z=..{.h.z=.#z.h.z=..{.h.zRich.h.z........................PE..d.....wd.........." ..."..$...................................................5......o5...`..........................................y/..h...J4.@.....4.|....p2......b4../....4..O..P.,.8.............................,.@............@4..............................text...$.$.......$................. ..`.rdata........$.......$.............@..@.data...!z....1..,....1.............@....pdata..h....p2.......1.............@..@.idata..^#...@4..$....3.............@..@.00cfg..u....p4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):39696
                                                    Entropy (8bit):6.641880464695502
                                                    Encrypted:false
                                                    SSDEEP:768:NiQfxQemQJNrPN+moyijAc5YiSyvkIPxWEqG:dfxIQvPkmoyijP7SytPxF
                                                    MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
                                                    SHA1:C7300975DF267B1D6ADCBAC0AC93FD7B1AB49BD2
                                                    SHA-256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
                                                    SHA-512:6E1B223462DC124279BFCA74FD2C66FE18B368FFBCA540C84E82E0F5BCBEA0E10CC243975574FA95ACE437B9D8B03A446ED5EE0C9B1B094147CEFAF704DFE978
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".H...(.......L...............................................n....`......................................... l.......p..P...............P....l.../......,...@d...............................c..@............`.. ............................text....G.......H.................. ..`.rdata..h....`.......L..............@..@.data................b..............@....pdata..P............d..............@..@.reloc..,............j..............@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):704792
                                                    Entropy (8bit):5.55753143710539
                                                    Encrypted:false
                                                    SSDEEP:12288:ihO7/rNKmrouK/POt6h+7ToRLgo479dQwwLOpWW/dQ0T9qwfU2lvzA:iis/POtrzbLp5dQ0T9qcU2lvzA
                                                    MD5:25BDE25D332383D1228B2E66A4CB9F3E
                                                    SHA1:CD5B9C3DD6AAB470D445E3956708A324E93A9160
                                                    SHA-256:C8F7237E7040A73C2BEA567ACC9CEC373AADD48654AAAC6122416E160F08CA13
                                                    SHA-512:CA2F2139BB456799C9F98EF8D89FD7C09D1972FA5DD8FC01B14B7AF00BF8D2C2175FB2C0C41E49A6DAF540E67943AAD338E33C1556FD6040EF06E0F25BFA88FA
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........q...q...q.....q..p...q..p...q..t...q..u...q..r...q.[.p...q...p.u.q.[.u...q.[.q...q.[.....q.[.s...q.Rich..q.........................PE..d.....wd.........." ...".D...T......<.....................................................`..........................................A...N..@U..........s........N......./......h.......8...............................@............@..@............................text....B.......D.................. ..`.rdata.../...`...0...H..............@..@.data...AM.......D...x..............@....pdata...V.......X..................@..@.idata..%W...@...X..................@..@.00cfg..u............l..............@..@.rsrc...s............n..............@..@.reloc..q............v..............@..B................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):630784
                                                    Entropy (8bit):6.206767996286342
                                                    Encrypted:false
                                                    SSDEEP:12288:lDnvPpHdWdLctjdcg7fUoP5GO8C4nEocI:lD3Ictjdcg7fUoP5GO8HnZ
                                                    MD5:8FF8F968705E506C95DFF55EBBED7946
                                                    SHA1:BD2CA6929349D4870D26BA82654E5E778D1E87EE
                                                    SHA-256:E83B79B56D868AC6C117D4BA4B9A9EC76897CE1D086FE701129EDB0F0F8022F4
                                                    SHA-512:9067D819C29B259549E4E5E90AAE52A4AE60C6D280C8540D9FE62552565206267BF6703E716B4FC9468AD048E9403681859E9BE55BC053D685FE3EAB2D464DBD
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..................".............h..0.........\e.............................................. .........................................].... ...4...........@...#.......................................... ...(...................p+...............................text...............................`.P`.data....E... ...F..................@.`..rdata.......p.......N..............@.`@.pdata...#...@...$..................@.0@.xdata...&...p...(...8..............@.0@.bss.....f............................`..edata..]............`..............@.0@.idata...4... ...6...b..............@.0..CRT....X....`......................@.@..tls.........p......................@.@..reloc..............................@.0B........................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):199448
                                                    Entropy (8bit):6.377510350928234
                                                    Encrypted:false
                                                    SSDEEP:3072:OA1YT2Ga6xWK+RohrRoi9+IC08K9YSMJiCNi+GVwlijAOBgC4i9IPLhhHx:v1YOyGohNoEC08K9oJ5GWl7Fi
                                                    MD5:9C21A5540FC572F75901820CF97245EC
                                                    SHA1:09296F032A50DE7B398018F28EE8086DA915AEBD
                                                    SHA-256:2FF8CD82E7CC255E219E7734498D2DEA0C65A5AB29DC8581240D40EB81246045
                                                    SHA-512:4217268DB87EEC2F0A14B5881EDB3FDB8EFE7EA27D6DCBEE7602CA4997416C1130420F11167DAC7E781553F3611409FA37650B7C2B2D09F19DC190B17B410BA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........T..5.5.5.Mu..5..I.5..I.5..I.5..I.5..I.5..M.5.5..5..I.5..I.5..I...5..I.5.Rich.5.................PE..d......d.........." ..."............0........................................ .......=....`.............................................P................................/..........`3..T........................... 2..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...@!..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):67352
                                                    Entropy (8bit):6.146621901948148
                                                    Encrypted:false
                                                    SSDEEP:768:rw/EsYpkVgBaz57kcDA7QKFmpz7cnzH/ks/KF61xubwmB1Cf//yhC74JFmpktJSy:8/5k8cnzeJf9IPL037SyG3Px
                                                    MD5:B711598FC3ED0FE4CF2C7F3E0877979E
                                                    SHA1:299C799E5D697834AA2447D8A313588AB5C5E433
                                                    SHA-256:520169AA6CF49D7EE724D1178DE1BE0E809E4BDCF671E06F3D422A0DD5FD294A
                                                    SHA-512:B3D59EFF5E38CEF651C9603971BDE77BE7231EA8B7BDB444259390A8A9E452E107A0B6CB9CC93E37FD3B40AFB2BA9E67217D648BFCA52F7CDC4B60C7493B6B84
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%{..a.e.a.e.a.e..fm.`.e..fe.`.e..f..`.e..fg.`.e.Richa.e.........................PE..d......d.........." ...".................................................................`.........................................`...P................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):5762840
                                                    Entropy (8bit):6.089392282930885
                                                    Encrypted:false
                                                    SSDEEP:49152:73djosVvASxQKADxYBVD0NErnKqroleDkcWE/Q3pPITbwVFZL7VgVr42I1vJHH++:73ZOKRtlrJ7wfGrs1BHeM+2PocL2
                                                    MD5:5A5DD7CAD8028097842B0AFEF45BFBCF
                                                    SHA1:E247A2E460687C607253949C52AE2801FF35DC4A
                                                    SHA-256:A811C7516F531F1515D10743AE78004DD627EBA0DC2D3BC0D2E033B2722043CE
                                                    SHA-512:E6268E4FAD2CE3EF16B68298A57498E16F0262BF3531539AD013A66F72DF471569F94C6FCC48154B7C3049A3AD15CBFCBB6345DACB4F4ED7D528C74D589C9858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.D.5.*.5.*.5.*.z.+.7.*.z...;.*.z./.9.*.z...=.*.z.).1.*.<../.*.~.+.>.*.5.+.P.*...'..*...*.4.*.....4.*...(.4.*.Rich5.*.........................PE..d......d.........." ...".X%..47.....\H........................................\.......X...`...........................................@......WA......p[.......V.d0....W../....[..C....).T.............................).@............p%..............................text...rV%......X%................. ..`.rdata.......p%......\%.............@..@.data.........A..L...hA.............@....pdata..d0....V..2....Q.............@..@PyRuntim......X.......S.............@....rsrc........p[......rV.............@..@.reloc...C....[..D...|V.............@..B........................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):134656
                                                    Entropy (8bit):5.995319660651805
                                                    Encrypted:false
                                                    SSDEEP:3072:luJ2G0a2fYrFceQaVK756Y/r06trRjEKQze7KN9eJKVKG6j1J:luJ2faiYrFceQaVfY/rx1eze7KbewVrk
                                                    MD5:90B786DC6795D8AD0870E290349B5B52
                                                    SHA1:592C54E67CF5D2D884339E7A8D7A21E003E6482F
                                                    SHA-256:89F2A5C6BE1E70B3D895318FDD618506B8C0E9A63B6A1A4055DFF4ABDC89F18A
                                                    SHA-512:C6E1DBF25D260C723A26C88EC027D40D47F5E28FC9EB2DBC72A88813A1D05C7F75616B31836B68B87DF45C65EEF6F3EAED2A9F9767F9E2F12C45F672C2116E72
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.$g..wg..wg..wn.[wk..w5..vc..w..5wf..w5..vs..w5..vo..w5..vd..ws..vf..w...ve..ws..vl..wg..w...w...vj..w...vf..w...vf..wRichg..w........PE..d......d.........." ................L........................................P............`......................................... u..`B......,....0..l.......L............@..0...`Q..T............................Q..8............................................text............................... ..`.rdata..R...........................@..@.data....-.......(..................@....pdata..L...........................@..@.rsrc...l....0......................@..@.reloc..0....@......................@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):30480
                                                    Entropy (8bit):6.578957517354568
                                                    Encrypted:false
                                                    SSDEEP:384:N1ecReJKrHqDUI7A700EZ9IPQGNHQIYiSy1pCQn1tPxh8E9VF0NykfF:3eUeJGHqNbD9IPQGR5YiSyvnnPxWEuN
                                                    MD5:C97A587E19227D03A85E90A04D7937F6
                                                    SHA1:463703CF1CAC4E2297B442654FC6169B70CFB9BF
                                                    SHA-256:C4AA9A106381835CFB5F9BADFB9D77DF74338BC66E69183757A5A3774CCDACCF
                                                    SHA-512:97784363F3B0B794D2F9FD6A2C862D64910C71591006A34EEDFF989ECCA669AC245B3DFE68EAA6DA621209A3AB61D36E9118EBB4BE4C0E72CE80FAB7B43BDE12
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........tB.t'B.t'B.t'K..'@.t'..u&@.t'..q&N.t'..p&J.t'..w&F.t'..u&@.t'B.u'..t'..u&G.t'..y&C.t'..t&C.t'...'C.t'..v&C.t'RichB.t'................PE..d......d.........." ...".....2............................................................`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1867160
                                                    Entropy (8bit):6.513719329831835
                                                    Encrypted:false
                                                    SSDEEP:24576:6NJSAyrJZwdI3xpXxBX4Crw9yilqy+uVUD5Wbsr+Qt682zhPlkPkGqTvI92jHBHU:6Ngjid2LD5W4ac6xdLvIkhHP4ATdeDZ
                                                    MD5:AC6CD2FB2CD91780DB186B8D6E447B7C
                                                    SHA1:B387B9B6CA5F0A2B70028AB2147789C4FE24EF7A
                                                    SHA-256:A91781FE13548B89817462B00058A75FB0B607EC8CE99D265719CED573ADE7B6
                                                    SHA-512:45B24CA07A44D8D90E5EFEDED2697A37F000B39D305FE63A67292FDD237DE3F8EFD5E85B139B5702FAA695F9F27F12F24AC497E005E2F3C24C141D7CD85305B6
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$..v`..%`..%`..%2.$b..%..x%c..%2.$l..%2.$h..%2.$d..%i..%r..%..$a..%..$m..%`..%y..%..$..%..$a..%..z%a..%..$a..%Rich`..%........PE..d.....b.........." .....................................................................`.........................................@....`...+..T.......8............^..............P...............................p...8............................................text...H........................... ..`.rdata..............................@..@.data....#...P.......<..............@....pdata...............D..............@..@.rsrc...8............<..............@..@.reloc...............@..............@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11423
                                                    Entropy (8bit):5.034817754935299
                                                    Encrypted:false
                                                    SSDEEP:192:rXlm2LnoZ7k2mOEhYoKVtWD2xLsmF+MNlPQ4lJ+B0O0DgryYY/+zf7gZ:rXlm2Lng7kvF2VtWD2xLeMNT+B0O0Uro
                                                    MD5:628A1F34F7B7149303918E52114D2C3B
                                                    SHA1:DBE52586BB784940D1EEADC6A2C6985F5A0D4A80
                                                    SHA-256:C96140D154C3BDC0A13A06C8B8B7628DFCD014DF827704D1DBCB2B3B38349605
                                                    SHA-512:560F1121F25C8558335DBBBBF38A382A68619F2A28967820B56266F548BF33FC23F3D13B77B4EF2D23B8330F6B6EC0E089EB1FF3864FED3F71CA28CE0A79EFB7
                                                    Malicious:false
                                                    Preview:# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Heuristics to assemble a platform identifier from publicly available..# information. The identifier describes the platform of the currently..# running tcl shell. This is a mixture of the runtime environment and..# of build-time properties of the executable itself...#..# Examples:..# <1> A tcl shell executing on a x86_64 processor, but having a..# wordsize of 4 was compiled for the x86 environment, i.e. 32..# bit, and loaded packages have to match that, and not the..# actual cpu...#..# <2> The hp/solaris 32/64 bit builds of the core cannot be..# distinguished by looking at tcl_platform. As packages have to..# match the 32/64 information we have to look in more places. In..# this case we inspect the executable itself (magic numbers,..# i.e. fileutil::magic::filetype)...#..# The basic information used comes out of the 'os' and 'machine'..# entries of the 'tcl_platform' array. A number of general and
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6218
                                                    Entropy (8bit):4.843141834641668
                                                    Encrypted:false
                                                    SSDEEP:192:PV5U+VLnNUPVvH+knNUPVUHD5ngWftN+IgMufIdqi+g0SYiCXVDjqL:Nm6MFXN5uwq51iCFD2
                                                    MD5:8ABC3029963E433D1D9865AAA7E1057B
                                                    SHA1:A88091DC98B2FD0AE3A258B59F8BE43F41F04323
                                                    SHA-256:0A6B4B109CFDFC4B40FBDEFDB2282F9B1AF3CC2F9624DD39958EEBD78781AFB2
                                                    SHA-512:D5068375615A2200DDC13EEB852B2E21B7E4AA416FB7A0E97C98B8B106D7701792C523739E8BF266D2ABE411D4298A0B5B3884CFB9DF820FD4A2B61B22F9DECF
                                                    Malicious:false
                                                    Preview:..# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Higher-level commands which invoke the functionality of this package..# for an arbitrary tcl shell (tclsh, wish, ...). This is required by a..# repository as while the tcl shell executing packages uses the same..# platform in general as a repository application there can be..# differences in detail (i.e. 32/64 bit builds).....# ### ### ### ######### ######### #########..## Requirements....package require platform..namespace eval ::platform::shell {}....# ### ### ### ######### ######### #########..## Implementation....# -- platform::shell::generic....proc ::platform::shell::generic {shell} {.. # Argument is the path to a tcl shell..... CHECK $shell.. LOCATE base out.... set code {}.. # Forget any pre-existing platform package, it might be in.. # conflict with this one... lappend code {package forget platform}.. # Inject our platform package.. lappend code [list source $base]..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):35136
                                                    Entropy (8bit):4.945501767273492
                                                    Encrypted:false
                                                    SSDEEP:768:m3xQvCzasI/rHPG2yfkZ0Kbh91iQ3Lnq5MIVYB8mbgijsPIWtw4qvUm:4xQvCzasIDHPG2yW0kJ32imXmUij6JjG
                                                    MD5:BD4FF2A1F742D9E6E699EEEE5E678AD1
                                                    SHA1:811AD83AFF80131BA73ABC546C6BD78453BF3EB9
                                                    SHA-256:6774519F179872EC5292523F2788B77B2B839E15665037E097A0D4EDDDD1C6FB
                                                    SHA-512:B77E4A68017BA57C06876B21B8110C636F9BA1DD0BA9D7A0C50096F3F6391508CF3562DD94ACEAF673113DBD336109DA958044AEFAC0AFB0F833A652E4438F43
                                                    Malicious:false
                                                    Preview:# msgcat.tcl --..#..#.This file defines various procedures which implement a..#.message catalog facility for Tcl programs. It should be..#.loaded with the command "package require msgcat"...#..# Copyright (c) 2010-2015 Harald Oehlmann...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 1998 Mark Harrison...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.5-..# When the version number changes, be sure to update the pkgIndex.tcl file,..# and the installation directory in the Makefiles...package provide msgcat 1.6.1....namespace eval msgcat {.. namespace export mc mcexists mcload mclocale mcmax mcmset mcpreferences mcset\.. mcunknown mcflset mcflmset mcloadedlocales mcforgetpackage\... mcpackageconfig mcpackagelocale.... # Records the list of locales to search.. variable Loclist {}.... # List of currently loaded locales.. variable LoadedLoc
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):107041
                                                    Entropy (8bit):4.838727837954522
                                                    Encrypted:false
                                                    SSDEEP:3072:7zsUYg6sali4N8uBPS5PP9AlGXJL/RiBh:74UDqli4N8uBPS5PP9AYXJL/RiBh
                                                    MD5:B65B89714DE27DC64557882FD4A9F28A
                                                    SHA1:8FD99F1AB678A9BBAE0B7BD492C6EAE6801FC4AB
                                                    SHA-256:F6931F88AE2A4E63D77EEC83E58F5944D66C7EF5F335A51064E8023E0C842971
                                                    SHA-512:BC39C99C94D870D4AFAAC1E641806E110E3CAE6A459F7B6FDB543E4D4E14FE4462B60BC77F192EEE352D48C71E6F15F3C0989D3860F8272A32186F45E86DC963
                                                    Malicious:false
                                                    Preview:# tcltest.tcl --..#..#.This file contains support code for the Tcl test suite. It..# defines the tcltest namespace and finds and defines the output..# directory, constraints available, output and error channels,..#.etc. used by Tcl tests. See the tcltest man page for more..#.details...#..# This design was based on the Tcl testing approach designed and..# initially implemented by Mary Ann May-Pumphrey of Sun..#.Microsystems...#..# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2000 Ajuba Solutions..# Contributions from Don Porter, NIST, 2002. (not subject to US copyright)..# All rights reserved.....package require Tcl 8.5-..;# -verbose line uses [info frame]..namespace eval tcltest {.... # When the version number changes, be sure to update the pkgIndex.tcl file,.. # and the install directory in the Makefiles. When the minor version.. # changes (new feature) be sure to update the man p
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):115215
                                                    Entropy (8bit):4.8838770373771405
                                                    Encrypted:false
                                                    SSDEEP:1536:SYY1IO/Kufhf17a6DLJuuBuzEj6aIsGc3e6YhTjn82872y4e2BxIQAIk:SbyOCufBQaLJOEjlxTYhTjn828CBevQM
                                                    MD5:02B5B1026BD2CB9C7CEFFEB7E098AD18
                                                    SHA1:729CDB4F852531A0A4BFBBBC64F11EA4E6B90A66
                                                    SHA-256:226347B0FAE4A3ED9237CE64C998C2A88B4FDD3D7F85A081B7CAB3E863FEB13D
                                                    SHA-512:805EBBF7660357AC7234CC9EAC0566BE506B7A20E59A2EE13869EF4FC2D407C6F12B705EDE5033A24D37860887C4337B660D8CEF89030AAD4AF659DA9664EB10
                                                    Malicious:false
                                                    Preview:# http.tcl --..#..#.Client-side HTTP for GET, POST, and HEAD commands. These routines can..#.be used in untrusted code that uses the Safesock security policy...#.These procedures use a callback interface to avoid using vwait, which..#.is not defined in the safe base...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.6-..# Keep this in sync with pkgIndex.tcl and with the install directories in..# Makefiles..package provide http 2.9.5....namespace eval http {.. # Allow resourcing to not clobber existing data.... variable http.. if {![info exists http]} {...array set http {... -accept */*... -pipeline 1... -postfresh 0... -proxyhost {}... -proxyport {}... -proxyfilter http::ProxyRequired... -repost 0... -urlencoding utf-8... -zip 1...}...# We need a useragent string of this style or various servers will...# refuse to send us compressed content
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21523
                                                    Entropy (8bit):4.827830596623684
                                                    Encrypted:false
                                                    SSDEEP:384:UqT9XC9VZv9QXCTxsCTHI7672ORgS0mzBvxFRTX7Xvt3wBTnFXhCUvuyqz:LT9XC9VZviXCVsCLI7JlmzBvTxvt3gTW
                                                    MD5:08EDF746B4A088CB4185C165177BD604
                                                    SHA1:395CDA114F23E513EEF4618DA39BB86D034124BF
                                                    SHA-256:517204EE436D08EFC287ABC97433C3BFFCAF42EC6592A3009B9FD3B985AD772C
                                                    SHA-512:C1727E265A6B0B54773C886A1BCE73512E799BA81A4FCEEEB84CDC33F5505A5E0984E96326A78C46BF142BC4652A80E213886F60EB54ADF92E4DFFE953C87F6B
                                                    Malicious:false
                                                    Preview:# auto.tcl --..#..# utility procs formerly in init.tcl dealing with auto execution of commands..# and can be auto loaded themselves...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# auto_reset --..#..# Destroy all cached information for auto-loading and auto-execution, so that..# the information gets recomputed the next time it's needed. Also delete any..# commands that are listed in the auto-load index...#..# Arguments:..# None.....proc auto_reset {} {.. global auto_execs auto_index auto_path.. if {[array exists auto_index]} {...foreach cmdName [array names auto_index] {... set fqcn [namespace which $cmdName]... if {$fqcn eq ""} {....continue... }... rename $fqcn {}...}.. }.. unset -nocomplain auto_execs auto_index ::tcl::auto_oldpath.. if {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):133439
                                                    Entropy (8bit):5.044814789288095
                                                    Encrypted:false
                                                    SSDEEP:3072:Cbn4IAhYvuCg9epsArAzqpSMpWzP7ejMiIAxBPqGYkPAPaZpHYM8EN4LhVLlarXL:Cbn4IM9epsArSqpSMpWzP7ejM/eBPqG3
                                                    MD5:88BB44A1364147FDD80F9FD78FBCEF61
                                                    SHA1:2C3454D2669F0CA83FECF17976D599C85B86E615
                                                    SHA-256:1947F8B188AB4AB6AA72EA68A58D2D9ADD0894FDF320F6B074EAE0F198368FB7
                                                    SHA-512:010B13E8A2D50521B5D7ADCC5F32F7CDE3F12E1053961C575D967DC6CFD368640BF45D23832E5E9C3868CDCA9FE0505698F949C5557D4169353634C94AA196B5
                                                    Malicious:false
                                                    Preview:#----------------------------------------------------------------------..#..# clock.tcl --..#..#.This file implements the portions of the [clock] ensemble that are..#.coded in Tcl. Refer to the users' manual to see the description of..#.the [clock] command and its subcommands...#..#..#----------------------------------------------------------------------..#..# Copyright (c) 2004-2007 Kevin B. Kenny..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..#----------------------------------------------------------------------....# We must have message catalogs that support the root locale, and we need..# access to the Registry on Windows systems.....uplevel \#0 {.. package require msgcat 1.6.. if { $::tcl_platform(platform) eq {windows} } {...if { [catch { package require registry 1.1 }] } {... namespace eval ::tcl::clock [list variable NoRegistry {}]...}.. }..}....# Put the library directory in
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):2.1033474959326957
                                                    Encrypted:false
                                                    SSDEEP:12:5c2VBUvEWVrVJ/eyN9j2iV2NdWWT0VbusV7EV7KVAMmVZyd851VFpsGkliX:5HVBUlJvRj7SOVbusZhAMiZyi77qsX
                                                    MD5:9E3A454FA480E9A99D2D5ACDAA775233
                                                    SHA1:493637BB570A5C96BB62F998BD0391FB59AFC5F0
                                                    SHA-256:FB87BF197F4F485B08EA81F7534BC07D9C3A538D022424BE11011A1FE3C413FD
                                                    SHA-512:EDFCB2BB6AB052D28D5CEBD08AD57F36D3A4CB83D557B1359B0ADE1266E24D8F3CE87B8240881396A5BA4FB45F8B74014784E8885CDB86680D98977CC0D130F0
                                                    Malicious:false
                                                    Preview:# Encoding file: ascii, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):94389
                                                    Entropy (8bit):3.3217406555698195
                                                    Encrypted:false
                                                    SSDEEP:768:UAHU3LIkZlmXrd/uQ0ao98zgKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fd:UVduBGf94gFMT6q95GDRBfd
                                                    MD5:41A874778111CC218BD421CF9C795EC2
                                                    SHA1:80857D106F71199CE187833D38DB091A819A520C
                                                    SHA-256:AD1ED201B69855BFD353BF969DFC55576DA35A963ABF1BF7FC6D8B5142A61A61
                                                    SHA-512:4244624124F86A3EFAB4C70B115A46C8ADF02D708860FA5F327CDBFA24BC3F9EFAD0C6EE58DE96B0B6BBC4CF6D99B322BB8657129007C86D6482F41C1503AAD4
                                                    Malicious:false
                                                    Preview:# Encoding file: big5, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):98634
                                                    Entropy (8bit):2.438904802083714
                                                    Encrypted:false
                                                    SSDEEP:768:MPFOsOKqBLPf62X4lgQeLHj6RHUn0TQb8G47Ianrd28gr:MPAsknjX4OQe7aoMMarAFr
                                                    MD5:B6A7C59E6A48D91CC2DBCB2BBA7E4510
                                                    SHA1:16A9338F18202B26981F2028BEA412DD03BB0FF2
                                                    SHA-256:8924545CC92584169138AADB64683C07BBF846A57014C2E668D23B63F43F3610
                                                    SHA-512:3D644CF394A528A8699BE3679F787A4E1DAD657C04B810580A4C520F2C043471640FBE080AC46DFD3924C47A73BEE12A6AC69D291D09EB791AD0D64A73750B43
                                                    Malicious:false
                                                    Preview:# Encoding file: cns11643, double-byte..D..2134 0 93..21..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..00004E284E364E3F4E854E054E04518251965338536953B64E2A4E874E4951E2..4E464E8F4EBC4EBE516651E35204529C53B95902590A5B805DDB5E7A5E7F5EF4..5F505F515F61961D4E3C4E634E624EA351854EC54ECF4ECE4ECC518451865722..572351E45205529E529D52FD5300533A5C735346535D538653B7620953CC6C15..53CE57216C3F5E005F0C623762386534653565E04F0E738D4E974EE04F144EF1..4EE74EF74EE64F1D4F024F054F2256D8518B518C519951E55213520B52A60000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.3578844928761034
                                                    Encrypted:false
                                                    SSDEEP:24:CqHVBUlJvRj7SOVbusZhAMiZyi77q8ujr4z8tjsuVO6ys2K:JMlBVnrAMiwMm8ujr4z8emTys2K
                                                    MD5:9568EDE60D3F917F1671F5A625A801C4
                                                    SHA1:4F5B3308FE7F6845B46779DECF9B395E47AC7396
                                                    SHA-256:E2991A6F7A7A4D8D3C4C97947298FD5BACB3EAA2F898CEE17F5E21A9861B9626
                                                    SHA-512:9C32BE3E25FC2211CE91F7B9AE1F9EBA20071272BE2BBBA63A8B6E3CD6543C4C32CD62C4C4D153C94F5BE212E974A61EEFD70DDC005F1688D09D9D56E8E298A8
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1250, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.358948900439905
                                                    Encrypted:false
                                                    SSDEEP:24:CTHVBUlJvRj7SOVbusZhAMiZyi77qpREwKsF/+++SAJlz9aRme3cJI:wMlBVnrAMiwMmpKwKm/EYnsJI
                                                    MD5:83DAF47FD1F87B7B1E9E086F14C39E5B
                                                    SHA1:77AE330512EBFEF430A02213644BD1CFCE174298
                                                    SHA-256:0AA66DFF8A7AE570FEE83A803F8F5391D9F0C9BD6311796592D9B6E8E36BE6FC
                                                    SHA-512:D7CE2F44EDFE1DA6D3E07E9A41BB08AD42430BAAFADD09FD217F4B524323A01A1F4913B640C552D38AAEBFF75B0D50ED7A813A2A57C4019311158890C0162DF9
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1251, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.292994562910468
                                                    Encrypted:false
                                                    SSDEEP:24:C4HVBUlJvRj7SOVbusZhAMiZyi77qdmV/rcwvGNNlkL+rSMH+tKv:rMlBVnrAMiwMmd2r/okLz0
                                                    MD5:E9117326C06FEE02C478027CB625C7D8
                                                    SHA1:2ED4092D573289925A5B71625CF43CC82B901DAF
                                                    SHA-256:741859CF238C3A63BBB20EC6ED51E46451372BB221CFFF438297D261D0561C2E
                                                    SHA-512:D0A39BC41ADC32F2F20B1A0EBAD33BF48DFA6ED5CC1D8F92700CDD431DB6C794C09D9F08BB5709B394ACF54116C3A1E060E2ABCC6B503E1501F8364D3EEBCD52
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1252, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC0081201A0192201E20262020202102C62030016020390152008D017D008F..009020182019201C201D20222013201402DC21220161203A0153009D017E0178..00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF..00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF..00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF..00D000D100D200D300D400D500D600D700D800D900DA00DB00DC00DD00DE00DF..00E000E100E200E300E40
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.422723556981327
                                                    Encrypted:false
                                                    SSDEEP:24:CRHVBUlJvRj7SOVbusZhAMiZyi77qduWn4T5K9QQSqiWeIDDdn:CMlBVnrAMiwMmduWnSKyQSqiWeIVn
                                                    MD5:441B86A0DE77F25C91DF1CD4685F651D
                                                    SHA1:D1E429916BC9423F55EEC8F17941521E9FE9D32B
                                                    SHA-256:5B8D47451F847C1BDE12CACA3739CA29860553C0B6399EE990D51B26F9A69722
                                                    SHA-512:35DF342DDA4E8790C6D53762465DF8B93B49B7B7E211D7A5753078EF559C9C9383EFF7285A90FF5C0020FBB16AF380EE3C8643F4CEB1E41917E72021079D722F
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1253, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.307590929679485
                                                    Encrypted:false
                                                    SSDEEP:24:CWHVBUlJvRj7SOVbusZhAMiZyi77qdjrcFvGNNlkBSMH+tA/b:lMlBVnrAMiwMmdjriokgzAD
                                                    MD5:5FA9162BEC5A4DEA97B5EA2840CFB065
                                                    SHA1:F26858E3D2FB928F39CA87CBB8446AF099570CAD
                                                    SHA-256:31639CA96A4D3602D59BD012540FE179917E0561CB11A0D0B61F1B950EB76911
                                                    SHA-512:3CE7BEABBE1A0CB946149D263D3317A8B791F6D72C49DEC4621E27F50CC359D8FA3EE97C03FF05D44E47DAA59DB87F219386467614B8B3FF8CC21AB3E3BED5E6
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1254, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.3385880810272774
                                                    Encrypted:false
                                                    SSDEEP:24:CfHVBUlJvRj7SOVbusZhAMiZyi77qdIn2hEeGlRhv6Mw6Kcv:MMlBVnrAMiwMmdInSEdhvrj7
                                                    MD5:6DEA4179969D6C81C66C3B0F91B39769
                                                    SHA1:7E2722576BFFABC3258C5EDB2D99FA2468D6A4B0
                                                    SHA-256:47576CAE321C80E69C7F35205639680BF28010111E86E228ED191B084FAC6B91
                                                    SHA-512:91CC626B6454517F06FB3616E9ED623D1A2A4BFE74AFA9885F00F6AEC835D8825A5587091B9D9AB0E5ABDA291FA3FE7CE87E2618E21EB2974D9118AE27B8A2FF
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1255, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.4033510023542655
                                                    Encrypted:false
                                                    SSDEEP:24:C0HVBUlJvRj7SOVbusZhAMiZyi77q30pPE7Lym4cwGm+AMZjyG/JQIG/Y:XMlBVnrAMiwMm30FQLym4ys6Jg/Y
                                                    MD5:D50DFAFEE5C605C5C00A25A9EEE4D4CF
                                                    SHA1:7D51BC17931D3D809716C06E7F07C6011286A144
                                                    SHA-256:29340EA8E5AD3532BF67FA77CC852F055081B1238925CB109908AA72804CCC04
                                                    SHA-512:D0A9B422A1061D6239E442767069B987E33239FCBA9BACE677923888F5F8BD1DCAABC71B83A985A0A86A15DCC44316781665BBFBF24558FCB94FDA6783285BCB
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1256, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.344584404753015
                                                    Encrypted:false
                                                    SSDEEP:24:CNHVBUlJvRj7SOVbusZhAMiZyi77q8uWTfNL4wIBUioGndt:uMlBVnrAMiwMm8uWJDNIt
                                                    MD5:CC3D24543FDD4644BBBD4AAB30CA71BC
                                                    SHA1:8E2658E7F782F005411BCB8423BDFC3C68BDED14
                                                    SHA-256:C15AB85438728BF2C60D72B1A66AF80E8B1CE3CF5EB08BA6421FF1B2F73ACDF4
                                                    SHA-512:5ECABF820098F7D24AB806ADD9CA3E1087C29914FB2DE6BA3DC656234202DE3FDF80A7E9ED433CCB2149FF07184F74884CEB37A1B689E9E0C1402916F3E13AFE
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1257, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.2984943182702593
                                                    Encrypted:false
                                                    SSDEEP:24:CKlHVBUlJvRj7SOVbusZhAMiZyi77qdIQ2jFvGNNykoxWi3/i:xMlBVnrAMiwMmdIQufkoxn3q
                                                    MD5:12BCEAE6B6A5FAE5AE9C42F5998BA485
                                                    SHA1:C9620DA0C763D2C3770386E69EE7E421BD1BA965
                                                    SHA-256:29D93DEE7C01B2264778BC6B75F6EF76EA6AC53E9F4A334D83707229E7F482D2
                                                    SHA-512:714BAF58462FB0E84A32D82C8FC2D63EDF78DF8CCE578391E2521737F94F860B5CCFE41B481E1D09879A6811FCFD8B98A2724DB1D15749BD5293A9B33BCAD071
                                                    Malicious:false
                                                    Preview:# Encoding file: cp1258, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.515546664597914
                                                    Encrypted:false
                                                    SSDEEP:24:CFyHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBIqE18wDyV8mK:wyMlBVnrAMiwMm+VhE1LmK
                                                    MD5:CE6D8A6542DC12D1783084FA4B2B63EA
                                                    SHA1:5039A350C8E3E2C6F353B438B41BD0B6A7AB8069
                                                    SHA-256:E5613C04D3D2EE44CCAD85AE53A37C257674491C540836E5D942BBCC4E4A8DB4
                                                    SHA-512:E8C5CFB747486BBE0E567B6E87B59D5246D749A80C8F64F6669227C7FD849886F98A1F94451922AC099409AC14890F1A8B1E5F25EA584FDB1522ACE3AD0BE6A6
                                                    Malicious:false
                                                    Preview:# Encoding file: cp437, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.6177058818384693
                                                    Encrypted:false
                                                    SSDEEP:24:CjHVBUlJvRj7SOVbusZhAMiZyi77qSKOQFhWehDrq18wDyVKockoiH:WMlBVnrAMiwMmSKOQFhWeh3q1odH
                                                    MD5:8EF3CBCA101F5777846D12D3C96A0A7D
                                                    SHA1:5EC5418B861894E0F18EA15AA4414019815E2EA2
                                                    SHA-256:A0415F14F5D72AD24E9C3A5C91517A0E3D22E1ADBC3505C0C6E918B961F7A07D
                                                    SHA-512:FB14C88E61E5459B4A8706751D88D0A261AC6B4171F72912D87CE78A2BC97A821CCF5B53676FB229C08F9E557BE624F4DC649B722A906B9B7944ED2D5E7F9065
                                                    Malicious:false
                                                    Preview:# Encoding file: cp737, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.451057608106102
                                                    Encrypted:false
                                                    SSDEEP:24:CsOHVBUlJvRj7SOVbusZhAMiZyi77qoo9ecL067J4ZNUPVw3PfA:AMlBVnrAMiwMm59T067KDLPo
                                                    MD5:9656761FA02EA24773EAD3E5C4BDB975
                                                    SHA1:366228F25392708FA799E9CC0830CE9917EF6CA7
                                                    SHA-256:C3C6542E902DEC2C44DDCFD8B5CB7ABF309B0413A7CED1614DC0B20CF7C5E35F
                                                    SHA-512:A6A44B9A2193D75764DC284BE53264E57BFEB2A221FD54B4577DD90752F69A45E6B9D293108A7AB895F347A24FD10AAE84954A043AB1F466F485D707D7412380
                                                    Malicious:false
                                                    Preview:# Encoding file: cp775, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..010600FC00E9010100E4012300E501070142011301560157012B017900C400C5..00C900E600C6014D00F6012200A2015A015B00D600DC00F800A300D800D700A4..0100012A00F3017B017C017A201D00A600A900AE00AC00BD00BC014100AB00BB..259125922593250225240104010C01180116256325512557255D012E01602510..25142534252C251C2500253C0172016A255A25542569256625602550256C017D..0105010D01190117012F01610173016B017E2518250C25882584258C25902580..00D300DF014C014300F500
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.3718781469586827
                                                    Encrypted:false
                                                    SSDEEP:24:C9HVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBc+myS5LeQDTVwA:EMlBVnrAMiwMm+VeyS5SQn/
                                                    MD5:2169EE726DCC011E6C3505D586C88FC3
                                                    SHA1:094252AD0634787E2D7F0D28A448437054D359C7
                                                    SHA-256:13DF611F429A9B331DA1B34F3C718CCCAF0BD4AB44F71A9C632197987B4D643B
                                                    SHA-512:BC5831EF1C131095A22C76FFCB5C4217081AF796B60455BE2DE2E2689CFE1033F07E8B45449F77E7804A7D52CBCFB916B0B4639828E65B14475BB3367F47C8EE
                                                    Malicious:false
                                                    Preview:# Encoding file: cp850, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.4509005787389877
                                                    Encrypted:false
                                                    SSDEEP:24:CPHVBUlJvRj7SOVbusZhAMiZyi77q7EUsOtycwQIc+922V:mMlBVnrAMiwMmwvOtycwQIc+9R
                                                    MD5:48402B424B5101BDEEB0192BBA96DB7D
                                                    SHA1:C9EB93A37AF70F4134AA9CF05D914A30FB3201DD
                                                    SHA-256:F3A18A8C7934F6586F023477E08D3F9D5EAD9A45E9E58A3F8D018AF9BB13F868
                                                    SHA-512:4EE615605BFF3D94A7FC4FE23D8288F0F20F6792C8C69ECACABAE82F1A334D8417C5DFFC0DA3702E2DB09B7BE1E5FF19C6A0F460C9A5EC84D1856BB9C8061CA5
                                                    Malicious:false
                                                    Preview:# Encoding file: cp852, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C700FC00E900E200E4016F010700E7014200EB0150015100EE017900C40106..00C90139013A00F400F6013D013E015A015B00D600DC01640165014100D7010D..00E100ED00F300FA01040105017D017E0118011900AC017A010C015F00AB00BB..2591259225932502252400C100C2011A015E256325512557255D017B017C2510..25142534252C251C2500253C01020103255A25542569256625602550256C00A4..01110110010E00CB010F014700CD00CE011B2518250C258825840162016E2580..00D300DF00D40143014401
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.4277025591531864
                                                    Encrypted:false
                                                    SSDEEP:24:CoHVBUlJvRj7SOVbusZhAMiZyi77qLHVWjwk/rMZC032SLnD2JbD:hMlBVnrAMiwMmx8whM03VLDy
                                                    MD5:8B8AA56F83BA750EB73FAE542E76FF1A
                                                    SHA1:2F3C3BA4B854A7D6B0A3D27BC519EE66A042E05A
                                                    SHA-256:E64FD2E639DA6F654D9BFBB2266F9432259A6A55941622F5CDDC3797E382EB0A
                                                    SHA-512:8B4061176663F7AC01B3969D25F680B5870A8EAD864CFAD897F18E75409CE721E6CC367A88EBABAF72E77D4542EE1894F2A6EE47A43FB3D4C650CFA18DFD3D71
                                                    Malicious:false
                                                    Preview:# Encoding file: cp855, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0452040204530403045104010454040404550405045604060457040704580408..04590409045A040A045B040B045C040C045E040E045F040F044E042E044A042A..0430041004310411044604260434041404350415044404240433041300AB00BB..259125922593250225240445042504380418256325512557255D043904192510..25142534252C251C2500253C043A041A255A25542569256625602550256C00A4..043B041B043C041C043D041D043E041E043F2518250C25882584041F044F2580..042F044004200441042104
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.364496856690505
                                                    Encrypted:false
                                                    SSDEEP:24:CaHVBUlJvRj7SOVbusZhAMiZyi77qZpu6uUV5Dw5LeBCVHjzA:jMlBVnrAMiwMmyUVFw5SYdI
                                                    MD5:BA52A031DE1B1A6ED1C41BED8946750C
                                                    SHA1:BD54C0E2F62FD36675892A61FD8B340A56845D20
                                                    SHA-256:B6CD5C6F2B54D89142679D599ED0A5DEE6955A3B3F6B6673E46AFE7A5A303CDC
                                                    SHA-512:5F915AABE39F31CE9337B4B9B0239DF8ADA898D2D9F111DD09D97689DB89CF45B093AC187FC28484CFB213D14B0D8F58C5668D0A59726282D6F52D5D24697816
                                                    Malicious:false
                                                    Preview:# Encoding file: cp857, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C700FC00E900E200E400E000E500E700EA00EB00E800EF00EE013100C400C5..00C900E600C600F400F600F200FB00F9013000D600DC00F800A300D8015E015F..00E100ED00F300FA00F100D1011E011F00BF00AE00AC00BD00BC00A100AB00BB..2591259225932502252400C100C200C000A9256325512557255D00A200A52510..25142534252C251C2500253C00E300C3255A25542569256625602550256C00A4..00BA00AA00CA00CB00C8000000CD00CE00CF2518250C2588258400A600CC2580..00D300DF00D400D200F500
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.506813480871637
                                                    Encrypted:false
                                                    SSDEEP:24:CMHVBUlJvRj7SOVbusZhAMiZyi77qij4Axlt49Y18wDyV8mK:VMlBVnrAMiwMm/g+9Y1LmK
                                                    MD5:C416471B57FB894DC45D30C31B4BD2E2
                                                    SHA1:BA378F8122280992AE51245A06814D8155564220
                                                    SHA-256:804EFA345C5BBBAD2449C318A7A3F5B31F4234712AAD23DC49B3FB5AA33B7A57
                                                    SHA-512:E7CDE706CFE573525C2DE319AD5783AE9D97C4F6D28B14A77A729F281540B0DAFAD4C14879EF76473BFDEBC38499C65CA228470983F2D1BC31938A91A2486522
                                                    Malicious:false
                                                    Preview:# Encoding file: cp860, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.5174672833207183
                                                    Encrypted:false
                                                    SSDEEP:24:ClHVBUlJvRj7SOVbusZhAMiZyi77qZpORVPnA2Gm18wDyV8mK:8MlBVnrAMiwMmiVPAA1LmK
                                                    MD5:4997979FD1692063E2B9AA9870E0BE4C
                                                    SHA1:919012354B99BBEF4C85517E89A2C9CD340FCE49
                                                    SHA-256:4B7E76AEB75289FACA76434EA6E9874E9504AD2BC3D8D47550EADBCC8294857E
                                                    SHA-512:C122A1AE2DE79CB97E5989535B7478A76D905CDE60B01F80F5B84EDB9DF08BE6829E1811AF19608971DA048B8DA24F40DE0217A8054AC612EC2D8B3560500FBE
                                                    Malicious:false
                                                    Preview:# Encoding file: cp861, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.5573268031592717
                                                    Encrypted:false
                                                    SSDEEP:24:CdMHVBUlJvRj7SOVbusZhAMiZyi77q36AqE18wDyV8mK:iMMlBVnrAMiwMmq3E1LmK
                                                    MD5:9B4D1B95B20BD67555517DCC3007B22A
                                                    SHA1:2C0D6121DB49CDAB6FBAA81398BE2E44BE4E1110
                                                    SHA-256:6C15CB256B1C22170292589C6F589E64E164EB36EC7E84F0BD48149BABB7C5FC
                                                    SHA-512:34C3E401364D579E8AC7A4E1F1F7A29A84C62E1D5146D7664832639EA3997227DC4BAF1B64DC605E6574D680E61B55D0C69C329E35B1BEC41501FC68C5B634B7
                                                    Malicious:false
                                                    Preview:# Encoding file: cp862, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.518080906819747
                                                    Encrypted:false
                                                    SSDEEP:24:CXHVBUlJvRj7SOVbusZhAMiZyi77qwGuXVFq5EC18wDyV8mK:eMlBVnrAMiwMmw3VFu1LmK
                                                    MD5:C93CCDF65F7F349F22855745660F02AE
                                                    SHA1:604888B1FB3C57DF47277CDD1153597BA89E8C36
                                                    SHA-256:232D6FE34D7151920232EAAE9C515F36400AB64136DCC5B802D6245AC6F5D56B
                                                    SHA-512:D5B65AE7353F694A37AF29177BF1A95477918FC5A002C2FE199624BD5B391698807BAECF54225BC40F62B3CA7912C7066A4AAF01B9E3E399133831CAA342BF4F
                                                    Malicious:false
                                                    Preview:# Encoding file: cp863, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C700FC00E900E200C200E000B600E700EA00EB00E800EF00EE201700C000A7..00C900C800CA00F400CB00CF00FB00F900A400D400DC00A200A300D900DB0192..00A600B400F300FA00A800B800B300AF00CE231000AC00BD00BC00BE00AB00BB..259125922593250225242561256225562555256325512557255D255C255B2510..25142534252C251C2500253C255E255F255A25542569256625602550256C2567..2568256425652559255825522553256B256A2518250C25882584258C25902580..03B100DF039303C003A303
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.72017408907567
                                                    Encrypted:false
                                                    SSDEEP:24:CwHVBUlJvRj7YOVbusZhAMiZyi77qcHj92OibcDQAyUjSG:5MlrVnrAMiwMmSsNcDQvcSG
                                                    MD5:146E0D1779D50E070E0EF875E8374DF8
                                                    SHA1:B51E5598712598BC387DD79AE80BD879F139140D
                                                    SHA-256:81BEBFD9A61E9F17495763B68D57742FAB2A1A43871015699A2C8E5FDED4EC19
                                                    SHA-512:1F0DAD8E77712C5A018894332BE72FF5C546C92F481421CCB8553AD6F1E9A18617765C8CEE4187265CCCB1AB073E221289D34C9AB1F0501231D52C81FC1C932B
                                                    Malicious:false
                                                    Preview:# Encoding file: cp864, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00200021002200230024066A0026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00B000B72219221A259225002502253C2524252C251C25342510250C25142518..03B2221E03C600B100BD00BC224800AB00BBFEF7FEF8009B009CFEFBFEFC009F..00A000ADFE8200A300A4FE8400000000FE8EFE8FFE95FE99060CFE9DFEA1FEA5..0660066106620663066406650666066706680669FED1061BFEB1FEB5FEB9061F..00A2FE80FE81FE83FE85FECAFE8BFE8DFE91FE93FE97FE9BFE9FFEA3FEA7FEA9..FEABFEADFEAFFEB3FEB7FEBBFEBFFEC1FEC5FECBFECF00A600AC00F700D7FEC9..0640FED3FED7FEDBFEDFFE
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.5193842128126676
                                                    Encrypted:false
                                                    SSDEEP:24:CsKHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBnAFj18wDyV8mK:gMlBVnrAMiwMm+VRAFj1LmK
                                                    MD5:150B2E00B3F84F8075F3653ED7A4C8E0
                                                    SHA1:7131DC656EFE1F2277B19DA72F0EEB46B4EC54A0
                                                    SHA-256:ADA1A52064EE93EBE6F8A5D101D01F8776038E12F21A5CA1C006EE833577C705
                                                    SHA-512:AC56EEB0220826BF8FF6CA52768DB63961AAC46095A2F3EEBA11B5973CC92AF52DFBBE9E85A0DD04CAB8998212FA2599EDD83BAAA7FB2D394E330FF2F7C015DB
                                                    Malicious:false
                                                    Preview:# Encoding file: cp865, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.5038992968715266
                                                    Encrypted:false
                                                    SSDEEP:24:CCHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9aRme3cB18wDyVNZkR:bMlBVnrAMiwMm8YnsB1wZy
                                                    MD5:FC33B5F773E87696A69E8798446E9772
                                                    SHA1:4FC5589C1DD88BB8171758BC173A63B3A5687AE5
                                                    SHA-256:32A45DEBA933C7ED99141535087A4C99BA79802175E3F762ACA6EB941157F85A
                                                    SHA-512:332D2FEC532192F58F792441E61D675A8692C36BECF768D07F64B8C31561CC1A2DF402625A4719E758A9B59DE4228FFE9F94F067E7DC0D82F9DA2D6500E50304
                                                    Malicious:false
                                                    Preview:# Encoding file: cp866, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.5261138894265507
                                                    Encrypted:false
                                                    SSDEEP:24:CtHVBUlJvRj7SOVbusZhAMiZyi77qii+lh2o5+hdVMQFhWgCDrKE:EMlBVnrAMiwMmXY2o5+hdVMQFhWf3f
                                                    MD5:4A2C66AA630D4AE2BF1E7546DCE2DAE5
                                                    SHA1:FABB672957D21CA2B4E0EACA5FCE6093BAACF77A
                                                    SHA-256:AFE6ED6EB5D07C45B6B928A48BC5EF57EFCF61602D36FF9FBDE4A8EA3FA6DF75
                                                    SHA-512:A548002EB7AF8735DBBBCC9883B44B326F261C02A3C7CE65C373755DD92212A66740112EAE0FC556CAD5B86911709C6DF12167DC5B6AD1E01C6F1EB5AB16DB37
                                                    Malicious:false
                                                    Preview:# Encoding file: cp869, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1110
                                                    Entropy (8bit):3.33737382140564
                                                    Encrypted:false
                                                    SSDEEP:24:CSyHVBUlJvRj7SOVbusZhAMiZyi77qVQEHmEU4AyqU+TWwdd:CMlBVnrAMiwMmWr4AyqUSd
                                                    MD5:FC8C876B4738236FC71A1AF96E4566D0
                                                    SHA1:DDFDC3F62D99A6BD705CF0719B50F66449C8808A
                                                    SHA-256:4F05F31CA026BBFEEEE49ED86504CB060784137A9CFAE0E5954D276E837AB5DE
                                                    SHA-512:5BF58A810E029840825FFF3318E90415E6F2B7E46032FD428B4971923D41A64C127A6F438E4894E80EC9604CD34F1D47B4F9A02ABAB3E7D6351611811DC1F2B9
                                                    Malicious:false
                                                    Preview:# Encoding file: cp874, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):49008
                                                    Entropy (8bit):3.5144574650895364
                                                    Encrypted:false
                                                    SSDEEP:768:R/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSY83+JRS:RVUidzJCurDGSYvW
                                                    MD5:EF4508C84A025095B183E6BAD67B1ECD
                                                    SHA1:D12D5381D50D578AA8687671DC542C462A7F490D
                                                    SHA-256:6D1B512110BEAF2CD1296AC878F51D567848AB4A1CED4F18C72806BB136B3D23
                                                    SHA-512:E695E7E6F4A11D5E8D62982E26B69B87DB2F1F3D6B6DCCD5F1DF51879F5C4533265CBD7B785E1F2652D8CA3FC913D4F862E7575F67C636314A6E6956FD96E023
                                                    Malicious:false
                                                    Preview:# Encoding file: cp932, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):134671
                                                    Entropy (8bit):3.5217328918779645
                                                    Encrypted:false
                                                    SSDEEP:1536:+CwDua7D90Jz1aDJmnMfEGniOQdH6prJs3inqlW6/t9Qwf+zCt5:j1WVRpe3rpt9hf+Gt5
                                                    MD5:CF9CFD6329A4FB6C402052B9417DAC3A
                                                    SHA1:75CE13FE1E5898D47B67F951C0C228851F1CC04D
                                                    SHA-256:B6EC2BE0504CA62B9D1B6857F6BAA13FFAC5A567D4432F4EAB98ADC830F5D9C3
                                                    SHA-512:7E19607EEA5342ECFE92D56DAAE82827DE147AE5AFDA8E9D67FD0970F528902CDE20A8A07CF2F341B926E59BB4FF792872976F1C7C5CD351959A71A8B6A1924A
                                                    Malicious:false
                                                    Preview:# Encoding file: cp936, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):132551
                                                    Entropy (8bit):3.100976362851161
                                                    Encrypted:false
                                                    SSDEEP:1536:2UO8ecy5KnSMsDlOmNpkQ4oQHnTApv+ngLbiyEY:2U/etc/sBRZp//r
                                                    MD5:03E19A4DE3490A7DC50D04EC1F558835
                                                    SHA1:9DFECAE08C98109EAA358F5920AED647888F722B
                                                    SHA-256:477F8B79B67F4A22C963EE65B9B387DBD8E4B8F62D800B0A51D2276580C6ADBB
                                                    SHA-512:7D6AD30AF75A3AA6332A860C6ABF87BF725EB6B4AF3B37699043A10EF3235471C63D0ECB4D437D5AD9438DF5DA646EB55117A9BB8B55EF6868F71E49035C18B7
                                                    Malicious:false
                                                    Preview:# Encoding file: cp949, multi-byte..M..003F 0 125..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..000000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):93330
                                                    Entropy (8bit):3.319807723045599
                                                    Encrypted:false
                                                    SSDEEP:768:aAHU3LIkZlmXrd/uQ0ao98ggKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fW:aVduBGf9PgFMT6q95GDRBfW
                                                    MD5:1D84B025DAB127F2073947D764D307B6
                                                    SHA1:4E3D3CBD96D084836F1FE6F2AA497E3FAA463B9B
                                                    SHA-256:F80E05533D1A1494C32F9412E9AD2D9C11FAF9AE0668A6F9D1FA5CEEDC6870E2
                                                    SHA-512:188D649F9717F20524AFF47F85C3B23AEC3E7825BF54975285D06C17587D581DC24A3F6A7CAB1703DE7AD5521FE2FE2572DE627A81E6A48049A47BB219ED4AF8
                                                    Malicious:false
                                                    Preview:# Encoding file: cp950, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1113
                                                    Entropy (8bit):3.7780987266961663
                                                    Encrypted:false
                                                    SSDEEP:24:vJMHkUlJvRjmf9RCsUBOdXsCbbNviANpk3m1XFAoE4xSF5HrBPkdn:vKvlA9RCs6CXrViAN51XFA9eSvdPKn
                                                    MD5:90FE0C57BBC6C2D8A3324DEB7FD45F3D
                                                    SHA1:06B95BE43E4C859A0F1B01384EDD26500C6C1F9E
                                                    SHA-256:EB9B262E4D179268E6F017C0D4EF0E7034E31A5B4893595D150640CA1F6A1C45
                                                    SHA-512:6A5E67D9F3EC6046C42793E1437B8A6E50EBD72D8EC67FEFEB6DAD6FAB6A5B5C74F939363587D5A6529E217AF54FB8A9CF0F768E114DD931C57887451CACE56E
                                                    Malicious:false
                                                    Preview:# Encoding file: dingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A327A
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1073
                                                    Entropy (8bit):3.0039861897954805
                                                    Encrypted:false
                                                    SSDEEP:24:XXBcIhJZDgEoQkNCGz0Jyh9lZk3Vmd2QhZLXPiALV3d:dTcNCJEhfZk3Vzox/iqVN
                                                    MD5:F7B3771D43BDE6AFF897683BED2FE6AD
                                                    SHA1:E70C2C0902413536CB6163752D70F3AE4AF6A967
                                                    SHA-256:165BE658AB7D61FFC3DF1E2F1438C2F9FCEE6808A756316302157F44E6D3ACD7
                                                    SHA-512:F87DC718EB2DD95237B144FDA090BB636121B9479E492AC94E4F7EBDD88171F070B9E9F6165BDA7B7E2BA2A3E6188B1108D8F91AA5F142CCCFDAD317628DD941
                                                    Malicious:false
                                                    Preview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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):86971
                                                    Entropy (8bit):2.3925661740847697
                                                    Encrypted:false
                                                    SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                    MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                    SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                    SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                    SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                    Malicious:false
                                                    Preview:# Encoding file: euc-cn, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):83890
                                                    Entropy (8bit):2.350315390677456
                                                    Encrypted:false
                                                    SSDEEP:768:2GhX8nuQ635vlHptHzh0abNQPQA0OMS2HhFV3:2GikvRpMuNQ4P73
                                                    MD5:F2DE0AE66A4E5DD51CC64B08D3709AAB
                                                    SHA1:97558A51A6DD6C56FC7A42A4204141A5639021FD
                                                    SHA-256:A3C916BA16BCAC9FAA5A1CCC62ACA61452D581CD8BA3EE07EC39122C697274C9
                                                    SHA-512:0EAA90100527FF150D2653D7BB57647D69E592BE53B714DDD867114CFCC71E3A76882772F4FAECE040DF09FA8971D1C22DECC497E589B4CA827A6890497A48D9
                                                    Malicious:false
                                                    Preview:# Encoding file: euc-jp, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):95451
                                                    Entropy (8bit):2.4080588863614136
                                                    Encrypted:false
                                                    SSDEEP:768:4/vO7UlClqAd8XfpUqv+mCoKRuLbtMjnIxz0DY:4nO4N9fpv+ngLbiyEY
                                                    MD5:103843B3A57168BD574F6CACC550D439
                                                    SHA1:982652EA2B0DCFBB55970E019A4EDFBFCFAF9C24
                                                    SHA-256:5448643398685456A11CBB93AF2321F70B8659E2FFF3CCC534B4D53BD2F38C89
                                                    SHA-512:27A8DE6F97DB4A96E5D0132692A32A99DAB8A6C98973A0C4E50A219F2D2F364E63D657E5E8478B2706CA33C45C376F55B5BFCC9459E06AEA88BFCD4F0E32525C
                                                    Malicious:false
                                                    Preview:# Encoding file: euc-kr, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):88033
                                                    Entropy (8bit):2.3790651802316996
                                                    Encrypted:false
                                                    SSDEEP:768:o4Is/C+0IwpRK1CkinIKUyNiNBzxOC4T/:LIsR0/RKckiIgNiDtOxT
                                                    MD5:1A8E55DEA98B6D5EAC731ED233D3AD7C
                                                    SHA1:1335FC0FC2AAE7E7F5EC42AC17A4168368B4A64D
                                                    SHA-256:B4894AEDD2D5B5AE54B6D2840F7C89A88E9308EFD288F179E65936E172EF4B0D
                                                    SHA-512:9DDCE366BA1196EB9FB913ACFDE8516BC9BB8D51894866D2E7E8CB313DC4D6C6D33C5A9E78142E83594DC423D10DA6F8DE211E69844B939198BC7DB9AED808F0
                                                    Malicious:false
                                                    Preview:# Encoding file: gb12345, double-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.270324851474969
                                                    Encrypted:false
                                                    SSDEEP:24:qrmHVBUlJvRj76OVbusZhAMiZyi77qN8VmKfkiJt0RMFS:qSMlZVnrAMiwMmNPYPFS
                                                    MD5:D06664ACAA478BDEB42B63941109A4E3
                                                    SHA1:4A6196FCC1BDE988C1A23EAA69745A9979F1AEFF
                                                    SHA-256:ACD50951F81566C8D823670F9957B2479102EB5AE4CF558453E1D8436A9E31FF
                                                    SHA-512:CB51A36B851FFDB5C6F9B9D0333EEA6A14CEF3796E0A60530198C16999D64E638047E873333630360299C9126F79CEDDA2D9F169028CED1FC04B1D3C55FFFC5B
                                                    Malicious:false
                                                    Preview:# Encoding file: gb1988, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..002000210022002300A500250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..000000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):85912
                                                    Entropy (8bit):2.3945751552930936
                                                    Encrypted:false
                                                    SSDEEP:768:D47/S+i8vdx3Tz+hpHcBrQqKtrebjMIGCx8jE:0c873T6DHcBrbKtrVlE
                                                    MD5:9357E05C74D6A124825F46A42B280C14
                                                    SHA1:E5106ABE12D991AFE514F41E3B9E239202A4ADFE
                                                    SHA-256:C445E4C9F676AE997D2DDA2BBC107B746F3547D85F39479951C56F46275EE355
                                                    SHA-512:B2187D70A92FB38572BA46F3C3443233BEED1A4ABBFBA1B860F4BBAE6B3D8C16B8C9F52A20DAA12B2B8B40972E52F816860427B743530177E4CF0D8BA34EF381
                                                    Malicious:false
                                                    Preview:# Encoding file: gb2312, double-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):86971
                                                    Entropy (8bit):2.3925661740847697
                                                    Encrypted:false
                                                    SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                    MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                    SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                    SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                    SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                    Malicious:false
                                                    Preview:# Encoding file: euc-cn, multi-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.949409835601965
                                                    Encrypted:false
                                                    SSDEEP:3:SOd5MNXVSVLqRIBXS4ovLE9sDXMVyXK9ow1Deq9Ts5dRPMSXcRA0kcR4X9cL+TXI:SVNFS0oyisLMsXK9okTw/BDSVKNw
                                                    MD5:D3AC33390D31705FA4486D0B455247DF
                                                    SHA1:2EE8613DC04A6FA84AB38FD5F3A2AA3FE330625B
                                                    SHA-256:98074C85650A420A095ADA9138DA3A8A0AA4027BE47EA1E97A596F319EB084E9
                                                    SHA-512:CB265B753C84968E2D1D6E706906DA9A7BB796D08F626290BCCA8F089771AFD176A9DC912773E8BA390D2AEC08592AD535C7D254E1DF92CF04848601481D4EFE
                                                    Malicious:false
                                                    Preview:# Encoding file: iso2022-jp, escape-driven..E..name..iso2022-jp..init..{}..final..{}..ascii..\x1b(B..jis0201..\x1b(J..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):122
                                                    Entropy (8bit):4.978693690727393
                                                    Encrypted:false
                                                    SSDEEP:3:SOd5MNXVTEXIBXS4ovLE9sDXNvdwUHEQwqc6XWxVUNOov:SVNFSoyisL/Zzc6mYNHv
                                                    MD5:057CB0AA9872AC3910184F67AC6621BC
                                                    SHA1:BBA47F9D76B6690C282724C3423BD94E2C320A04
                                                    SHA-256:234811FC8B0F8FF2B847D9CC3982F1699DF1D21A43C74DCE45BA855D22520007
                                                    SHA-512:019F187D2D16FB51BF627ACB7E67778857E56D4C160E0E5ACA6ABC05EC5FDB624CE2715CB9E0DAD73BFF9D697982BE0D539BC55BCCD368FC7C8EE0FFC04E9F61
                                                    Malicious:false
                                                    Preview:# Encoding file: iso2022-kr, escape-driven..E..name..iso2022-kr..init..\x1b$)C..final..{}..iso8859-1.\x0f..ksc5601..\x0e..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):240
                                                    Entropy (8bit):4.95909788984399
                                                    Encrypted:false
                                                    SSDEEP:6:SVNFUXoyisLNcs9ozc6W4Twk0sRBDSVKN6tWIHRy:oUYcLNcTzczbwRYRy
                                                    MD5:BB186D4BE3FA67DD3E2DEE82DD8BD628
                                                    SHA1:93CE8627038780CFFF8C06E746DD5FB2B041115C
                                                    SHA-256:741B4C842557EED2952936204D0AE9C35FA3A0F02F826D94C50C46976291797C
                                                    SHA-512:4921E7AA3DB8E33609603FE129B97275DFF80CFB06648D2068FA7950246C67B9B530B74827638F69F4DFB8F55CDD4AA952EA72EAEB6ABB527D52F20C6B46FB51
                                                    Malicious:false
                                                    Preview:# Encoding file: iso2022, escape-driven..E..name..iso2022..init..{}..final..{}..iso8859-1.\x1b(B..jis0201..\x1b(J..gb1988..\x1b(T..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..jis0208..\x1b&@\x1b$B..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.236046263464657
                                                    Encrypted:false
                                                    SSDEEP:24:iyHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkL+rSMH+tKv:iyMlBVnrAMiwMmTmokLz0
                                                    MD5:3538A970CD098BF5CE59005FE87B6626
                                                    SHA1:285A96CC40D7CCE104FB4B407C7F0C400AA8F9CB
                                                    SHA-256:A9CB4F4CA111608F882729BC5EB1C2F15530C515EF02DD2CA62F2D8DC5A210CF
                                                    SHA-512:A6A6F2D8B5C22E240D195D168A604887062508FF3340D24E13BFCBD6C2E687347F2CFE724FA2ED12F36915B55EE2CFD901EC3F08E2B0A2FFD3BC2A98BBD12A50
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-1, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.319750415373386
                                                    Encrypted:false
                                                    SSDEEP:24:jHVBUlJvRj7SOVbusZhAMiZyi77qimXG2yM6q7KytC:jMlBVnrAMiwMmTXG2gytC
                                                    MD5:CBDE40170FECD2496A9DA3CF770FAB7B
                                                    SHA1:3E1D74DF6AFEB6CDE8ECBDAC8F81F2F9C64150DE
                                                    SHA-256:48F4A239C25354F0E9F83A39F15D4632BB18A9C33E60C671C67307159917ECED
                                                    SHA-512:A26B56A4CFE29E5A0A0B3A55283A7767397693388E2DEEC342C69B6F718FAE2407EB8D5ADE538FAE6947CBB8B052943C3A52F2D046ABAC7A3DAA86D730DC293F
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-10, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0010401120122012A0128013600A7013B011001600166017D00AD016A014A..00B0010501130123012B0129013700B7013C011101610167017E2015016B014B..010000C100C200C300C400C500C6012E010C00C9011800CB011600CD00CE00CF..00D00145014C00D300D400D500D6016800D8017200DA00DB00DC00DD00DE00DF..010100E100E200E30
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.3206399689840476
                                                    Encrypted:false
                                                    SSDEEP:24:6HVBUlJvRj7SOVbusZhAMiZyi77qimwHmEU4AyqU+TWwdd:6MlBVnrAMiwMmTf4AyqUSd
                                                    MD5:E2A0BCB83BFC3F435CDCFC20D5CF2E0C
                                                    SHA1:CFD18B5B5DB4EE46E63D912B8FD66D513C4C8D39
                                                    SHA-256:21E769C5A66E4D12D6E7DB24022E92AF1EC0D0331FE3C8C605654F239C0F3640
                                                    SHA-512:C86F9180F2F4A177F1EA10E26B0903ABEAFDDE0317C332A48F8D1BB586DAC91C68800E2E4FA2CD739C435419B106CBA4BEFC049F2BCD720E9FC2C0AE8436CFAC
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-11, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.338879965076632
                                                    Encrypted:false
                                                    SSDEEP:24:olHVBUlJvRj7SOVbusZhAMiZyi77qim2w4kBUioGnd2:olMlBVnrAMiwMmT/WNI2
                                                    MD5:21CEBB723D47B1450A7FB21A82470B97
                                                    SHA1:A40FD3AFE1ECE89E3F682D527D281BC563DB3892
                                                    SHA-256:3271D39D7B4DCD841E8E5D5153D1B8837718B88FEFEC73DC37D314816EEFE5E5
                                                    SHA-512:3A0E033A4D93C679215F672C6C4FE425D63E1DE157AA671E7400639165EC3EB498E4EEB030D6FB8FF8BE2FD8C986D341036A8CED9FA094D092CF2822D5DC065B
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-13, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.3670559016263915
                                                    Encrypted:false
                                                    SSDEEP:24:vHVBUlJvRj7SOVbusZhAMiZyi77qimhw6COlk1fKMH+tiH:vMlBVnrAMiwMmT/tlkQz0
                                                    MD5:FDAA88946DE4EB4E6D37F2B6AFCF6CAF
                                                    SHA1:56FC4773941E7457EA04EDA92C883642DE45D100
                                                    SHA-256:F0A5675027FB1CA34B4E4128D24C2968CD275890569A32A86AFA4994CE4983E0
                                                    SHA-512:92658A6FEB42A41B3CFFC377C4A9A3F6780A79FC596D3FEDBA6D3B3D75A9F40E859A2CE8DC579A278BAEEDEEFA2408E2B7853D99D5C2D14AACF63C521FE2BB86
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-14, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.260398494526282
                                                    Encrypted:false
                                                    SSDEEP:24:mHVBUlJvRj7SOVbusZhAMiZyi77qimmRf4kL+rSMH+tKv:mMlBVnrAMiwMmTmCkLz0
                                                    MD5:D779D5E2A0083C616A226B2D82ABF0EB
                                                    SHA1:D1657DB5E2989EBA80BAB98A1E1217CFFFBB19DB
                                                    SHA-256:C74E8E23A0FF0D5DEA7C318CA20DC817DA4E57B0DD61B3361FC0D5098A9316FE
                                                    SHA-512:26E62BE8AE793ED3B725BF0D1BABF4D6ED63A6F3772ABD48955FC4394BDE5A47614D1FF89A21A828676BF1302F3C9361B557B0FBF0DF8561FB7E66542FE94CDC
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-15, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.3065938185320918
                                                    Encrypted:false
                                                    SSDEEP:24:dHVBUlJvRj7SOVbusZhAMiZyi77qim0SmmPkYTtyL:dMlBVnrAMiwMmTttPkYpyL
                                                    MD5:74FDEDDAF670023DA7751FB321E345A0
                                                    SHA1:0677FED67C1333A9A74D50642E5214701A57E2AF
                                                    SHA-256:640D977EC1D22B555C5075798DA009E3523E8F55F29BE22A3050CD1B4EF7B80E
                                                    SHA-512:AC02FD95159A856A9DDEF4E6A8216B958DC07311B553FF39403DC5B77E1AFF2A2C4C03F5F26A2BB7AD5DB6800BEE03E895554556DBBFBE89426286796ADE55AC
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-16, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.340505173539446
                                                    Encrypted:false
                                                    SSDEEP:24:UHVBUlJvRj7SOVbusZhAMiZyi77qim/ssm5VO6ys2K:UMlBVnrAMiwMmT/ssYTys2K
                                                    MD5:9B87850646FFE79F3C8001CBCB5BB3A1
                                                    SHA1:8F97576F3FB3B5DBEF71DC2C9314AB5E530974D6
                                                    SHA-256:76949B03F57041B07F41902BD7505AB3594D79AA8F7BDEED5F0481004B10CBC3
                                                    SHA-512:101A28AF0799E7E0A5723E5DD76D5EF0FEEF584AC479A88F499CB3B7D2AA93767D72F8E51C76F7547F08FF8DD3CBBA7FF444BD07F99A92755526E75C596109EF
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-2, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.2507537230559977
                                                    Encrypted:false
                                                    SSDEEP:24:tHVBUlJvRj7SOVbusZhAMiZyi77qimw2g0kgTJMkFtoD:tMlBVnrAMiwMmTo0kgTJDoD
                                                    MD5:CBD0B9CDCD9BC3D5F2429A760CF98D2F
                                                    SHA1:6DEF0343E0357E0671002A5D2F0BFC2E00C8BCF9
                                                    SHA-256:1F51E7BDA64D466C16FEE9A120BBE3353A10CEB9DAB119FFA326779BA78D8C5D
                                                    SHA-512:88DB6D23B53F4A78133C794ED42FA3F29A4ABAD35DE4B022040FA187AA59B00664CC13F47AFF4507D72F4CB2166F026144213EE760AB0FD67CDD2FA5906F434A
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-3, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.3413832766873073
                                                    Encrypted:false
                                                    SSDEEP:24:KHVBUlJvRj7SOVbusZhAMiZyi77qimX4AsD/njR7Ky8hA:KMlBVnrAMiwMmTXBs3EyuA
                                                    MD5:8B620EDECAC2DF15A024C2CE15FB64A5
                                                    SHA1:65C5EE5D08964E37393E6A78ABA0DB16D51240E2
                                                    SHA-256:66B3CF994F0B5E0103D13E812958320AFB555C91E3F81B579D4CBF231E6A0805
                                                    SHA-512:93391325405D3AEA0A913F5EA8EA0391920D10F234C26AB1DA70992702889A3AF7B85E11A1FCA554690942B238CE313DD460798E59C5B1F4069036E7B0F24F44
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-4, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.342721205983665
                                                    Encrypted:false
                                                    SSDEEP:24:zHVBUlJvRj7SOVbusZhAMiZyi77qimq5+SAJlz9aRme3cJbx:zMlBVnrAMiwMmTqeYnsJbx
                                                    MD5:6FBEFDC3DEC612B7B2CC903D8C53F45B
                                                    SHA1:14EC3C166DC411149C32C262DBE8E327F6186669
                                                    SHA-256:3130BF26DA0C840C1E02203A90C3B1C38966FB203130E2FBB3DD7CB3865A3539
                                                    SHA-512:F3F15AD8B6C9D9B4C9C994FE3235B4463E59BE7DCE79CF3F7AA77905D6F4DC2C4AABB79B440767DB13D357B13F09EA34983FCA7BC92D0AFA15FB6CBEDDD04E38
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-5, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):2.992219341429816
                                                    Encrypted:false
                                                    SSDEEP:24:YHVBUlJvRj7SOVbusZhAMiZyi77qimEZjyG/KE:YMlBVnrAMiwMmTEs6KE
                                                    MD5:52F025D943A45EE840D9C3DFD06E4D79
                                                    SHA1:571EA14B49FA6150BFD2ABA79E52799955D9FA10
                                                    SHA-256:CB71909BF01A3A7A4C7396359DA06D206B58A42AD68192CE37169D6640D46E13
                                                    SHA-512:77FF9DC785A63CA59A7D58BB25C7D2C16F364E525F9B939177385EF80F7DE37734C8774F1BC829CF0270FD66257A4D31689654C8037DB0A86A0291FFDE637B90
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-6, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.393893260854861
                                                    Encrypted:false
                                                    SSDEEP:24:TMyHVBUlJvRj7SOVbusZhAMiZyi77qim2OBHK9QQSqiWeIDDdn:TlMlBVnrAMiwMmT1hKyQSqiWeIVn
                                                    MD5:4BFB0A35D971A9D4C5EA8D8099E93C37
                                                    SHA1:8FED2CBB1343E5B4442748242B5F89A76110592D
                                                    SHA-256:76F6BC85FC9CB89BC3F94D36275AB23C740BA17FD36EC8907479DA3A885415EA
                                                    SHA-512:C9CE1E9EA57A1DEF62BBC60A115C06325C6EE8F92021695459E1ADAF1193A559BC5F0229191BFC2E344296DC137583ED4A9A61A65890F99F4CF97B3864C7AF0F
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-7, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A02018201900A320AC20AF00A600A700A800A9037A00AB00AC00AD00002015..00B000B100B200B303840385038600B703880389038A00BB038C00BD038E038F..0390039103920393039403950396039703980399039A039B039C039D039E039F..03A003A1000003A303A403A503A603A703A803A903AA03AB03AC03AD03AE03AF..03B003B103B203B303
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.0494739426493567
                                                    Encrypted:false
                                                    SSDEEP:24:uHVBUlJvRj7SOVbusZhAMiZyi77qimieGlnvs26Kcv:uMlBVnrAMiwMmTirv87
                                                    MD5:5F69EAF54E7A1E8AC81C9E734DBE90D8
                                                    SHA1:BA509C88A4FC03922EF5CDC887FAA7B594A9BC5A
                                                    SHA-256:865E3665743B5FABA3E1AD6AA55515A666BD05DA6266879D9B66C98905DAFF3C
                                                    SHA-512:D9924FBE59CB571AF721CA602DBE58CAD0D9310610EDF544F8FC0FBF3D1CE4E99597D0198E4E7C802107012786346FE4C1B9C6C3A76D5F60B9A83981B0EDA24D
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-8, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1114
                                                    Entropy (8bit):3.2591070910715714
                                                    Encrypted:false
                                                    SSDEEP:24:XHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkBSMH+tA/b:XMlBVnrAMiwMmTmokgzAD
                                                    MD5:0B99E605E73B7D8DEFD8D643F5729748
                                                    SHA1:F30E7CCBCD9C539126E8D6CA0886E4B2BD54E05D
                                                    SHA-256:CF51E867DDE2F19553D98FEEC45A075C4B4F480FB1EDADB3D8DAD1EBEA9299F3
                                                    SHA-512:DA0487CD7F2143195E80697C17FFDB61AFD464C888DDF84813B2B5D1BAB24D96466DA7A7F77C8E4A9D0D53F34D72928923380AFC1B92A96C0A3BFF46006A4E19
                                                    Malicious:false
                                                    Preview:# Encoding file: iso8859-9, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1112
                                                    Entropy (8bit):3.2708615484795676
                                                    Encrypted:false
                                                    SSDEEP:24:zBHVBUlJvRj7SOVbusZhAMiZyi77qN8VmKfkiJt0RMFS:zBMlBVnrAMiwMmNPYPFS
                                                    MD5:4E21F24F8D9CC5DF16B29CACD997AC69
                                                    SHA1:064E723EFB82EF1C303E5267496304288821E404
                                                    SHA-256:61B14A7C312366F79BB45F02C6B7EE362E6F51CBAD5E479E563C7F7E785DB654
                                                    SHA-512:AF8FAEB47EFB51F2537139F7C4254ABED119E477FD2B5E83B90B7A903B43C4E02DDF43A7DDB044A0A9601E9F9ADE91B02EE7C0EC87FF5DDCF9951B9601A90435
                                                    Malicious:false
                                                    Preview:# Encoding file: jis0201, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..00000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):81772
                                                    Entropy (8bit):2.3571626869060776
                                                    Encrypted:false
                                                    SSDEEP:768:AigXM6CwL/9pV7Hl6+Yko9gZxErA3/MS/8xqg8:AZ/tp1Hl2KZxUfr8
                                                    MD5:F0661E22C7455994AA1F6EC1EDA401B4
                                                    SHA1:928B2AC46A9FDE61A81F56BE225E6138B40C22E5
                                                    SHA-256:F6B1C6AC5F5FC4E990A7A1AAC16A406012040936431BEFE7D2B6CD1DA9E422C4
                                                    SHA-512:917CC58678A9E9F5CBE860D30828846ABA4EA8CDFAB7DD1AE6A66C47ECBB85CF67DD97BC3E6F95341DD30F4E757B2CEA571708D5B4CED18A29F19904C3138AE0
                                                    Malicious:false
                                                    Preview:# Encoding file: jis0208, double-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):72133
                                                    Entropy (8bit):2.3455261548208055
                                                    Encrypted:false
                                                    SSDEEP:768:9F/D7CH2puD5CdzU3nAkP5dHn7s391fmOarFaVQ:H/D7CHbozU3nAk3H7sXm3FgQ
                                                    MD5:07CE2C135BE17DBAFA558AA5949A53DB
                                                    SHA1:5D9DBEFCCB44E76C1A4E61360C6FCED8DCC8EF4D
                                                    SHA-256:785CFC5F5D9CB06DB8061730AB0016A0F70D0B59F6787D2A3CBB8D5779C99706
                                                    SHA-512:E954D7198D58ACEDEB4C8E5F466107767C3DA43763A5F6CDDFCF567226F9B22B4C2DE27564F28CD125D7F1BA7CB9C6DE6DEC4065EC2676572C793BE458FDDD9D
                                                    Malicious:false
                                                    Preview:# Encoding file: jis0212, double-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.531149521168141
                                                    Encrypted:false
                                                    SSDEEP:24:KcJ5mHVBUlJvRj7SOVbusZhAMiZyi77qpSzIa9qVRS3YcEchJh3MAxSl:KmmMlBVnrAMiwMmAzIxVgBE6cAxQ
                                                    MD5:96F54CC639ACA8E466FB8058144C9350
                                                    SHA1:0B9530D6080F2BAACABD5AA0D48BFF316FCCEF64
                                                    SHA-256:0E43244BFC4F33FACB844B9E00270A1A4C24DC59B8A9B95104E2D788BB2F59FD
                                                    SHA-512:5B7859325E5E34C9D4558B1198795BB9C6A8EF783EB97193EA80BA76C38AFE9BDD1B526B77401DF5456B7A0E85E942191FFD4B4F2B9F0C8168A7093EE452802E
                                                    Malicious:false
                                                    Preview:# Encoding file: koi8-r, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.5076564572101714
                                                    Encrypted:false
                                                    SSDEEP:24:K+HVBUlJvRj7SOVbusZhAMiZyi77qpSzIaU3dmVRS3YcEchJh3MAxSl:K+MlBVnrAMiwMmAzI/EVgBE6cAxQ
                                                    MD5:4B755EF2288DFC4009759F8935479D68
                                                    SHA1:C3BDF0D9DF316DE8919DAA4329275C5AA81D61B4
                                                    SHA-256:ED04D5B977B8C8944D8760B713FF061292DA5634BCBB67CDFB1C3A6FF5378C81
                                                    SHA-512:3F1E1CC47327054FB9C54157ED10514230F10BFCD4BD9FDAFA02D7B238137DC7442CA2661B0739D8EEA3181E187D3B639A2C8118A0DE272C96000908121B6CFB
                                                    Malicious:false
                                                    Preview:# Encoding file: koi8-u, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..25002502250C251025142518251C2524252C2534253C258025842588258C2590..259125922593232025A02219221A22482264226500A0232100B000B200B700F7..25502551255204510454255404560457255725582559255A255B0491255D255E..255F25602561040104032563040604072566256725682569256A0490256C00A9..044E0430043104460434043504440433044504380439043A043B043C043D043E..043F044F044004410442044304360432044C044B04370448044D04490447044A..042E04100411042604140
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):94393
                                                    Entropy (8bit):2.4104200953565513
                                                    Encrypted:false
                                                    SSDEEP:768:XbjO7Uw6uKdosXRxps9a+ut/BmZPwkpT9A0T03o:XfO4ZBRxpV+4wPwKloo
                                                    MD5:366C09E4A4CC10006E593F5B3F3461D7
                                                    SHA1:A0DABFBEEB66E26FB342844EA41772D7A1D19C24
                                                    SHA-256:9B27FE7E7054F36E279993F19E52E18AC03360D117AE80C42B4E984A97C590AA
                                                    SHA-512:670F32D698C7992038E736D3AD40098D8589C0C5A1379E32A0F02A02FAF251B1312CAD131DDADC3F80B23A3821A91689F2E310309028BDDDF227D532EB505A20
                                                    Malicious:false
                                                    Preview:# Encoding file: ksc5601, double-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1116
                                                    Entropy (8bit):3.4295694929963667
                                                    Encrypted:false
                                                    SSDEEP:24:8jHVBUlJvRj7SOVbusZhAMiZyi77qHVPJSf2FcVDu1LEe4qPPMl2J89:8jMlBVnrAMiwMmHEmJ4IMgi9
                                                    MD5:10850BCFB943318284D6191494EBD7D5
                                                    SHA1:237D5DDF7969A422991F17021244D13A2BB0DE92
                                                    SHA-256:81ECA6840B87F2DEF9FCDD171A55C2D71A49386D88401CE927AE57D7DDD7AAAA
                                                    SHA-512:D797781C228B70D2D83DB8ABA08F840CE49846C9473CC89A2E316900D9E08A63142E68AD9ABBB2EF67BF9F1D392772FAB36CCC09632022A1437AE27C11F2284F
                                                    Malicious:false
                                                    Preview:# Encoding file: macCentEuro, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1116
                                                    Entropy (8bit):3.3992482002374516
                                                    Encrypted:false
                                                    SSDEEP:24:8ULyHVBUlJvRj7SOVbusZhAMiZyi77qsTMdKxOZwwL+KR5D/jlJy6QWky:8ULyMlBVnrAMiwMmOsL+KR5DblE85
                                                    MD5:A60FBDE33D13C732095713D1AB6713AB
                                                    SHA1:4B0EB443F2D0E4B8DB7D0435F9311E5F9A625123
                                                    SHA-256:BBE6F5EBB5EAB08C91DF7D524FAF39B03AA8B9F84C67ABA0553A84EC56668CB9
                                                    SHA-512:3EEBA6BA3FCD875AFBD5DF41EDC21E872416A48D03343232904CC99CAF913045DAF7B1A1ACD0949EF794AD7B6C9AE8F93808423FFC4B67718E732B2FF5D9B6D7
                                                    Malicious:false
                                                    Preview:# Encoding file: macCroatian, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1116
                                                    Entropy (8bit):3.4178221849964903
                                                    Encrypted:false
                                                    SSDEEP:24:8dHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJY:8dMlBVnrAMiwMm8Y6zUk+UVsJY
                                                    MD5:C390D66441AC61CCF0A685CA5EE0BC1C
                                                    SHA1:FCAE825B54400B9D736EF22A613E359E3F0FA6C2
                                                    SHA-256:76EFE571ADDA7AED467F146CB0BD3A2351F2A720508EA0642C419F5347789CAA
                                                    SHA-512:C891DB15E0F600965885DE6745EDD2A4E3A6A20CA30A9AAE89CBD8C429F8455C4AF7F2FC053FB3D730D8544AB6A6E78E769DB93DAD7B29868B746FA10373F021
                                                    Malicious:false
                                                    Preview:# Encoding file: macCyrillic, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1116
                                                    Entropy (8bit):3.870022681111701
                                                    Encrypted:false
                                                    SSDEEP:24:87JMHkUlJvRjmf9RCsUBOdXsCbbNviANpkDP1XFAoE4xSF5HrBPkdn:87KvlA9RCs6CXrViANUP1XFA9eSvdPKn
                                                    MD5:DCE78527E3A7B7CB1DE9EE5FAF12AFC6
                                                    SHA1:20F4A3F4DB6B3422C04EBB6B21A568E4C173F9C1
                                                    SHA-256:062E31D48DC33160999074E49205E08C3655DFF91C2C87F254522E6EBCE2DD96
                                                    SHA-512:627F5FD2F12B341F2D7EE9032946FE057C4AC74D99687178CEA98B3E150307BB6AA2495B0FA46400760D467E2BF589BE31E998E25CE1D1E8465DA61F22047345
                                                    Malicious:false
                                                    Preview:# Encoding file: macDingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..F8D7F8D8F8D9F8DAF8DBF8DCF8DDF8DEF8DFF8E0F8E1F8E2F8E3F8E4008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A3
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1113
                                                    Entropy (8bit):3.4954458011071323
                                                    Encrypted:false
                                                    SSDEEP:24:8dOHVBUlJvRj7SOVbusZhAMiZyi77qJlbaBMD2aSY5us36Ekp1ysOSU2imR:8kMlBVnrAMiwMm7aKPVusqx1ysOJjmR
                                                    MD5:0CC92F685A4132BE4B030006670D81CE
                                                    SHA1:13B1074A90055E9EA061A6206A9C004DA29967A9
                                                    SHA-256:1AABE561B5C944ABD11C293D4ACAC0F3A4A5A9E84A0342D066F4E3E992348895
                                                    SHA-512:E1AF3D47D681CD68B6063DEC1241631CABE86FE835232FA73D855AC74D0175540D46511282BE7198A67A37970A5D05CDECF55C10424ED9C1413C108F116094D9
                                                    Malicious:false
                                                    Preview:# Encoding file: macGreek, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.3991839018654573
                                                    Encrypted:false
                                                    SSDEEP:24:8KHVBUlJvRj7SOVbusZhAMiZyi77qscqMVmOZmk/LYRldjY/g4JyMWG:8KMlBVnrAMiwMmzqi/LYRlYBEXG
                                                    MD5:747ADBE54D6992467415E322326FA1B9
                                                    SHA1:5E3967B5DDF3A6DBF07E90ED6B9B9C2F3F3F35FE
                                                    SHA-256:6FD08CE6FBA521D51E8058DE5C2DBD6583B80306A8BE7D015361F76314E70A35
                                                    SHA-512:A04B946993985BF1F8FBA3A7A9AD3838F43F8F27F69B1FB1015D9DC8612AAFCE24E30CBC1FCABBDFB359FD487D51F70F18DA0CDA4A87749A2C82309CEB054849
                                                    Malicious:false
                                                    Preview:# Encoding file: macIceland, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8..00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC..00DD00B000A200A300A7202200B600DF00AE00A9212200B400A8226000C600D8..221E00B12264226500A500B522022211220F03C0222B00AA00BA03A900E600F8..00BF00A100AC221A01922248220600AB00BB202600A000C000C300D501520153..20132014201C201D2018201900F725CA00FF0178204420AC00D000F000DE00FE..00FD00B7201A201E2
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):48813
                                                    Entropy (8bit):3.3767502114972077
                                                    Encrypted:false
                                                    SSDEEP:768:K/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSJi:KVUidzJCurDGSk
                                                    MD5:3DCD22325E0194AAD4959C939B1DE24D
                                                    SHA1:ABEF1372FBDA83714CE29E015D9A198D4B37B21C
                                                    SHA-256:47007D9EBF4D34C6CE3599E50AFC7C1CF8129B88994DE2C2A857C09003F9CD2B
                                                    SHA-512:B8ADFD2315EA38E5F7D4DED219759380069AAB539F1B5AAA5626CE32428CBBEB5E8215AD8351E023BCF72FA4DC30AB40CF59D6D45E33B6D1A6B41BEBFD4BD4C2
                                                    Malicious:false
                                                    Preview:# Encoding file: macJapan, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..00A0FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1113
                                                    Entropy (8bit):3.4060725247347516
                                                    Encrypted:false
                                                    SSDEEP:24:8THVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldjBpmg4JyMWG:8TMlBVnrAMiwMmOi/LYRlTsBEXG
                                                    MD5:34691FADC788B85D98F63159640C7DD0
                                                    SHA1:C8B3D084D3E831EFF6ECEF71B2029545F214C3D4
                                                    SHA-256:C83D971D6BC0284EF323C197896E38C57A5FF44784E451EC2997EDA70C0DD85C
                                                    SHA-512:77D5676F9B7AF7FD1D612A1C426889D8F2C0191887E180B78C4AA42202928A1B3078B76BD3C5F5ABB2A5CE1AE913E3CA6EFDE0483D2A2B0EFC173EF25EAE1D67
                                                    Malicious:false
                                                    Preview:# Encoding file: macRoman, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.412326247178521
                                                    Encrypted:false
                                                    SSDEEP:24:8tHVBUlJvRj7SOVbusZhAMiZyi77qsTMVZ5OZwYRldj/T9g4JyMWG:8tMlBVnrAMiwMmOA7YRlFT9BEXG
                                                    MD5:04E25073BFB0019D8381B72F7B433F00
                                                    SHA1:B63B0AD9F10A44B0DDD12A3BDBCDEB2992D6D385
                                                    SHA-256:0B805DAF21D37D702617A8C72C7345F857695108D905FF378791F291CEA150F0
                                                    SHA-512:0514EC054676C15C65B01B02747CDBAD79BC89FD1A24A17797A8729752FB748FEDBE920E7BBFF41A6DA4BA99002E3B8DB674D53E30485DC36F6BF737EAF11702
                                                    Malicious:false
                                                    Preview:# Encoding file: macRomania, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1112
                                                    Entropy (8bit):3.6062142626989004
                                                    Encrypted:false
                                                    SSDEEP:24:88HVBUlJvRj7SOVbusZhAMiZyi77qqJipJwHmEU4AyqU+TpH:88MlBVnrAMiwMmqJ8Jf4AyqUe
                                                    MD5:06DC6BA6E4A75CD7FF2D7A4248912C61
                                                    SHA1:23FB16763A8F11EF48E805E4F453C2F812D48FC4
                                                    SHA-256:A1802A2FEB01B255EC7C17425EEE4525372DF8CE226F4047D149172EB438F913
                                                    SHA-512:41A487EC5C36C17B2746C5DC770882A836E6E75CF6A14C31595EB211022F0476BD3B953497C447F21554769F127C3A56E5B6EF8FB3C20A8AFF8C67E0CC94359D
                                                    Malicious:false
                                                    Preview:# Encoding file: macThai, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.422718883614008
                                                    Encrypted:false
                                                    SSDEEP:24:8QjHVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldD8g4JyS:88MlBVnrAMiwMmOi/LYRlWBES
                                                    MD5:4EA94A0DB35BED2081A2CC9D627A8180
                                                    SHA1:AB2AC3ADA19F3F656780FF876D5B536A8DCE92C6
                                                    SHA-256:AFB66138EBE9B87D8B070FE3B6E7D1A05ED508571E9E5B166C3314069D59B4E4
                                                    SHA-512:7888F560D3728732BE1B7DCE49ECB61F3399CEF11191F4116C891E1D147B2A90ED8FB4A5E7B51904A001C47750BD9EB1B15EA5BA5B4EC5D69CDE7704B69529AD
                                                    Malicious:false
                                                    Preview:# Encoding file: macTurkish, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1115
                                                    Entropy (8bit):3.4157626428238723
                                                    Encrypted:false
                                                    SSDEEP:24:8TzHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJd:8PMlBVnrAMiwMm8Y6zUk+UVsJd
                                                    MD5:A5B48D6F2678579CBE6EA094A4655071
                                                    SHA1:A13A41D530B21CE8443AFD7E811286537C5BA9C7
                                                    SHA-256:F7E11736C9FF30102B31EC72272754110193B347433F4B364921E8F131C92BF0
                                                    SHA-512:612F9D528CE940B5CA9E67CB127013A104655207511F4CF39C8696A127E6A8F4867F5603DCFB78C25A55668C6EE70F2997A8D1626F6F1DD44B19260967F17097
                                                    Malicious:false
                                                    Preview:# Encoding file: macUkraine, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):42552
                                                    Entropy (8bit):3.5565924983274857
                                                    Encrypted:false
                                                    SSDEEP:768:w/RPrUHiJrwWkyY/W2wHiwWnwWOORY+gutSX:wVUid5JCurDGSX
                                                    MD5:EEB45AF9D7104872FE290D1EC18AB169
                                                    SHA1:A80CF4EA46301F0B8B4F0BC306270D7103753871
                                                    SHA-256:4A15ED210126BCDAE32543F60EB1A0677F985F32D49FCE923B9FAE8C5BCF3DA4
                                                    SHA-512:C359042B04441AA50E536B23EEA0C6C7B2C1893DFB9CDB5459D3B46945D3BB50FD7A32A4F4E26A83622E76D3D2BB0DBBC3D1F3FB87AAF40520A243165B82AB34
                                                    Malicious:false
                                                    Preview:# Encoding file: shiftjis, multi-byte..M..003F 0 40..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086008700000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):3.73983895892791
                                                    Encrypted:false
                                                    SSDEEP:24:SdHkUlJvRjvRV7ZQsoRmSds2AsSemxUs+Jw1Viv6ObTXyn:avlJV7ZQsoRmosGSPxU/JOm6wTXyn
                                                    MD5:D59E748D863A5FAEF0CEEC2564E041A3
                                                    SHA1:4FFF3BE37F50C090FFC581F1C7769E20281E90C3
                                                    SHA-256:9660537A7B62996478555C6F57C1962C78FB3972F19370B2E395C44842818A1F
                                                    SHA-512:BF8FD0CF1CC55564C46976F53F441B26819ADBA7AB7BB04FF3FF5A313366FC3049DF29A839CCCB05EDEF4A7ECBB49FFCA62518EDA90AF2D7781874A8435073AE
                                                    Malicious:false
                                                    Preview:# Encoding file: symbol, single-byte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
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1112
                                                    Entropy (8bit):3.0553142874336943
                                                    Encrypted:false
                                                    SSDEEP:24:ZlHVBUlJvRj7SOVbusZhAMiZyi77qsDHmEU4AyqU+TWwdd:PMlBVnrAMiwMmss4AyqUSd
                                                    MD5:467A67DE6809B796B914F5BFF98EF46D
                                                    SHA1:C62418071A6C9CB0DCE3F67E130BFD2FB7AB0B58
                                                    SHA-256:50B62381D6EDD4219F4292BFDC365954491B23360DE7C08033E7218A3D29C970
                                                    SHA-512:BF98305AA7D759A087B9EABDC404714D8DC6B4F1BEED4ED0E1FFE646641E1AECA307673D64CF95FD09546D977B3409D6C04F56DCCA1D6332B0D9B6DD460B77A9
                                                    Malicious:false
                                                    Preview:# Encoding file: tis-620, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E0000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..00000E010E020E030E040E050E060E070E080E090E0A0E0B0E0C0E0D0E0E0E0F..0E100E110E120E130E140E150E160E170E180E190E1A0E1B0E1C0E1D0E1E0E1F..0E200E210E220E230E240E250E260E270E280E290E2A0E2B0E2C0E2D0E2E0E2F..0E300E310E320E330E340E350E360E370E380E390E3A00000000000000000E3F..0E400E410E420E430E44
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8235
                                                    Entropy (8bit):4.855903177272536
                                                    Encrypted:false
                                                    SSDEEP:192:Hf8PxPu7pUHBpqyzmY5rEk/fvs+AokFlTGHts1H/tsEGZPBtsLIVn++G:H6Pu7ELJTtyli8Ozz+L
                                                    MD5:8609B624CD3EC63DD02DBF89455C3A9B
                                                    SHA1:B3E1843E34C38AA668FFDDF435A1A65D55449CA0
                                                    SHA-256:5123DB837EADF45712EA7D449BC40BFD3E8E16D3D71E7D0CE9A32F164973D767
                                                    SHA-512:B20B75473F34209888F38EE570B8A96061760E88466DFC2EC55C814968DC7F67D92D255E8635188B60455B88F2D1D517747613AD0F366D60412D2D6ECE231B0E
                                                    Malicious:false
                                                    Preview:# history.tcl --..#..# Implementation of the history command...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#.....# The tcl::history array holds the history list and some additional..# bookkeeping variables...#..# nextid.the index used for the next history list item...# keep..the max size of the history list..# oldest.the index of the oldest item in the history.....namespace eval ::tcl {.. variable history.. if {![info exists history]} {...array set history {... nextid.0... keep.20... oldest.-20...}.. }.... namespace ensemble create -command ::tcl::history -map {...add.::tcl::HistAdd...change.::tcl::HistChange...clear.::tcl::HistClear...event.::tcl::HistEvent...info.::tcl::HistInfo...keep.::tcl::HistKeep...nextid.::tcl::HistNextID...redo.::tcl::HistRedo.. }..}.....# history --..#..#.This is the main history command. See the
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10066
                                                    Entropy (8bit):4.806771544139381
                                                    Encrypted:false
                                                    SSDEEP:192:kipkqA3KsZMAikGJ4kIWPa95KTBoF7dg/8YNkgQ4id:TkqWKsZ8kGJ4kIWPaDFzTd
                                                    MD5:C2092F8CA2D761DFA8C461076D956374
                                                    SHA1:90B4648B3BC81C30465B0BE83A5DB4127A1392FB
                                                    SHA-256:8C474095A3ABA7DF5B488F3D35240D6DE729E57153980C2A898728B8C407A727
                                                    SHA-512:09CE408886E2CEADDF70786A15D63AF9A930E70CAC4286AC9DDD2094C8EDCF97A2ADC2D3D2659B123F88719340D3B00D9F96E9BC7C8B55192735C290E7D24683
                                                    Malicious:false
                                                    Preview:# http.tcl..# Client-side HTTP for GET, POST, and HEAD commands...# These routines can be used in untrusted code that uses the Safesock..# security policy...# These procedures use a callback interface to avoid using vwait,..# which is not defined in the safe base...#..# See the http.n man page for documentation....package provide http 1.0....array set http {.. -accept */*.. -proxyhost {}.. -proxyport {}.. -useragent {Tcl http client package 1.0}.. -proxyfilter httpProxyRequired..}..proc http_config {args} {.. global http.. set options [lsort [array names http -*]].. set usage [join $options ", "].. if {[llength $args] == 0} {...set result {}...foreach name $options {... lappend result $name $http($name)...}...return $result.. }.. regsub -all -- - $options {} options.. set pat ^-([join $options |])$.. if {[llength $args] == 1} {...set flag [lindex $args 0]...if {[regexp -- $pat $flag]} {... return $http($flag)...} else {... return -code er
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):746
                                                    Entropy (8bit):4.711041943572035
                                                    Encrypted:false
                                                    SSDEEP:12:jHx5XRsLzhjJS42wbGlTULuUAZb3KykszLl7+HkuRz20JSv6C3l5kMn:bHRsRJS42wbGlTUcZ+yk2Lli1z2jxXkM
                                                    MD5:A387908E2FE9D84704C2E47A7F6E9BC5
                                                    SHA1:F3C08B3540033A54A59CB3B207E351303C9E29C6
                                                    SHA-256:77265723959C092897C2449C5B7768CA72D0EFCD8C505BDDBB7A84F6AA401339
                                                    SHA-512:7AC804D23E72E40E7B5532332B4A8D8446C6447BB79B4FE32402B13836079D348998EA0659802AB0065896D4F3C06F5866C6B0D90BF448F53E803D8C243BBC63
                                                    Malicious:false
                                                    Preview:# Tcl package index file, version 1.0..# This file is generated by the "pkg_mkIndex" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....package ifneeded http 1.0 [list tclPkgSetup $dir http 1.0 {{http.tcl source {httpCopyDone httpCopyStart httpEof httpEvent httpFinish httpMapReply httpProxyRequired http_code http_config http_data http_formatQuery http_get http_reset http_size http_status http_wait}}}]..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):25633
                                                    Entropy (8bit):4.8854383645737895
                                                    Encrypted:false
                                                    SSDEEP:768:rXugPHudKlExBG+Xg3Qonlm6ofRRECLSQDjr5vkhzx/i:ygGdKli4eonlm6offLzehNi
                                                    MD5:982EAE7A49263817D83F744FFCD00C0E
                                                    SHA1:81723DFEA5576A0916ABEFF639DEBE04CE1D2C83
                                                    SHA-256:331BCF0F9F635BD57C3384F2237260D074708B0975C700CFCBDB285F5F59AB1F
                                                    SHA-512:31370D8390C4608E7A727EED9EE7F4C568ECB913AE50184B6F105DA9C030F3B9F4B5F17968D8975B2F60DF1B0C5E278512E74267C935FE4EC28F689AC6A97129
                                                    Malicious:false
                                                    Preview:# init.tcl --..#..# Default system startup file for Tcl-based applications. Defines..# "unknown" procedure and auto-load facilities...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2004 Kevin B. Kenny. All rights reserved...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# This test intentionally written in pre-7.5 Tcl..if {[info commands package] == ""} {.. error "version mismatch: library\nscripts expect Tcl version 7.5b1 or later but the loaded version is\nonly [info patchlevel]"..}..package require -exact Tcl 8.6.12....# Compute the auto path to use in this interpreter...# The values on the path come from several locations:..#..# The environment variable TCLLIBPATH..#..# tcl_library, which is the directory containing this init.tcl script...# [t
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1038
                                                    Entropy (8bit):4.10054496357204
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383Hcm0hH9BncmtR7tK9dUVxMmALfpKIdzVJLd3xfjTuLM+vzkHWZ6tH9H0:4aR838HH9ekCkMmEfpK2xx2jiWZ0VbY
                                                    MD5:DA8BA1C3041998F5644382A329C3C867
                                                    SHA1:CA0BD787A51AD9EDC02EDD679EEEEB3A2932E189
                                                    SHA-256:A1EACA556BC0CFBD219376287C72D9DBBFAB76ECF9BF204FD02D40D341BAF7DA
                                                    SHA-512:4F086396405FDFE7FBDA7614D143DE9DB41F75BDBD3DB18B1EE9517C3DCCED238DD240B4B64829FD04E50F602DBF371D42A321D04C4C48E4B8B2A067CA1BAF2E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Ma"\.. "Di"\.. "Wo"\.. "Do"\.. "Vr"\.. "Sa"].. ::msgcat::mcset af DAYS_OF_WEEK_FULL [list \.. "Sondag"\.. "Maandag"\.. "Dinsdag"\.. "Woensdag"\.. "Donderdag"\.. "Vrydag"\.. "Saterdag"].. ::msgcat::mcset af MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset af MONTHS_FULL [list \.. "Januarie"\.. "Februarie"\.. "Maart"\.. "April"\.. "Mei"\.. "Junie"\.. "Julie"\.. "Augustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""].. ::msgcat::mcset af AM "VM
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.925537696653838
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xouFygMouFqF3v6ay/5ouFy9+3vR6HyFvn:4EnLB383RAgeYF3v6ay/RAI3voSVn
                                                    MD5:1B9DCD1C6FCDDC95AE820EA8DA5E15B8
                                                    SHA1:E8160353FD415BAB9FD5ACCA14E087C5E6AE836E
                                                    SHA-256:1548988458BBF0DFCCC23B7487CEC0E9C64E4CC8E045723E50BEC37C454A8C81
                                                    SHA-512:532AF060B95AED5E381B161BE56BC88D91A8F3DF2ACFD835491991F99FE752ADB4A3F93AB6D4E68F7042C28A3C1DD87A6312DFD9FFFAFD6ECE3F1B76837C5B7F
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af_ZA DATE_FORMAT "%d %B %Y".. ::msgcat::mcset af_ZA TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset af_ZA DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2018
                                                    Entropy (8bit):4.477377447232708
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83gr/fsS/Sm8p4M/n1KsPktE30AiJcAxi9CEzdEvSCHvMSV:43UkiSm8p3nX0EzdCSCPV
                                                    MD5:D264D01B46D96455715114CAEDF9F05E
                                                    SHA1:A3F68A4C6E69433BD53E52B73041575F3B3AC3F2
                                                    SHA-256:B69D0061A728D59F89FF8621312789CD9F540BF2E2ED297804D22F6278561D85
                                                    SHA-512:A4163DAA6821B293EADD5D499E0641A8B7C93180C710D6B364AE8681A8FF6F35EC948C8DDBE960A8466AF1ACABC15B0D465A08B084617E8005D708459F7E74D3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar DAYS_OF_WEEK_ABBREV [list \.. "\u062d"\.. "\u0646"\.. "\u062b"\.. "\u0631"\.. "\u062e"\.. "\u062c"\.. "\u0633"].. ::msgcat::mcset ar DAYS_OF_WEEK_FULL [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar MONTHS_ABBREV [list \.. "\u064a\u0646\u0627"\.. "\u0641\u0628\u0631"\.. "\u0645\u0627\u0631"\.. "\u0623\u0628\u0631"\.. "\u0645\u0627\u064a"\.. "\u064a\u0648\u0646"\.. "\u064a\u0648\u0644"\.. "\u0623\u063a\u0633"\.. "\u0633\u0628\u062a"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):265
                                                    Entropy (8bit):4.872222510420193
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoKNvfcoKU3v6xyFjoKNo+3vfXM68vn:4EnLB3831vfD3v6g9F3vfc6+n
                                                    MD5:430498B4AB1E77C86BC1311A49747581
                                                    SHA1:684EAD965D9010C2A6E73DCACB2224FDE585F9FF
                                                    SHA-256:2E04B96DA002519D28125918A22FF2BB9659A668A7BCAD34D85DDDECEC8DC0B4
                                                    SHA-512:9F85A88A383DCFC54DAA6253D94C307A14B1CC91D5C97AF817B8122AF98025AB2430D0B2D656EBED09E78FB854D1F9CF99F3B791A6ECB7834112012739140126
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_IN DATE_FORMAT "%A %d %B %Y".. ::msgcat::mcset ar_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ar_IN DATE_TIME_FORMAT "%A %d %B %Y %I:%M:%S %z %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1851
                                                    Entropy (8bit):4.08645484776227
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83sxS/Sm819+es/Ii/R91bpH0+U0c+es/Ii/R91bpH0+UO:43wiSm815MbJbHgMbJbp
                                                    MD5:5C62D606F4F14BC8994B28F9622D70DD
                                                    SHA1:E99F8CC5D330085545B05B69213E9D011D436990
                                                    SHA-256:5ADBB3D37C3369E5FC80D6A462C82598D5A22FAEF0E8DF6B3148231D2C6A7F73
                                                    SHA-512:81AC9200459B0896E27A028BD089A174F7F921B0367BC8FF1AB33D3E561417B6F8EC23DAB750ECB408AC8A11CDFDBFA4F890F9E723BB8607B017C9FEE00928A0
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_JO DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_JO MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1851
                                                    Entropy (8bit):4.083347689510237
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83LxS/Sm8S9+es/Ii/R91bpH0+U/c+es/Ii/R91bpH0+UO:431iSm8S5MbJbQgMbJbp
                                                    MD5:6FC1CC738207E2F8E0871103841BC0D4
                                                    SHA1:D2C62C7F6DA1EF399FCBE2BA91C9562C87E6152F
                                                    SHA-256:1FC13070CF661488E90FECE84274C46B1F4CC7E1565EAB8F829CCAA65108DFCA
                                                    SHA-512:E547D5CBB746654051AFDA21942075BC2224C2FF75D440C6C34C642AD24CF622E520FF919B8BD4AFC0116D9CE69B3ABA4E81EE247C1388F3C5741150201F5C60
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_LB DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_LB MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1851
                                                    Entropy (8bit):4.084701680556524
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83lxS/Sm8M9+es/Ii/R91bpH0+UBc+es/Iv/I91bpH0+UO:43LiSm8M5MbJbSgMo0bp
                                                    MD5:8188C37CA44FEFFF8D895AAD503AD4F6
                                                    SHA1:C48F2E3B9FC055704D2DAFDC67E9D08EE6897D45
                                                    SHA-256:294F3E46C55453EDAD44567E1330F9B43E69A07FA0655B24DD2780A4490C1194
                                                    SHA-512:F86FCFC7C460473D46C472041AB2E1F9388CF34BCA9050295D1DAE454E35A2A0320D0C61D5E8CBB832AF74FFDD1A7511AF32EA2A53B481F39A1CBCF5F086D514
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_SY DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_SY MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2157
                                                    Entropy (8bit):4.27810535662921
                                                    Encrypted:false
                                                    SSDEEP:48:43PI8IKQGQ8mA/XxQJxQnA9QJlPyI/tbCaQICMIcQ8InVI5tNIzQFIQQLtChjsI4:2PItK5BSb9ajfycCW5IzdQNxK
                                                    MD5:6334BDDFC1E0EAE4DBB2C90F85818FD8
                                                    SHA1:085EDC3D027D6B5A6A6A2561717EA89C8F8B8B39
                                                    SHA-256:A636A82C7D00CCDC0AF2496043FFA320F17B0D48A1232708810D3BB1453E881E
                                                    SHA-512:18ADB77314FCFD534E55B234B3A53A0BC572AB60B80D099D2F3B20E0C5FE66179FDC076AA43200DB3CA123BC6216989EC41448FA624D3BA9633413AD8AD6034C
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset be DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0430\u0442"\.. "\u0441\u0440"\.. "\u0447\u0446"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset be DAYS_OF_WEEK_FULL [list \.. "\u043d\u044f\u0434\u0437\u0435\u043b\u044f"\.. "\u043f\u0430\u043d\u044f\u0434\u0437\u0435\u043b\u0430\u043a"\.. "\u0430\u045e\u0442\u043e\u0440\u0430\u043a"\.. "\u0441\u0435\u0440\u0430\u0434\u0430"\.. "\u0447\u0430\u0446\u0432\u0435\u0440"\.. "\u043f\u044f\u0442\u043d\u0456\u0446\u0430"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset be MONTHS_ABBREV [list \.. "\u0441\u0442\u0434"\.. "\u043b\u044e\u0442"\.. "\u0441\u043a\u0432"\.. "\u043a\u0440\u0441"\.. "\u043c\u0430\u0439"\.. "\u0447\u0440\u0432"\.. "\u043b\u043f\u043d"
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1871
                                                    Entropy (8bit):4.4251657008559935
                                                    Encrypted:false
                                                    SSDEEP:48:43EUAIlnQf/QVdQ81mnEZqEavWQEQ3QvQrQL0QjQTtQDCQSY4tqP:27xMk+nEZqE3biIYbUi+C9y
                                                    MD5:E5225D6478C60E2502D18698BB917677
                                                    SHA1:52D611CB5351FB873D2535246B3A3C1A37094023
                                                    SHA-256:CFE4E44A3A751F113847667EC9EA741E762BBDE0D4284822CB337DF0F92C1ACA
                                                    SHA-512:59AB167177101088057BF4EE0F70262987A2177ECB72C613CCAAE2F3E8D8B77F07D15DA5BE3B8728E23C31A1C9736030AA4036A8CD00A24791751A298B3A88B3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bg DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0434"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset bg DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u043b\u044f"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0412\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0421\u0440\u044f\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u044a\u0440\u0442\u044a\u043a"\.. "\u041f\u0435\u0442\u044a\u043a"\.. "\u0421\u044a\u0431\u043e\u0442\u0430"].. ::msgcat::mcset bg MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset bg MO
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2335
                                                    Entropy (8bit):4.107102006297273
                                                    Encrypted:false
                                                    SSDEEP:24:4aR835e/MWrD//6HFEVcVVcCVcTUTVckVEVcT7VcEEVcby/Vcn0VcMr/0VcM8VcQ:43ktX++QalMObalMZ6IE6V
                                                    MD5:5D25E7FC65824AC987535FEA14A4045C
                                                    SHA1:85C10F05823CD3263FC7B3EC38796BEC261B3716
                                                    SHA-256:890EA6521DEB1B3C3913CCD92562F6360E064DAEE2E2B0356A6DD97A46264A1F
                                                    SHA-512:5D8A88ACAEBBF3CD721F288FA0F1FEE517EE568CA5482E30CFA1E36CD37DF011C449090E2D9041F1D046A191F13D4C5C4B6F9E2F16FD259E63CE46ECC4E4F81F
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn DAYS_OF_WEEK_ABBREV [list \.. "\u09b0\u09ac\u09bf"\.. "\u09b8\u09cb\u09ae"\.. "\u09ae\u0999\u0997\u09b2"\.. "\u09ac\u09c1\u09a7"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf"\.. "\u09b6\u09c1\u0995\u09cd\u09b0"\.. "\u09b6\u09a8\u09bf"].. ::msgcat::mcset bn DAYS_OF_WEEK_FULL [list \.. "\u09b0\u09ac\u09bf\u09ac\u09be\u09b0"\.. "\u09b8\u09cb\u09ae\u09ac\u09be\u09b0"\.. "\u09ae\u0999\u0997\u09b2\u09ac\u09be\u09b0"\.. "\u09ac\u09c1\u09a7\u09ac\u09be\u09b0"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf\u09ac\u09be\u09b0"\.. "\u09b6\u09c1\u0995\u09cd\u09b0\u09ac\u09be\u09b0"\.. "\u09b6\u09a8\u09bf\u09ac\u09be\u09b0"].. ::msgcat::mcset bn MONTHS_ABBREV [list \.. "\u099c\u09be\u09a8\u09c1\u09df\u09be\u09b0\u09c0"\.. "\u09ab\u09c7\u09ac\u09cd\u09b0\u09c1\u09df\u09be
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):265
                                                    Entropy (8bit):4.868201122972066
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xovtvfluo/E3v6xyFjovto+3vflm68vn:4EnLB383UtvfltE3v6g8tF3vflm6+n
                                                    MD5:B91BB2ABC23B90962D2070B9588F2AB5
                                                    SHA1:CBB4E9CD600773792C6E9F3E6B27E99C1846B44F
                                                    SHA-256:B3D8A4632290B0F3DA690E47C1FDF06A8B9E171A96E938AFDB0DD52CF806CE54
                                                    SHA-512:932FC4B8C3CA72731187D56012AD7DD7777C4D447F16EEB17B9D68235C9590DF99992FD22B8D7C85A843A610F93CD36FAFA993C34C441255A1C0A93C73BC5FE4
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn_IN DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset bn_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset bn_IN DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1152
                                                    Entropy (8bit):4.2880653012847985
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83FMVBNfPg+g+RjMu5+C6MB4zdiwvWvn:432g6jh65zd3gn
                                                    MD5:72DDD60C907DD235BCE4AB0A5AEE902C
                                                    SHA1:06150F793251687E6FBC3FDA3BC81BCBFC7DE763
                                                    SHA-256:3BE295DCC8FCDC767FED0C68E3867359C18E7E57D7DB6C07236B5BC572AD328E
                                                    SHA-512:3B0A85003692F1E46185D5CC09236D2DA5E6D29166C9812D07A7D6BF6AC6C3B0708F91C6899768D4DBA3528081B8B43E09F49622B70F1CF991AFAC5352B6BA37
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ca DAYS_OF_WEEK_ABBREV [list \.. "dg."\.. "dl."\.. "dt."\.. "dc."\.. "dj."\.. "dv."\.. "ds."].. ::msgcat::mcset ca DAYS_OF_WEEK_FULL [list \.. "diumenge"\.. "dilluns"\.. "dimarts"\.. "dimecres"\.. "dijous"\.. "divendres"\.. "dissabte"].. ::msgcat::mcset ca MONTHS_ABBREV [list \.. "gen."\.. "feb."\.. "mar\u00e7"\.. "abr."\.. "maig"\.. "juny"\.. "jul."\.. "ag."\.. "set."\.. "oct."\.. "nov."\.. "des."\.. ""].. ::msgcat::mcset ca MONTHS_FULL [list \.. "gener"\.. "febrer"\.. "mar\u00e7"\.. "abril"\.. "maig"\.. "juny"\.. "juliol"\.. "agost"\.. "setembre"\.. "octubre"\.. "novembre"\.. "desembre"\.. ""].. ::msg
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1354
                                                    Entropy (8bit):4.466447248030554
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83U4nZ4yJTkkG3mYWEZqO1R3DNBEVG+PYhxrU4UF3ecCvt7/v3e6:43TJTGmnEZqE5/EVEDOGtDp
                                                    MD5:F32EAD82CC26754C5A8E092873A28DB3
                                                    SHA1:325124660F62242B24623B4B737CB4616F86CFF3
                                                    SHA-256:AFEA12A16A6FA750EA610245133B90F178BA714848F89AEC37429A3E7B06BE1A
                                                    SHA-512:04E335AAFBF4D169983635FC87BCFFE86FBA570A3E1820D20240EF7B47E7A3CD94AE3598543DCE92A1F82B5146CAAD982EFE9490EFD9E581D58515CFC3930581
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset cs DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "\u00dat"\.. "St"\.. "\u010ct"\.. "P\u00e1"\.. "So"].. ::msgcat::mcset cs DAYS_OF_WEEK_FULL [list \.. "Ned\u011ble"\.. "Pond\u011bl\u00ed"\.. "\u00dater\u00fd"\.. "St\u0159eda"\.. "\u010ctvrtek"\.. "P\u00e1tek"\.. "Sobota"].. ::msgcat::mcset cs MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset cs MONTHS_FULL [list \.. "leden"\.. "\u00fanor"\.. "b\u0159ezen"\.. "duben"\.. "kv\u011bten"\.. "\u010derven"\.. "\u010dervenec"\.. "srpen"\.. "z\u00e1\u0159\u00ed"\.. "\u0159\u00edjen"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1208
                                                    Entropy (8bit):4.315504392809956
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83wV0tBVYuorIsmZ5meAxyISjTHU92WFVwpwvbvT:43w+DiuorreAY0zw8rT
                                                    MD5:27A6A8BE8903AEF9D0BE956906A89583
                                                    SHA1:EE29FDF67CB3AE150DF6BBBE603C1C3F5DA28641
                                                    SHA-256:0D422A991BCA13FE9033118691CFEDAB0F372222EBB0BC92BAF8E914EE816B84
                                                    SHA-512:0E702A679AD94BF479226B7DE32077562F3F95210F6453AE564138386DBB179941BA5359AEE9AC532F4A6E5BE745D6962D6B638A21DD48B865716F2FD2A0CB01
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset da DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset da DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset da MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset da MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marts"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset da B
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1276
                                                    Entropy (8bit):4.349293509679722
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83cFNSsZKKgXum47fpK2OaSIui7dHqWZ0ZIBFJWJvvvWIn:43InZKKgXoOqx1W67W9XWIn
                                                    MD5:EE3963A5F7E29C05C9617BE3FD897114
                                                    SHA1:0F978CA174DF596817F872B5EF1B447B9DFE651C
                                                    SHA-256:4C27733502066E8391654D1D372F92BF0484C5A3821E121AE8AA5B99378C99AE
                                                    SHA-512:EA933709C68F8199858A1CC1FFDA67EE7458CC57A163E672535EB0B4C37BFDC200604C7506748DAC3158B6CA63C2F076A2C6252B2A596E59F83D3B1D4BC9C901
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Mo"\.. "Di"\.. "Mi"\.. "Do"\.. "Fr"\.. "Sa"].. ::msgcat::mcset de DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mrz"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de BCE "v.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):847
                                                    Entropy (8bit):4.412930056658995
                                                    Encrypted:false
                                                    SSDEEP:24:4aR831sMm47fpK2++SIui7dHqWZ0ZItovGvzvW:431h+mx1Wm+QjW
                                                    MD5:A6227CD4F7434952D093F1F3C64B4378
                                                    SHA1:0DDB9A49CB83DDF2396B2ECA85093260710496C2
                                                    SHA-256:1C02D14140196623297F858E2EEF00B4159E1C6FAFE044EC65A48C9C24D46540
                                                    SHA-512:D63F34024356F5CE0335D14EA557F4BBF238CCA8265DD27C039C70F7F28FE737F368B030DEE10B2C536512D2815E1F5B19838D08745C6A76A39050D573597EB3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_AT MONTHS_ABBREV [list \.. "J\u00e4n"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_AT MONTHS_FULL [list \.. "J\u00e4nner"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de_AT DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset de_AT TIME_FORMAT "%T".. ::msgcat::mcset de_AT TIME_FORMAT_12 "%T".. ::msgcat::mcset de_AT DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1276
                                                    Entropy (8bit):4.389082225723362
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83B8VSysVB8VsZKKgJ5Mm47fpK26aSIui7dHqWZ0ZIlj5VevjevbDvW:43Bt1VBbZKKgJs6qx1Wc5VojobzW
                                                    MD5:C351057D8E5328C0790901D1F4DBEC9F
                                                    SHA1:F73DE8AEF7F8083B0726760AA003E81067A68588
                                                    SHA-256:532845CD15EC821C1939D000C648694A64E8CA8F0C14BAD5D79682CF991481CE
                                                    SHA-512:8152AD082D0A6A4EBE7E1CCA9D4A5F2E48ABE3F09F4385A517C523A67CA3B08E0F20C193D0F6850F37E55ED0CD6FBD201FE22CC824AF170976D04DB061212F2D
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_BE DAYS_OF_WEEK_ABBREV [list \.. "Son"\.. "Mon"\.. "Die"\.. "Mit"\.. "Don"\.. "Fre"\.. "Sam"].. ::msgcat::mcset de_BE DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de_BE MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_BE MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::m
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2304
                                                    Entropy (8bit):4.371322909589862
                                                    Encrypted:false
                                                    SSDEEP:24:4aR833v+ZYYWtv+nWfFyL1NYOg+EKVJQ19tWQYmYaYRn9sWuSAJIJ6eRa6WrmdlX:43/pZyLjY0uYR9QmdkjC9r
                                                    MD5:7DD14B1F4FF532DCAF6D4C6F0DF82E9A
                                                    SHA1:707875FEF4207EBB71D066FDC54C7F68560C6DAD
                                                    SHA-256:8B23E0E2F0F319BB9A2DFDCCDC565FF79A62FA85094811189B6BC41594232B6B
                                                    SHA-512:5ECA072DE5DD7890270AE268C7C8D40EE2DB6966643604D16E54194DB0AD74FDA8D04848331E61B387E8B494AF18252E38671D939069EC4C90C672A629563B88
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset el DAYS_OF_WEEK_ABBREV [list \.. "\u039a\u03c5\u03c1"\.. "\u0394\u03b5\u03c5"\.. "\u03a4\u03c1\u03b9"\.. "\u03a4\u03b5\u03c4"\.. "\u03a0\u03b5\u03bc"\.. "\u03a0\u03b1\u03c1"\.. "\u03a3\u03b1\u03b2"].. ::msgcat::mcset el DAYS_OF_WEEK_FULL [list \.. "\u039a\u03c5\u03c1\u03b9\u03b1\u03ba\u03ae"\.. "\u0394\u03b5\u03c5\u03c4\u03ad\u03c1\u03b1"\.. "\u03a4\u03c1\u03af\u03c4\u03b7"\.. "\u03a4\u03b5\u03c4\u03ac\u03c1\u03c4\u03b7"\.. "\u03a0\u03ad\u03bc\u03c0\u03c4\u03b7"\.. "\u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae"\.. "\u03a3\u03ac\u03b2\u03b2\u03b1\u03c4\u03bf"].. ::msgcat::mcset el MONTHS_ABBREV [list \.. "\u0399\u03b1\u03bd"\.. "\u03a6\u03b5\u03b2"\.. "\u039c\u03b1\u03c1"\.. "\u0391\u03c0\u03c1"\.. "\u039c\u03b1\u03ca"\.. "\u0399\u03bf\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):307
                                                    Entropy (8bit):4.896073290907262
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoCwmGjbmvFjoCws6W3v1oCws6W3v6p6HyFjoCwmT+3vjbe:4EnLB383QrmdSs6W3vss6W3v6QSoJ3ve
                                                    MD5:5B31AD8AC0000B01C4BD04BF6FC4784C
                                                    SHA1:F55145B473DDCAE38A0F7297D58B80B12B2A5271
                                                    SHA-256:705C66C14B6DE682EC7408EABDBA0800C626629E64458971BC8A4CBD3D5DB111
                                                    SHA-512:1CCE6BCAE5D1F7D80E10687F0BCA2AE1B2DD53F04A0F443DC9B552804D60E708E64326B62BA4E3787325D89837B4AC8CCCA9AF6F39CBD654BCC8A9C27EA63BB8
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_AU DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_AU TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_AU TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_AU DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):312
                                                    Entropy (8bit):4.870560620756039
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoCr3FuoCsX3vtfNrsoCsX3v6YNIdjoCs+3v3FnN9vn:4EnLB383H3Fb3vtNN3v6y43v3FnNNn
                                                    MD5:DDA87ACED97F9F7771788A1A0A1E4433
                                                    SHA1:E221653CD659C095098180344654770FF059331B
                                                    SHA-256:BC87754A253C1036E423FA553DA182DBC56F62A13EDA811D8CD9E8AFA40404A6
                                                    SHA-512:BB95D9241B05686CA15C413746DD06071635CB070F38847BE9702397A86C01A3D54DEBE1ACAA51834AB74DB8D0F75E353995183864E382721425756EE46B0B1E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BE DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_BE TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset en_BE TIME_FORMAT_12 "%k h %M min %S s %z".. ::msgcat::mcset en_BE DATE_TIME_FORMAT "%d %b %Y %k:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.915769170926952
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xosmGMoss6W3v6ay/5osmT+3vR6HyFvn:4EnLB383hr8s6W3v6ay/hJ3voSVn
                                                    MD5:4CBF90CE15ECCB6B695AA78D7D659454
                                                    SHA1:30C26ADB03978C5E7288B964A14B692813D6E0B8
                                                    SHA-256:EC48F18995D46F82B1CC71EA285174505A50E3BA2017BCCE2D807149B7543FD0
                                                    SHA-512:CC809EBD1B2B5D9E918C2E2CE4E7075DFB0744C583F17C1C234D8437EF0C34654D2F09FF77544AD3430CEC78ABC70AA5F85F71AD1489A687B8087FCDFE07B088
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_BW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_BW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):295
                                                    Entropy (8bit):4.87629705076992
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoAhgqyFjoAZF3vX5oAZF3v6cvBoAh9+3vnFDL8vn:4EnLB383FhgqWDZF3vVZF3v6cvdhI3vM
                                                    MD5:BFC4A48F5B10D137A4D32B440C47D3C6
                                                    SHA1:C90EF2A8291DE589BC12D0A5B8AF2F0B00FEB7CD
                                                    SHA-256:3CF2D0937FD95264549CF5C768B898F01D4875A3EB4A85D457D758BC11DFEC6E
                                                    SHA-512:A91B81A956A438CA7274491CA107A2647CBDFB8AEB5FD7A58238F315590C74F83F2EBA4AA5C4E9A4A54F1FC1636318E94E5E4BBEA467326E0EACED079741E640
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_CA DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_CA TIME_FORMAT "%r".. ::msgcat::mcset en_CA TIME_FORMAT_12 "%I:%M:%S %p".. ::msgcat::mcset en_CA DATE_TIME_FORMAT "%a %d %b %Y %r %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.892405843607203
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoEbtvqyFjoELE3vLjoELE3v6mjoEbto+3vnFDoAkvn:4EnLB383BbtvqWHLE3vTLE3v6EbtF3vW
                                                    MD5:52E55DE8C489265064A01CEEC823DCDD
                                                    SHA1:16F314A56AE0EAC9DAD58ADDEA6B25813A5BAA05
                                                    SHA-256:C2CE5B74F9E9C190B21C5DF4106303B7B794481228FB9A57065B9C822A1059C3
                                                    SHA-512:6010F29BF75D0CB4EE4F10781423A8CC68D5018DE8C633CD1217A7FE1299A0532E8C0E5D120188B748171EB255C587BB0B64B7384A58F725F3B6A4B9EA04393E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_GB DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_GB TIME_FORMAT "%T".. ::msgcat::mcset en_GB TIME_FORMAT_12 "%T".. ::msgcat::mcset en_GB DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):329
                                                    Entropy (8bit):4.851471679101967
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoa+joaQ9PoaAx/G4soaYYW3v6ay/5oaAx/T+3v4x6HyFvn:4EnLB383BSiF4KxW3v6ay/B/3v4ISVn
                                                    MD5:DE2A484508615D7C1377522AFF03E16C
                                                    SHA1:C27C0D10E7667AD95FFF731B4E45B2C6E665CC36
                                                    SHA-256:563450A38DB6C6A1911BC04F4F55B816910B3E768B1465A69F9B3BD27292DBEE
                                                    SHA-512:A360B0FD7E36BCC0FB4603D622C36199E5D4C705396C6701F29730EB5CB33D81B208541CADFAED5303FC329C7C6A465D23CA9584F0DEC2DE128E258478DD6661
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_HK AM "AM".. ::msgcat::mcset en_HK PM "PM".. ::msgcat::mcset en_HK DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_HK TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_HK DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.833246107458447
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoK6qyFjoKi+3vLjoKi+3v6mjoKv+3vnFDoAkvn:4EnLB383CqW13vJ3v6b3v9dmn
                                                    MD5:57F0BBE1316D14BC41D0858902A7980A
                                                    SHA1:B68BF99A021B9F01FE69341DF06F5D1453156A97
                                                    SHA-256:9E0DCEE86A03B7BDD831E0008868A9B874C506315BF01DF3982AD3813FD3BA8E
                                                    SHA-512:864F32254AAD39859AFC47D0C90DC5F38CA86EF0BBC7DE61BE253756C22B7806E616B59802C4F4D7B2F5543BF7C070FFF6FAF253E0A337EC443337E63A2E5A57
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_IE TIME_FORMAT "%T".. ::msgcat::mcset en_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset en_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):318
                                                    Entropy (8bit):4.80637980762728
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoKr3ujoKrGtoKr5vMoKrw3v1oKr5o+3voAsvn:4EnLB383T9xvT3vJF3vonn
                                                    MD5:1A54E506E70B2125C6016B373D3DD074
                                                    SHA1:15289902BAA93208D8FB224E119166D0E044E34E
                                                    SHA-256:ADEA3A1AB8AA84237DDB2F276ABDB96DCB4C51932E920D1A5E336904E1138664
                                                    SHA-512:0D663233E6C96515713B3B829B605E72D8CE581AEF1C02FF6CA96598C040DCA42A3AC765EE9B5002E8969A331EB19A9AF0F8215F7113D0AD2F2EB2C560239D53
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IN AM "AM".. ::msgcat::mcset en_IN PM "PM".. ::msgcat::mcset en_IN DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_IN TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_IN DATE_TIME_FORMAT "%d %B %Y %H:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):307
                                                    Entropy (8bit):4.939458132662909
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoyejbmvFjo63v1o63v6p6HyFjoy7+3vjb0ysvn:4EnLB383temdj3vd3v6QS1S3ven
                                                    MD5:7E81708F107658FFD31C3BFBF704A488
                                                    SHA1:7941ED040707591B68581337F8D90FA03C5E1406
                                                    SHA-256:EC305B7CB393421E6826D8F4FEA749D3902EBA53BFA488F2B463412F4070B9ED
                                                    SHA-512:8F038FF960F81D96FF9E3454D8ABDA7FFDA5B99DA304ACECC42E74DDBED839388246F66B58928DA902D3B475FBA46602B34F6829A87ECB1124FFC47C036B4DBE
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_NZ DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_NZ TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_NZ TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_NZ DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):329
                                                    Entropy (8bit):4.824360175945298
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoojoOo2e4soe3v6ay/5o27+3v4x6HyFvn:4EnLB38304u3v6ay/k3v4ISVn
                                                    MD5:E2E3BD806C20D7FB88109B7F3B84C072
                                                    SHA1:2D7AD6BECA9C4D611BAE9747AD55A3E9385C2B42
                                                    SHA-256:3A9C22B07906544C04F7A29B800FCE87C09D7FDF5C251236925115CF251A3890
                                                    SHA-512:B14756B59BCABF8B29B41AC688E4F3A011735AF190B88F88B7B5FDDD3DA77F63FFC0F7875B3B453729CD3BC65E79F75F6E632CA68952EF473F78337D89E80BF2
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_PH AM "AM".. ::msgcat::mcset en_PH PM "PM".. ::msgcat::mcset en_PH DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_PH TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_PH DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.911413468674953
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoQW53FuoQGuX3v6ZwoQWa+3v3F0fxvn:4EnLB383V83FOJ3v62c3v3FEn
                                                    MD5:F70245D73BE985091459ADF74B089EBC
                                                    SHA1:21D52C336C08526D9DCF1AEC1F0701CB8B073D7A
                                                    SHA-256:D565679AE9AACBFE3B5273FE29BD46F46FFBB63C837D7925C11356D267F5FF82
                                                    SHA-512:171C70EB10D5E6421A55CE9B1AE99763E23FB6A6F563F69FE099D07C07FCA0CF8D3F6F00C5BB38BFF59A5F4C311506C4A9593F86C12B3B9E1861E72656B3800B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_SG DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset en_SG DATE_TIME_FORMAT "%d %b %Y %P %I:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):251
                                                    Entropy (8bit):4.937431055623088
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoOr0lIZoOK3v6poOs+3v0l6Uvn:4EnLB383z+3v6R3vl2n
                                                    MD5:FCA7B13CA6C9527D396A95BEA94CC92D
                                                    SHA1:E6F338A08F72DA11B97F70518D1565E6EF9AD798
                                                    SHA-256:67C253E2A187AA814809418E5B7A21F3A1F9FB5073458A59D80290F58C6C1EB4
                                                    SHA-512:37B8B4EA24B1C77AF0252A17660650CB2D4F8BB55C75817D6A94E1B81A3DDEF9913D12D3BF80C7BFE524CD0AD84E353E73238056759E6545BFE69EF5F806B8B7
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZA DATE_FORMAT "%Y/%m/%d".. ::msgcat::mcset en_ZA TIME_FORMAT_12 "%I:%M:%S".. ::msgcat::mcset en_ZA DATE_TIME_FORMAT "%Y/%m/%d %I:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.934659260313229
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoEmGMoEs6W3v6ay/5oEmT+3vR6HyFvn:4EnLB383Zr0s6W3v6ay/ZJ3voSVn
                                                    MD5:A302091F490344B7A79C9463480AD7CF
                                                    SHA1:E3992D665077177BAD5A4771F1BAF52C2AD1829C
                                                    SHA-256:6F4754CE29DFA4F0E7957923249151CE8277395D1AF9F102D61B185F85899E4E
                                                    SHA-512:FEBDB0BD6D0FD4C592DB781836F93F0C579399D324112F8829B769303CC6EEA487AAB14EBD60ED1B4F3B3DABF501601C9F65656327FF54853BF2CD9EC6A2F00F
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_ZW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_ZW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1285
                                                    Entropy (8bit):4.3537859241297845
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83dRb4vyomrIsmZ55vrAO0LH+50ydAcveva:43PT5rWvrAR60yW6oa
                                                    MD5:D87605E6282713EED41D56D53B7A04FD
                                                    SHA1:41AAD4BD3B72CCBB6A762FEED3C24931642DD867
                                                    SHA-256:98D52CAB5CA65789D1DC37949B65BAF0272AB87BCCBB4D4982C3AF380D5406AB
                                                    SHA-512:4A4F51B2FD0248B52530B5D9FE6BFCFE455147CBE2C1F073804A53666945405F89CBBAD219FFF6904C1F92885F7C53B9D9A969732D662CEA8EC1717B3303B294
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eo DAYS_OF_WEEK_ABBREV [list \.. "di"\.. "lu"\.. "ma"\.. "me"\.. "\u0135a"\.. "ve"\.. "sa"].. ::msgcat::mcset eo DAYS_OF_WEEK_FULL [list \.. "diman\u0109o"\.. "lundo"\.. "mardo"\.. "merkredo"\.. "\u0135a\u016ddo"\.. "vendredo"\.. "sabato"].. ::msgcat::mcset eo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "a\u016dg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset eo MONTHS_FULL [list \.. "januaro"\.. "februaro"\.. "marto"\.. "aprilo"\.. "majo"\.. "junio"\.. "julio"\.. "a\u016dgusto"\.. "septembro"\.. "oktobro"\.. "novembro"\.. "decembro"\.. ""].. ::m
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1232
                                                    Entropy (8bit):4.2910064237800025
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83hEVIhlp4herIsYoorrClH+Fo9ARhprBvtFvr6:43OVY7+ercrmsYsr1thr6
                                                    MD5:91DE6EE8E1A251EF73CC74BFB0216CAC
                                                    SHA1:1FB01E3CF2CAFA95CC451BC34AB89DC542BBD7DD
                                                    SHA-256:E9A6FE8CCE7C808487DA505176984D02F7D644425934CEDB10B521FE1E796202
                                                    SHA-512:46CFD80E68461F165EE6A93AB6B433E4D4DA6A9A76CB7F3EF5766AC67567A7AFFB7B4E950A5AFA7C69C91F72AC82D2A448D32E39BBFC0BF26D2257460471EEC1
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mi\u00e9"\.. "jue"\.. "vie"\.. "s\u00e1b"].. ::msgcat::mcset es DAYS_OF_WEEK_FULL [list \.. "domingo"\.. "lunes"\.. "martes"\.. "mi\u00e9rcoles"\.. "jueves"\.. "viernes"\.. "s\u00e1bado"].. ::msgcat::mcset es MONTHS_ABBREV [list \.. "ene"\.. "feb"\.. "mar"\.. "abr"\.. "may"\.. "jun"\.. "jul"\.. "ago"\.. "sep"\.. "oct"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset es MONTHS_FULL [list \.. "enero"\.. "febrero"\.. "marzo"\.. "abril"\.. "mayo"\.. "junio"\.. "julio"\.. "agosto"\.. "septiembre"\.. "octubre"\.. "noviembre"\.. "diciembre"\.. ""].. ::msgc
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):248
                                                    Entropy (8bit):4.878377455979812
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo8GzvFjot/W3v1o8T+3v9ysvn:4EnLB3833GzdV3vLK3vnn
                                                    MD5:313966A7E4F50BB77996FDE45E342CA9
                                                    SHA1:021DF7211DAE9A635D52F7005672C157DBBAE182
                                                    SHA-256:B97DCEA4FEC3E14632B1511D8C4F9E5A157D97B4EBBC7C6EE100C3558CB2947F
                                                    SHA-512:79DCC76263310523BAF1100C70918FCE6BECB47BE360E4A26F11C61F27E14FC28B588A9253AA0C1F08F45AE8A03312A30FBDCF4FDFFDC5BF9D086C4B539DE022
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_AR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_AR TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset es_AR DATE_TIME_FORMAT "%d/%m/%Y %H:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.924579610789789
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoYePWWjoU3v6ry/5oY7+3vPUe6HyFvn:4EnLB383nedh3v6ry/nS3vs3SVn
                                                    MD5:EF58B1097A3C6F2133BD7AA8CCC1AD1B
                                                    SHA1:BD479E4635F3CD70A6A90E07B7E92757BC9E2687
                                                    SHA-256:B47F55539DB6F64304DEA080D6F9A39165F1B9D4704DCBA4C182DBD3AA31A11B
                                                    SHA-512:F9EB1489E5002200D255A45DC57132DEFD2A2C6DE5BC049D0D9720575E4FDD1B6A212D9E15974C6A2E0D0886069EA0DD967AD7C20845EC38EB74CBED0C3E5BE1
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_BO DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_BO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_BO DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.9352990174129925
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xodvPWWjok3v6ry/5odo+3vPUe6HyFvn:4EnLB383OdV3v6ry/i3vs3SVn
                                                    MD5:42BCE0EE3A3F9E9782E5DE72C989903A
                                                    SHA1:0960646417A61E8C31D408AE00B36A1284D0300E
                                                    SHA-256:9D1A2A6EBA673C6F6D964DBCDDF228CB64978F282E70E494B60D74E16A1DB9CB
                                                    SHA-512:C53DDCC17F261CFFAA2205879A131CFD23A7BCF4D3787090A0EA8D18530C4805903ED6CF31B53A34C70510A314EBBB68676E9F128289B42C5EFBC701405D5645
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CL DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_CL TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CL DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.908553844782894
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo4FjbmvFjo4F+3v6ry/5o4++3vjb0f6HyFvn:4EnLB3831mdD+3v6ry/P3vbSVn
                                                    MD5:6A8F31AE734DCEE4845454408CDB3BC5
                                                    SHA1:A3B9A0124D3CFA9E0E5957612897B23193AD5D59
                                                    SHA-256:5FAC53ACFB305C055AFD0BA824742A78CB506046B26DAC21C73F0BB60C2B889A
                                                    SHA-512:188A65CFE2FBD04D83F363AEA166F224137C8A7009A9EBEB24B2A9AC89D9484D3A7109A4CE08F5C0A28911D81571230CC37554F4F19956AE163F9304911EE53C
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CO DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_CO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CO DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.919346233482604
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo76GzvFjoTW3v6ry/5o76T+3v9f6HyFvn:4EnLB383K6Gzdj3v6ry/K6K3vMSVn
                                                    MD5:2EDDA3F61BA4D049E6C871D88322CF72
                                                    SHA1:40AFB64AF810596FCBDBD742ACAFE25CE56F3949
                                                    SHA-256:A33DC22330D087B8567670B4915C334FF1741EE03F05D616CC801ECFDA1D9E64
                                                    SHA-512:B6A6059B44F064C5CB59A3DAFAA7BE9064EE3E38F5FA6391017D931EF3A2B471DC4D556B7BEC6852FD1F6260EF17F476754D6BEA89E035748E9304977513CFB5
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_CR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CR DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.913083040975068
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xomerQZ2jou3v6ry/5om7+3vrQZg6HyFvn:4EnLB383sk4/3v6ry/s3vkrSVn
                                                    MD5:76CFD4F568EA799F9A4082865633FF97
                                                    SHA1:B09846BBF7A78243A5075F2DC9241791DCBA434B
                                                    SHA-256:8DC2F857E91912ED46A94EB6B37DD6170EA7BCDDCD41CB85C0926A74EE12FCC1
                                                    SHA-512:58B20A8A5D1F8C19AC36E61965106266B7E6F7E95DDD6AD9C4BB9FD7FFC561CB0E2103639D901A6A78CE2DD154CBF7F3AE0F71B4DC1CCB11DC6BB40D9C6E2157
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_DO DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_DO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_DO DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.915857529388286
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xozgzvFjoro+3v6ry/5oz9+3v9f6HyFvn:4EnLB383OgzdkF3v6ry/OI3vMSVn
                                                    MD5:94B713B1560FE7711EA746F1CEBD37CD
                                                    SHA1:E7047E8F04D731D38FA328FBC0E1856C4A8BB23D
                                                    SHA-256:52AB5A6C9DD4F130A75C049B3AF8F54B84071FC190374BCCF5FA0E1F3B91EB21
                                                    SHA-512:EE807D4D74A609F642CC3C6FC3D736708F67A6931DEB95288AB5822DA256BE4C908A346036195CF4266408458906D28BB5C715EEAFCACFC4FE45D4E6D8E435FE
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_EC DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_EC TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_EC DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.9102355704853435
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xohvjbmvFjoI3v6ry/5oho+3vjb0f6HyFvn:4EnLB383KmdJ3v6ry/W3vbSVn
                                                    MD5:761D0A468DF2EE75BC2CAB09D5FF38CD
                                                    SHA1:D627BE45FE71CCB3CA53153393C075FF5136C2F3
                                                    SHA-256:19B4D3025156C060A16328370A3FDB9F141298DECFC8F97BE606F6438FECE2EE
                                                    SHA-512:6CF7C9004A8A3B70495862B7D21921B1A6263C2153FEBC5C4997366498ABBFE70263B436C2B4998550780A4C3A58DCF0AAE7420FF9D414323D731FA44BD83104
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_GT DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_GT TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_GT DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.947925914291734
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoIvriSFjoP3v6ry/5oIo+3vrig6HyFvn:4EnLB383V+2m3v6ry/v3v+lSVn
                                                    MD5:33CEE7F947A484B076F5FA7871A30FEB
                                                    SHA1:F77F8D1F42008770A6FF1F5097C863ECF482BEBE
                                                    SHA-256:07873D4D59BB41000706A844859C73D26B1FF794058AA83CFFCA804981A24038
                                                    SHA-512:EBF6873F9CB554489EFCD352943100C00171E49D27153769D1C4DB25E2D1F44F2D34869B596C267C9BB59ED0444468D9982137CFB1C6035FB15A855BB867133B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_HN DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_HN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_HN DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.9102355704853435
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoPjbmvFjoH+3v6ry/5oI+3vjb0f6HyFvn:4EnLB383UmdD3v6ry/k3vbSVn
                                                    MD5:678D7A6DC32355246BF3AC485A24AF4D
                                                    SHA1:B6C273D3BE5FB9F5A221B0333870CCE41CEDFDE4
                                                    SHA-256:A0F57137D2C0ABDC933E03CFB188F5632176C195CEADB9DC80D469C8DC6CEDC6
                                                    SHA-512:571404CCB0591C681C975E3F7A6C6972FAF2362F1D48BFC95E69A9EAE2DB3F40BF4B666C41950C4924E3FD820C61ED91204F92283B8554F1BD35B64D53BD4125
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_MX DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_MX TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_MX DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.918215906418583
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoe/GriSFjo3W3v6ry/5oe/T+3vrig6HyFvn:4EnLB383Re+2eW3v6ry/RS3v+lSVn
                                                    MD5:471C41907CE5DB1F30C647A789870F78
                                                    SHA1:C575A639609620AF7C56430991D0E4C2B50BDEC5
                                                    SHA-256:6250663DA1378E54BEDCEF206583D212BC0D61D04D070495238D33715BB20CAE
                                                    SHA-512:CAE32DF8F583542CAFE3292501725D85B697A5C1F9A0A7993490E8A69B6CE5CE3DE3AA2733B14D989A8D13B5E31B437DB42E9AB9D1851FE72313592C752B5061
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_NI DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_NI TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_NI DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.906719336603863
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoX5rQZ2joHE3v6ry/5oXa+3vrQZg6HyFvn:4EnLB383ak4F3v6ry/G3vkrSVn
                                                    MD5:571F6716293442672521F70854A5AD05
                                                    SHA1:525EBDEA6F85FC769B6C0C0B179BD98381647123
                                                    SHA-256:EBB661C1C09E7D4F6FBCC4B2DAD0F41442B1FFDD27F003ABDC0375DD316E57D7
                                                    SHA-512:C6176EE48515BDFC09B8347DAC5FD2C0165AA765916457DC7B057E526785AC912481CB72F118D2943372213B23CE3C39739263C2B3DA4DBFEB24C522ACC0439D
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PA DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_PA TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PA DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.90959433688075
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoIgzvFjoQ9X3v6ry/5oI9+3v9f6HyFvn:4EnLB383+zdB3v6ry/y3vMSVn
                                                    MD5:5A5997D834DDD3E2E8FF8C6956AD54AC
                                                    SHA1:AB4110E37B3665D738A8F2B3E64CBA9E99127301
                                                    SHA-256:90C130B66958CF63CB3DDD2C633E58444357DBAB44C56831DD794CBD2EB1AED0
                                                    SHA-512:1FEB8E77EA7B886E4A06279AC8A4B6200DBB86DCD28989651B92A0C9147A7BCFBB871DF8F904A1CF8F869BFFBD21325505AC44A4DBEBE1EFC87D43174597F1F3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.905689521403511
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo06GriSFjoeW3v6ry/5o06T+3vrig6HyFvn:4EnLB383gG+263v6ry/gK3v+lSVn
                                                    MD5:CE811BB8D12C7E6D53338759CCFB0A22
                                                    SHA1:0AED290AA479DE6887CCB58D3F0A0F379EF8D558
                                                    SHA-256:F790E8E48DC079DCD7DEB58170561006A31294F7E4ACBF9CF2ABFA3DB9E3FA9E
                                                    SHA-512:0C73654CC3D33F76D9BF545BD6C5E42CBDD10B6D9750BFD6536806010F3B6A3C3647FB9D5E7E75A39823FDB857E13D07B7F987809C94B9F980E6D3A6D3108E85
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PR DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_PR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PR DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.917539255090736
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo/5zvFjovE3v6ry/5o/a+3v9f6HyFvn:4EnLB383Czdt3v6ry/+3vMSVn
                                                    MD5:9CD6FAC4121E3D287C87157142E32845
                                                    SHA1:3081FE2197017EC8E052756A407880C1C4ED026A
                                                    SHA-256:70263F7EB22822DFEE8849B7AC4418ED9331275A71E77236B59226396505CDFF
                                                    SHA-512:25DC054085C4078734988EEDD87E31ABE93DA8B43512E924DE4BCDE9F8EC670436B72FAD1855484F9AC71DD0BEDD9ED30304D02219C4FFC4B0516D8889BDF9F9
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.929035824905457
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xofriSFjo3+3v6ry/5oY+3vrig6HyFvn:4EnLB383Y+22+3v6ry/Q3v+lSVn
                                                    MD5:AF300EA6E733DC6820768EA16194B472
                                                    SHA1:7766A6EB3D07BCC759CF6718EF3D6EC3FCE13565
                                                    SHA-256:26A38B3745C95673D21BABB987F1D41EE08DDA945C670F5432BA0CE6F893C0E9
                                                    SHA-512:C38D67C912584BE539D71881C6517AC186CBB336A160602DA716CE2708B2D38CE8FA7DD23EDB98890ABB7119B924B6C7816C18EC18F20C49D6284DF2386E32EE
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_SV DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_SV TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_SV DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.923802447598272
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xooygzvFjooq9X3v6ry/5ooy9+3v9f6HyFvn:4EnLB3835rzdbsX3v6ry/5J3vMSVn
                                                    MD5:2DC550FEC3F477B1159B824479BCE707
                                                    SHA1:4D0B20CF3E50B64D74655A405A7750E0B0BB4375
                                                    SHA-256:1291B58810739EA0651493DD7887F5EE3E14BDB806E06DD4BB8AE2520C742EDA
                                                    SHA-512:B12B927ACA6274904928A6A6CAEC8339A794C74A1F1804FF93AABC132AF9AD8AC5117F20067A60EFEBC9887150D7ACA5BE9643FF61509666011FD203211C25B9
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_UY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_UY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_UY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.928484426267027
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoXrzvFjoXK3v6ry/5oXs+3v9f6HyFvn:4EnLB3838zdv3v6ry/c3vMSVn
                                                    MD5:184D6C4B9F0AA874DEB959F63F7CC01B
                                                    SHA1:5FB370B498289590C977F6B489FF646F0FB27425
                                                    SHA-256:91191517403C712299919F9C797F952502E33CB6961D1DBEE3A7C9E8D2B170B9
                                                    SHA-512:881CCAB0950AE993744ECCA141120C005F53D684167A3E5CBDDF950D110D630FB2B4F6AE6E3D0E06D5110AE25EA00A4F4DAFB03AD3B227DC8C63464D434431DA
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_VE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_VE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_VE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1258
                                                    Entropy (8bit):4.391217201307309
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83P1Y2+1YoQVTsC/m48qpRTVTR7I/68qqq4Z0yoN7emG5wsvtqmsv5t:43P1p+1jQ9sq8y9v8Yko7emG5wKtqmKX
                                                    MD5:C8C5EF2FA6DD8DBD5BBD2699BE1A0BF6
                                                    SHA1:F5E26B40786B8987C98F9CBDEF5522043574A9ED
                                                    SHA-256:4BEE224C21B0483CFF39BE145C671AA20CB7872C8727FD918C0E8ECA2BBEB172
                                                    SHA-512:757FA85C137A11C1A3F4A8392C7A4E4030A67D0E593FA25A98BEC07DB295399AB2C0D9EBE61E07420B14387A29C060DC3AF812A1E7B85110DBB13C3C3DCB3600
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset et DAYS_OF_WEEK_ABBREV [list \.. "P"\.. "E"\.. "T"\.. "K"\.. "N"\.. "R"\.. "L"].. ::msgcat::mcset et DAYS_OF_WEEK_FULL [list \.. "p\u00fchap\u00e4ev"\.. "esmasp\u00e4ev"\.. "teisip\u00e4ev"\.. "kolmap\u00e4ev"\.. "neljap\u00e4ev"\.. "reede"\.. "laup\u00e4ev"].. ::msgcat::mcset et MONTHS_ABBREV [list \.. "Jaan"\.. "Veebr"\.. "M\u00e4rts"\.. "Apr"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "Aug"\.. "Sept"\.. "Okt"\.. "Nov"\.. "Dets"\.. ""].. ::msgcat::mcset et MONTHS_FULL [list \.. "Jaanuar"\.. "Veebruar"\.. "M\u00e4rts"\.. "Aprill"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "August"\.. "September"\.. "Oktoober"\.. "November"\.. "De
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1032
                                                    Entropy (8bit):4.002617252503668
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83DEXk8TT7vXk8TTMtzCIsOo/ssP6tvf1I49sHT:434bTbbTc+RjKi4mz
                                                    MD5:ED9805AF5BFB54EB28C6CB3975F86F5B
                                                    SHA1:2BD91BD850028712F35A2DDB2555036FBF6E8114
                                                    SHA-256:6889B57D29B670C6CFB7B5A3F2F1749D12C802E8E9629014D06CE23C034C7EF1
                                                    SHA-512:16F31DE5D2B0D3ED2D975C7891C73C48F073CDAC28F17572FC9424C2D384DDFE9E5E235F17C788F42840CB2D819D2D9499B909AB80FEF1B09F2AE1627CF1DADC
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu DAYS_OF_WEEK_ABBREV [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu DAYS_OF_WEEK_FULL [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu MONTHS_ABBREV [list \.. "urt"\.. "ots"\.. "mar"\.. "api"\.. "mai"\.. "eka"\.. "uzt"\.. "abu"\.. "ira"\.. "urr"\.. "aza"\.. "abe"\.. ""].. ::msgcat::mcset eu MONTHS_FULL [list \.. "urtarrila"\.. "otsaila"\.. "martxoa"\.. "apirila"\.. "maiatza"\.. "ekaina"\.. "uztaila"\.. "abuztua"\.. "iraila"\.. "urria"\.. "azaroa"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):294
                                                    Entropy (8bit):4.915392589807169
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoszFnJF+l6VvBoszw3vLjoszw3v6mjosz++3v/RHvn:4EnLB383FL+l6VQ3vO3v6G3vZPn
                                                    MD5:4C91AA000D4316585893025CBB96E910
                                                    SHA1:3D4E73839A1A8CB9DEC1E59D9D2813257D9480F0
                                                    SHA-256:D45CC432E5743E6CEC34E9A1E0F91A9D5C315CDA409E0826B51AD9D908479EB6
                                                    SHA-512:0731F2EEB22ADC7EF8AF215B9EB4C5A66B33BC90E4F80CF7AA482AD002CB30543547230124A0507EC79EDDD6903A042EDA5D7C8AFD77F7FC994EFC6853FABB05
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu_ES DATE_FORMAT "%a, %Yeko %bren %da".. ::msgcat::mcset eu_ES TIME_FORMAT "%T".. ::msgcat::mcset eu_ES TIME_FORMAT_12 "%T".. ::msgcat::mcset eu_ES DATE_TIME_FORMAT "%y-%m-%d %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1711
                                                    Entropy (8bit):4.21837106187395
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83CnMqnbxbGwgjSyiY/Xw2mS1yM/8ye48YyfNqTb2gyj/8yHkQp:43Yzyhgvs9yi4P
                                                    MD5:7AB25F4E7E457469DC61A33176B3AA72
                                                    SHA1:EEA98283D250A99E33DD4D5D9B1B76A029716CE6
                                                    SHA-256:86898728B275288693B200568DC927C3FF5B9050690876C4441A8339DAE06386
                                                    SHA-512:7524437F91E91751BEB7A378D7674C49E5D84B716FE962F4C23580C46A671F3F33638FCD37A8F90C86E24DA8F54448E06AC9C3AEFFB5613E94A04E512C1AD68D
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0648\u062a
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2009
                                                    Entropy (8bit):4.491667766230948
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83KnMqnbxbGUgjDiY/Xw2mS1yM/8ye48tfNqTb2gyj/8yHkQLoRv9v/vNv0P:43wihgvsai4Rmv53JU
                                                    MD5:C59EE7CA80AD9F612A21C8B6674A820E
                                                    SHA1:AEFD631EFC1892063244FA622DE1A091C461E370
                                                    SHA-256:6B56545C1AE1DE53BC2389BB7AE59F115BADE24F907E384E079491DC77D6541D
                                                    SHA-512:42F52091480599D317FB80DF8E52A6C6F88614C6172BF4033974DD136FB30E6F47D38982C8A7BC14CF3165C3EBAE3680F94DF3A0ED079AB68165286251CD0BD7
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IN DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa_IN DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa_IN MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):426
                                                    Entropy (8bit):5.12739029869254
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383D2WGz7A/3vy3v6TANCmK3vz7AAbn:4aR83DoPivkvFk5vPN
                                                    MD5:9778A7C3ABD37ECBEC0BB9715E52FAF8
                                                    SHA1:D8063CA7779674EB1D9FE3E4B4774DB20B93038B
                                                    SHA-256:3D9779C27E8960143D00961F6E82124120FD47B7F3CB82DB3DF21CDD9090C707
                                                    SHA-512:B90B4A96CE5E8B9BF512B98C406603C60EA00F6740D04CD1FC30810C7155A37851AE5E28716F959137806F1A9E3152D2A0D79B8EA7E681A0737A28593657DE66
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IR AM "\u0635\u0628\u062d".. ::msgcat::mcset fa_IR PM "\u0639\u0635\u0631".. ::msgcat::mcset fa_IR DATE_FORMAT "%d\u2044%m\u2044%Y".. ::msgcat::mcset fa_IR TIME_FORMAT "%S:%M:%H".. ::msgcat::mcset fa_IR TIME_FORMAT_12 "%S:%M:%l %P".. ::msgcat::mcset fa_IR DATE_TIME_FORMAT "%d\u2044%m\u2044%Y %S:%M:%H %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1195
                                                    Entropy (8bit):4.32217771842326
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83KTvIhmuw4tW/UWJTttWKeqA+3ewvtyv3e6:43YvIwuw4t05ttnlzt0p
                                                    MD5:CC06F0ABD8F985654DAD8256598EBCB7
                                                    SHA1:71C880F9F395ACD32AF7F538033211F392F83645
                                                    SHA-256:9929A6B7139BD7E0F29487F7888A83E4C4F5E9CE0352738CFCA94EE2DDF3BD6B
                                                    SHA-512:E1292665270B6FBF7738CC3864B55194E7B827C6AD9492FB2E54DC1B626159B243052CE502335B9D92E2B8F58A4DD1FA0E628CB6A9D1D3A652FE2B93A3FB711A
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fi DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "ma"\.. "ti"\.. "ke"\.. "to"\.. "pe"\.. "la"].. ::msgcat::mcset fi DAYS_OF_WEEK_FULL [list \.. "sunnuntai"\.. "maanantai"\.. "tiistai"\.. "keskiviikko"\.. "torstai"\.. "perjantai"\.. "lauantai"].. ::msgcat::mcset fi MONTHS_ABBREV [list \.. "tammi"\.. "helmi"\.. "maalis"\.. "huhti"\.. "touko"\.. "kes\u00e4"\.. "hein\u00e4"\.. "elo"\.. "syys"\.. "loka"\.. "marras"\.. "joulu"\.. ""].. ::msgcat::mcset fi MONTHS_FULL [list \.. "tammikuu"\.. "helmikuu"\.. "maaliskuu"\.. "huhtikuu"\.. "toukokuu"\.. "kes\u00e4kuu"\.. "hein\u00e4kuu"\.. "elokuu"\.. "syyskuu"\.. "lokakuu"\.. "marraskuu"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1033
                                                    Entropy (8bit):4.15884265510429
                                                    Encrypted:false
                                                    SSDEEP:24:4aR834YPxTSBFSa+E6rIsmYmyAxyIQbXHU92W1T:43a6rIyAE0B
                                                    MD5:5D224E66FD9521CA4327D4F164CD6585
                                                    SHA1:FC8F4C1D9A69931679028DE02155D96A18F6542E
                                                    SHA-256:2EC9B03469FA38B260915C93318F446EA5E12B9090BD441936B57552EBA1E3C9
                                                    SHA-512:0E0F97D99F0274A8A92AA7DC992B252A0BB696D69A8835602D8F4C03A6A15780F45971F00863436949CD81AD7DF6EE6BC463CE5B9FECF5E39508BA4D4E83C693
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo DAYS_OF_WEEK_ABBREV [list \.. "sun"\.. "m\u00e1n"\.. "t\u00fds"\.. "mik"\.. "h\u00f3s"\.. "fr\u00ed"\.. "ley"].. ::msgcat::mcset fo DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nadagur"\.. "t\u00fdsdagur"\.. "mikudagur"\.. "h\u00f3sdagur"\.. "fr\u00edggjadagur"\.. "leygardagur"].. ::msgcat::mcset fo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset fo MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "apr\u00edl"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.864028070948858
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoZA4WjoZd3vLjoZd3v6mjoZd+3vnFDoAkvn:4EnLB3831P23vS3v6u3v9dmn
                                                    MD5:92E2B6483B2374817548F4EAA1731820
                                                    SHA1:071E1E9368CCB4EC864E78622B2113F460920203
                                                    SHA-256:C3DCCF5E5904C24D4AD9AAA36160A78F5397A7452510C0C0E61DE4DE863305CB
                                                    SHA-512:E79D4D38A22298252FA46D15C383CFB2A1E49E8196C265A58F9BA4982DFD9CE29E87C0B85BE3F39617359451831B792FCD3092A52EDF8FFD999AFE5CFE1D170D
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo_FO DATE_FORMAT "%d/%m-%Y".. ::msgcat::mcset fo_FO TIME_FORMAT "%T".. ::msgcat::mcset fo_FO TIME_FORMAT_12 "%T".. ::msgcat::mcset fo_FO DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1257
                                                    Entropy (8bit):4.383721663740675
                                                    Encrypted:false
                                                    SSDEEP:24:4aR835LzAX2t6KOkPwzZIGzRmzQf1waGqHvivh:43mlwIFZtA/qPkh
                                                    MD5:4D63B4A7CF13A28A6F6784B5597EEF43
                                                    SHA1:FE1B35A93CB72666D7D6BC37D9BE081B05A00CD9
                                                    SHA-256:96B1E1E12CD13A56722EBF27D362C70B467342FA1282A40B89FB16B5105A0480
                                                    SHA-512:5647CAE859B62C7CE1CEE6426A076361D2A29EFE6B6F311DDC0E7D006194BA68D575852FEC5FDE2AB43DF8AE440C57013D32A3951095CB856327070FD9BD1C76
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr DAYS_OF_WEEK_ABBREV [list \.. "dim."\.. "lun."\.. "mar."\.. "mer."\.. "jeu."\.. "ven."\.. "sam."].. ::msgcat::mcset fr DAYS_OF_WEEK_FULL [list \.. "dimanche"\.. "lundi"\.. "mardi"\.. "mercredi"\.. "jeudi"\.. "vendredi"\.. "samedi"].. ::msgcat::mcset fr MONTHS_ABBREV [list \.. "janv."\.. "f\u00e9vr."\.. "mars"\.. "avr."\.. "mai"\.. "juin"\.. "juil."\.. "ao\u00fbt"\.. "sept."\.. "oct."\.. "nov."\.. "d\u00e9c."\.. ""].. ::msgcat::mcset fr MONTHS_FULL [list \.. "janvier"\.. "f\u00e9vrier"\.. "mars"\.. "avril"\.. "mai"\.. "juin"\.. "juillet"\.. "ao\u00fbt"\.. "septembre"\.. "octobre"\.. "novembre"\.. "d\u00e9cembre
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.910112619660625
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoXqyFjoIX3vLjoIX3v6mjog+3vnFDoAkvn:4EnLB383AqWv3vL3v6d3v9dmn
                                                    MD5:07EEADB8C2F2425FF9A27E46A81827A2
                                                    SHA1:AA18A651C64098C7885F1F869B9F221453F42987
                                                    SHA-256:AAD828BCBB512FBD9902DCDD3812247A74913CC574DEB07DA95A7BBE74B1FE48
                                                    SHA-512:1FA60B1A69B2F5FD2C009EC18695A937C4484D7C418F7E8398D95723B857698143E0584A546F9032B75894730CBBEF78453061AC13D90199FF702E148D983C28
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_BE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset fr_BE TIME_FORMAT "%T".. ::msgcat::mcset fr_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.890376345610709
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xooIso13vLjo13v6mjo1+3vnFDoAkvn:4EnLB383vIF3vU3v6A3v9dmn
                                                    MD5:2F70BDDE7685E2892C5F79C632FC2F0F
                                                    SHA1:FD1A6F6042E59D1563ABB5858C348C1D785C435E
                                                    SHA-256:0624DF9A56723DDB89E59736C20A5837DEA2206A789EBE7EEF19AD287590CA45
                                                    SHA-512:50FC0C91AB2C75FFC4F100C0D42DFC4B2101DB9713FD77E6FF5BF3F25A0AF4A535A4709CF4586809CEEE76C25B66ABC0DD4FD61524510C57AA0E63EA8F46E8D5
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CA DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset fr_CA TIME_FORMAT "%T".. ::msgcat::mcset fr_CA TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CA DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):288
                                                    Entropy (8bit):4.913241133684606
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoFt28oF+3vLjoF+3v6mjo++3vnFDoAkvn:4EnLB383yte+3vs+3v6/3v9dmn
                                                    MD5:83FC7EBA68C3727F7C13C8EEAF79823F
                                                    SHA1:81C27F9B97F5F5190F7189230535EC09CD228158
                                                    SHA-256:290CA6EB74BAEAC4E2420D0755D148849F89EE87E37860F25CBB7B8AFA3EDCBC
                                                    SHA-512:35DA46558A246D7B3FAB02208001CE986E2E6DD88D6318AF743F4E81CA6920471D1425BB009A7476A79E7F61E1353C027B765331CD8EFA07A9E884DCB73F2195
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CH DATE_FORMAT "%d. %m. %y".. ::msgcat::mcset fr_CH TIME_FORMAT "%T".. ::msgcat::mcset fr_CH TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CH DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1188
                                                    Entropy (8bit):4.314271783103334
                                                    Encrypted:false
                                                    SSDEEP:24:4aR835k0CM/hlrXa754pD73/tKSx54pbIK5f2CA:43W05rXUa173/VadDA
                                                    MD5:67D137E5D853DB61A4B4264871E793F7
                                                    SHA1:4280E7F662DE792175AF8B4C93874F035F716F0F
                                                    SHA-256:880806867ACABD9B39E3029A5ADD26B690CC5709082D43B0959EBA725EA07AB5
                                                    SHA-512:C27B745143539D3E6D94BB754DCA35065CDE9B1AA6EE038D47F658175CFACC20236124D38BE5BBB03CAF8F613BD748C43CB8DFCC9234E915D18B5A477BAEF94E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga DAYS_OF_WEEK_ABBREV [list \.. "Domh"\.. "Luan"\.. "M\u00e1irt"\.. "C\u00e9ad"\.. "D\u00e9ar"\.. "Aoine"\.. "Sath"].. ::msgcat::mcset ga DAYS_OF_WEEK_FULL [list \.. "D\u00e9 Domhnaigh"\.. "D\u00e9 Luain"\.. "D\u00e9 M\u00e1irt"\.. "D\u00e9 C\u00e9adaoin"\.. "D\u00e9ardaoin"\.. "D\u00e9 hAoine"\.. "D\u00e9 Sathairn"].. ::msgcat::mcset ga MONTHS_ABBREV [list \.. "Ean"\.. "Feabh"\.. "M\u00e1rta"\.. "Aib"\.. "Beal"\.. "Meith"\.. "I\u00fail"\.. "L\u00fan"\.. "MF\u00f3mh"\.. "DF\u00f3mh"\.. "Samh"\.. "Noll"\.. ""].. ::msgcat::mcset ga MONTHS_FULL [list \.. "Ean\u00e1ir"\.. "Feabhra"\.. "M\u00e1rta"\.. "Aibre\u00e1n"\.. "M\u00ed na Bealtaine"\.. "Meith"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.824539027053997
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xobHAygDobHAqo+3vLjobHAqo+3v6mjobHAy9+3vnFDoAkv:4EnLB383p23vy3v6a3v9dmn
                                                    MD5:C27BD7F317AAADB380F4C38AE0D2FDA6
                                                    SHA1:79870A0E68AA0A9B301414EDC21889F83BB81E40
                                                    SHA-256:3F9615C617D3CDBC1E127B3EFEE785B0CB5E92E17B7DABAC80DA2BEAF076362C
                                                    SHA-512:3605B9A914284CF1D3CC90DF2F21A86C0472AEE59800942DC93D842C7AE164E1DA72813787F163DC80B72269D2C391953ABAD6A8B72CCF069BEE96D418A173E9
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga_IE DATE_FORMAT "%d.%m.%y".. ::msgcat::mcset ga_IE TIME_FORMAT "%T".. ::msgcat::mcset ga_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset ga_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):997
                                                    Entropy (8bit):4.120890519790248
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83okzalCcPdJ5rK8yzMY4JlV1ZDqqIkFo8w:43JkPj9K8y4HHZLIQtw
                                                    MD5:A3D098C1A47E380F7C25233A52FBDE38
                                                    SHA1:C97E4EAA9E7A7F99950F422B93C57134B532C639
                                                    SHA-256:34D61B49DBF9584893051FFB458D6DE9E7E2E7774AC0011F70C4DD4184EBA81C
                                                    SHA-512:4687AB3D2FAA65FED90678EBC08C074959E93A9FEFAF3D61EEE39DB08FD200CB57C0DDB4DDBF6451FE1EF5E07EA976EDEF830769FF403CE51734129CEF24DA9F
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Lun"\.. "Mar"\.. "M\u00e9r"\.. "Xov"\.. "Ven"\.. "S\u00e1b"].. ::msgcat::mcset gl DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Luns"\.. "Martes"\.. "M\u00e9rcores"\.. "Xoves"\.. "Venres"\.. "S\u00e1bado"].. ::msgcat::mcset gl MONTHS_ABBREV [list \.. "Xan"\.. "Feb"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Xu\u00f1"\.. "Xul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset gl MONTHS_FULL [list \.. "Xaneiro"\.. "Febreiro"\.. "Marzo"\.. "Abril"\.. "Maio"\.. "Xu\u00f1o"\.. "Xullo"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Decembro"\.. ""]..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.886176304042503
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoPhkgMoPxsF3v6ay/5oPhk9+3vR6HyFvn:4EnLB383WrfK3v6ay/WJ3voSVn
                                                    MD5:78B9163C5E8E5E7049CBF91D1A5889A4
                                                    SHA1:F2F07AF3D79D61C8E0C73B13E2CA8266E10E396B
                                                    SHA-256:B5688CA07D713227B713655877710258CD503617E8DF79293A971649E3134F05
                                                    SHA-512:E86074B687670542CFA097C94D150292E1A73C9F231E92CD84386580A446569CC6F8F5817F46ED64A1D00F95D59F6F1F5D4B961DF3C8335938D83F3517794353
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl_ES DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gl_ES TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gl_ES DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1084
                                                    Entropy (8bit):4.213672208102291
                                                    Encrypted:false
                                                    SSDEEP:24:4aR832vTXAC2/fS5JfaCroeLaCAQbSm5qJe1:43QTXs32zrf
                                                    MD5:518FC3964D50854081FB79189A42D3E7
                                                    SHA1:59392F16CD56E3E6A685F78974D539FB3A972B98
                                                    SHA-256:404795F2C88D0038F9ED0B5120A251D26EDF8B236E1B1698BC71ACD4DC75AC45
                                                    SHA-512:E5C88CAB8741D631938CEC2E0959C0FE26685C395F5F9F4F1B5C9E146E84D23D897CD7A823AB46D4B62C590AE15EC76B87EB59308ACFB1BB6F61398890B43622
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv DAYS_OF_WEEK_ABBREV [list \.. "Jed"\.. "Jel"\.. "Jem"\.. "Jerc"\.. "Jerd"\.. "Jeh"\.. "Jes"].. ::msgcat::mcset gv DAYS_OF_WEEK_FULL [list \.. "Jedoonee"\.. "Jelhein"\.. "Jemayrt"\.. "Jercean"\.. "Jerdein"\.. "Jeheiney"\.. "Jesarn"].. ::msgcat::mcset gv MONTHS_ABBREV [list \.. "J-guer"\.. "T-arree"\.. "Mayrnt"\.. "Avrril"\.. "Boaldyn"\.. "M-souree"\.. "J-souree"\.. "Luanistyn"\.. "M-fouyir"\.. "J-fouyir"\.. "M.Houney"\.. "M.Nollick"\.. ""].. ::msgcat::mcset gv MONTHS_FULL [list \.. "Jerrey-geuree"\.. "Toshiaght-arree"\.. "Mayrnt"\.. "Averil"\.. "Boaldyn"\.. "Mean-souree"\.. "Jerrey-souree"\.. "Luanistyn"\.. "Mean-fouyir"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.936566750568767
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoQbtvMoQLE3v6ay/5oQbto+3vR6HyFvn:4EnLB383PbtvALE3v6ay/PbtF3voSVn
                                                    MD5:0B6BE614EF5F5F25A30D2D33701A9F94
                                                    SHA1:65800FBD73D9DAE550E04E1D818A6B9D1AEF86FE
                                                    SHA-256:86CABF3B9360C0E686CC4CBEB843E971C28BC6D35210ED378B54EB58CC41F3D5
                                                    SHA-512:376D21B38DA49A8F7C2983F2B808FD55AC9F6383BC66DF28DB99DBF61FDC9FFF8CD20F077EC3ED873EF47F0F613BDD9AD02DFFB1CB51F9A36715C7FC798C3B70
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gv_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gv_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1990
                                                    Entropy (8bit):4.298934047406144
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83Y71LCLxL0eCLbCLKCLaCLXL7CLB0p1dLGCoCLU5LT5Gv5LJ9p5LnLEHLGCh:43sl7KqpU/nNbhbOezd2ICn
                                                    MD5:A0E60036EB17208A449AAFC3AAAE622C
                                                    SHA1:9D7479BA85FBB00A2DF2B61F4ED2CBEA8F1EC8C3
                                                    SHA-256:787DA79AF58872BF45AB09E3B6A920A4496B5BD8A4F3C7F010CF013EC2E8EFE0
                                                    SHA-512:46D12C14B5736E5EA97EB728BF58999E9D7C2CF910D8F5AFA3F5D3A86329ABF41A3E2BEBD81EE4EF64BEA0DC173B77A9FE12471C1BD9D768ED552A55B3B80213
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset he DAYS_OF_WEEK_ABBREV [list \.. "\u05d0"\.. "\u05d1"\.. "\u05d2"\.. "\u05d3"\.. "\u05d4"\.. "\u05d5"\.. "\u05e9"].. ::msgcat::mcset he DAYS_OF_WEEK_FULL [list \.. "\u05d9\u05d5\u05dd \u05e8\u05d0\u05e9\u05d5\u05df"\.. "\u05d9\u05d5\u05dd \u05e9\u05e0\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05dc\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e8\u05d1\u05d9\u05e2\u05d9"\.. "\u05d9\u05d5\u05dd \u05d7\u05de\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05d9\u05e9\u05d9"\.. "\u05e9\u05d1\u05ea"].. ::msgcat::mcset he MONTHS_ABBREV [list \.. "\u05d9\u05e0\u05d5"\.. "\u05e4\u05d1\u05e8"\.. "\u05de\u05e8\u05e5"\.. "\u05d0\u05e4\u05e8"\.. "\u05de\u05d0\u05d9"\.. "\u05d9\u05d5\u05e0"\.. "\u05d9\u05d5\u05dc"\.. "\u05d0\u05d5\u05d2"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1777
                                                    Entropy (8bit):4.2117128941697715
                                                    Encrypted:false
                                                    SSDEEP:48:438n4kALqrU1fbokQTbWqrU1fbokQTw38:28OD86D8gM
                                                    MD5:4219A929E27308ADC04A9F368F063F38
                                                    SHA1:FA728EEBA8751F4CE032ED32AECFDE124D1B68E2
                                                    SHA-256:192F4A8E77E1627712F85533C9896EF6A040157C7BD56DF3A4A7FA56AD6746C2
                                                    SHA-512:223B137AC1FC15908F5541067736EF3A29493549B963393EB78660036A82982E57CFC4AD09CBD33D32A5187FF9F4ACFB5F83A0C974702434B7FAD1B2539B7F76
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0932\u0935\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset hi MONTHS_ABBREV [list \.. "\u091c\u0928\u0935\u0930\u0940"\.. "\u092b\u093c\u0930\u0935\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u0905\u092a\u094d\u0930\u0947\u0932"\.. "\u092e\u0908"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u093e\u0908"\.. "\u0905\u0917\u0938\u094d\u0924"\.. "\u0938\u093f\u0924\u092e\u094d\u092c\u0930"\.. "\u0905\u0915\u094d\u091f\u0942\u092c\u0930"\.. "\u0928\u0935\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.9286948144352865
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xocv+IZoz3v6ry/5oco+3v+6f6HyFvn:4EnLB383Jvlg3v6ry/JF3vmSVn
                                                    MD5:1C1E1484EA0286175FADCB90937C9F34
                                                    SHA1:5CA1BF19021D529CB3B3A308EFFFCA7E4D073640
                                                    SHA-256:5A3BF0DD61BFB5A2BF75E96B11E0E3528FFAB720A0BF1923853606F8CAF0E76D
                                                    SHA-512:F9A43E1E18ADB6DC6B18BEDC3303A99F514DF6CA54F12100989F734233012D7D60216116915351CCACC12F6942795BF8F3BBD26B15A86E88101067D64BEE54F5
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset hi_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset hi_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1171
                                                    Entropy (8bit):4.36311224714184
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83dVX79VIE9bLTWnh7rT+5dPcdvgrNv5KvOA1:43kmrQ7n+odIrJ6OS
                                                    MD5:906963A3AD09EAC781B35C190B77484E
                                                    SHA1:E5AA49DA9C4987EAFA839115F84612426EB8615E
                                                    SHA-256:105A9180BC5D23738183374FA0EA8DD80484BF3947E1432E515BDC2913C017D9
                                                    SHA-512:557BD1C8306750D09215D9774069A52C7D60E03DE2DF39FF909A8F658AB0565739D127E24ACDC96F736C69A71BEFA30B8A30BB489C7B7FDEA85386C802166349
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hr DAYS_OF_WEEK_ABBREV [list \.. "ned"\.. "pon"\.. "uto"\.. "sri"\.. "\u010det"\.. "pet"\.. "sub"].. ::msgcat::mcset hr DAYS_OF_WEEK_FULL [list \.. "nedjelja"\.. "ponedjeljak"\.. "utorak"\.. "srijeda"\.. "\u010detvrtak"\.. "petak"\.. "subota"].. ::msgcat::mcset hr MONTHS_ABBREV [list \.. "sij"\.. "vel"\.. "o\u017eu"\.. "tra"\.. "svi"\.. "lip"\.. "srp"\.. "kol"\.. "ruj"\.. "lis"\.. "stu"\.. "pro"\.. ""].. ::msgcat::mcset hr MONTHS_FULL [list \.. "sije\u010danj"\.. "velja\u010da"\.. "o\u017eujak"\.. "travanj"\.. "svibanj"\.. "lipanj"\.. "srpanj"\.. "kolovoz"\.. "rujan"\.. "listopad"\.. "studeni"\.. "prosinac"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1381
                                                    Entropy (8bit):4.511450677731002
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83IFb7ZTmKrkAYm2LZyyApLDV2uZi5WF+shHUTyvtsv+:43C3ZTmKQAyZyyAp0BotK+
                                                    MD5:E398158EE1CD49CB5286D9642D4A61DD
                                                    SHA1:A93A588B0ADD198C067C4BB070DC1E5170E6E208
                                                    SHA-256:993475532F89E1EA7214ADB265294040862305612D680CFF01DD20615B731CCC
                                                    SHA-512:9E5791FB97110FE5F7A1F49FF2ED8801A05E49D5B9AF579474C0081073D2B40ECFFE6E4EB5B61F12B1995FDCC0A557CB572E5E116F951FD286A6254253DAEC01
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hu DAYS_OF_WEEK_ABBREV [list \.. "V"\.. "H"\.. "K"\.. "Sze"\.. "Cs"\.. "P"\.. "Szo"].. ::msgcat::mcset hu DAYS_OF_WEEK_FULL [list \.. "vas\u00e1rnap"\.. "h\u00e9tf\u0151"\.. "kedd"\.. "szerda"\.. "cs\u00fct\u00f6rt\u00f6k"\.. "p\u00e9ntek"\.. "szombat"].. ::msgcat::mcset hu MONTHS_ABBREV [list \.. "jan."\.. "febr."\.. "m\u00e1rc."\.. "\u00e1pr."\.. "m\u00e1j."\.. "j\u00fan."\.. "j\u00fal."\.. "aug."\.. "szept."\.. "okt."\.. "nov."\.. "dec."\.. ""].. ::msgcat::mcset hu MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "m\u00e1rcius"\.. "\u00e1prilis"\.. "m\u00e1jus"\.. "j\u00fanius"\.. "j\u00falius"\.. "augusztus"\.. "szeptembe
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):961
                                                    Entropy (8bit):4.02166638427728
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83dcTcWKutdXaMmEfc2ftdT2dHblWZ0VT:43dQrKutdntdI8g
                                                    MD5:191ACF2E8A8F10A1360B283D42886382
                                                    SHA1:EE2C00D021381EA638B6CE3F395DEA5F8491ED9B
                                                    SHA-256:41C0C3D3B4491E9B36E719466503EFCD325175CB7824C4A5055CB113D347BE0F
                                                    SHA-512:29BC4F7D3FAE7DE392B175FEA76138FA823B7D9D0B051A19A73F7D36D51DE34E0D0C7C129867307ABF51FC92E70853C15BD96B8484AD21EAB0A8EB83B0411E03
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id DAYS_OF_WEEK_ABBREV [list \.. "Min"\.. "Sen"\.. "Sel"\.. "Rab"\.. "Kam"\.. "Jum"\.. "Sab"].. ::msgcat::mcset id DAYS_OF_WEEK_FULL [list \.. "Minggu"\.. "Senin"\.. "Selasa"\.. "Rabu"\.. "Kamis"\.. "Jumat"\.. "Sabtu"].. ::msgcat::mcset id MONTHS_ABBREV [list \.. "Jan"\.. "Peb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Agu"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset id MONTHS_FULL [list \.. "Januari"\.. "Pebruari"\.. "Maret"\.. "April"\.. "Mei"\.. "Juni"\.. "Juli"\.. "Agustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""]..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.904408530699153
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo0kGMo0F/W3v6ay/5o0kT+3vR6HyFvn:4EnLB383wG33v6ay/wK3voSVn
                                                    MD5:FEB4D50576BF3E11A0A40FD29ABE35A7
                                                    SHA1:8CEAA187C8AA5EC101743060A877D039850964CA
                                                    SHA-256:BA7FC0C0452D3E482DB6E19BDF512CACED639BA72B92ED8F66D80B52FEA11AC0
                                                    SHA-512:8B5D18E3D6628F369FB387C8EF08CC80000E0CBE500972958F4AD75F1C2F0DD6058F9777BD7DD0D7C26E7ECAA65E5071E2BF51B560973E88637942116C7576FB
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id_ID DATE_FORMAT "%d %B %Y".. ::msgcat::mcset id_ID TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset id_ID DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1305
                                                    Entropy (8bit):4.457417703528286
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83XVhVTeMVHGPbfXSmWzaZlfFxUQbW1U6ZY95n123etvmv3eTn:43Xz0b/uzaZtXUMw8n
                                                    MD5:ACF0452D5BB6D36A40061D2B0AF4D7A6
                                                    SHA1:9DF4D88F1962A672EFBDDE524550F7A5D02D446D
                                                    SHA-256:778BE3D6BFE2DFFB64FF1AFB9EC8351A3343B314CF93A68E8F7FD1073EE122BB
                                                    SHA-512:34CC02D7D28B5E161ED10250C214375561FD3D00979BFB8BCF3DB72A81BD9B7C225301528B400F7C54D8B6379F772EB6477D5D03F2CF7DC4DD19D22AEEC151B5
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset is DAYS_OF_WEEK_ABBREV [list \.. "sun."\.. "m\u00e1n."\.. "\u00feri."\.. "mi\u00f0."\.. "fim."\.. "f\u00f6s."\.. "lau."].. ::msgcat::mcset is DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nudagur"\.. "\u00feri\u00f0judagur"\.. "mi\u00f0vikudagur"\.. "fimmtudagur"\.. "f\u00f6studagur"\.. "laugardagur"].. ::msgcat::mcset is MONTHS_ABBREV [list \.. "jan."\.. "feb."\.. "mar."\.. "apr."\.. "ma\u00ed"\.. "j\u00fan."\.. "j\u00fal."\.. "\u00e1g\u00fa."\.. "sep."\.. "okt."\.. "n\u00f3v."\.. "des."\.. ""].. ::msgcat::mcset is MONTHS_FULL [list \.. "jan\u00faar"\.. "febr\u00faar"\.. "mars"\.. "apr\u00edl"\.. "ma\u00ed"\.. "j\u00fan\u00ed"\.. "j\u00fal\
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1294
                                                    Entropy (8bit):4.282101355195382
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83JYEVI2vfYpQjAOnhWBIIsmdC2lkOKk+Z+FoPJ6G3vesvY:43JZVB8eAOnh4IzR2+J6G/eKY
                                                    MD5:3354A6FC06C298E33AA14163929E56EB
                                                    SHA1:C3005370DAE8A266AE21F7E2B871AEA5A656A155
                                                    SHA-256:1D72170B9F9028A237364F7CD7EA8B48BD4770E61922205CE862300103B13DE5
                                                    SHA-512:58B64D4F5827CA2A1BF2DDFD1F7EFDDBBD46709A6A9B7277E8EB386D80043A87ADDE2B3D5A49A934E8EB8F797BD735FADA1D22AD3DD856FFE9507F71B9E45CBA
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mer"\.. "gio"\.. "ven"\.. "sab"].. ::msgcat::mcset it DAYS_OF_WEEK_FULL [list \.. "domenica"\.. "luned\u00ec"\.. "marted\u00ec"\.. "mercoled\u00ec"\.. "gioved\u00ec"\.. "venerd\u00ec"\.. "sabato"].. ::msgcat::mcset it MONTHS_ABBREV [list \.. "gen"\.. "feb"\.. "mar"\.. "apr"\.. "mag"\.. "giu"\.. "lug"\.. "ago"\.. "set"\.. "ott"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset it MONTHS_FULL [list \.. "gennaio"\.. "febbraio"\.. "marzo"\.. "aprile"\.. "maggio"\.. "giugno"\.. "luglio"\.. "agosto"\.. "settembre"\.. "ottobre"\.. "novembre"\.. "dicembre"\.. "
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):250
                                                    Entropy (8bit):4.8982877714191035
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoi5jL/oyJ+3v1oia+3vjLtAsvn:4EnLB383b3F+3vV3v3tnn
                                                    MD5:E4400C16406A46C2880250522BED2EDE
                                                    SHA1:787A04037A355FF845025B8865335EB938280BFB
                                                    SHA-256:24B5F303F5C7AF6F63FDC23ADB4D713087AE74B6D18C117D787AF03374C5F57E
                                                    SHA-512:3551DEEF0EAAC66042143F77F2F4DD9154764F35BD624DAB3C9F0F59F3489CA39CE34BC2A69BC5BFBB1926C6F5C39D74A806ECB1A47F6B374101071957FD417B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it_CH DATE_FORMAT "%e. %B %Y".. ::msgcat::mcset it_CH TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset it_CH DATE_TIME_FORMAT "%e. %B %Y %H:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1689
                                                    Entropy (8bit):4.951012555106795
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83Gl84OCtnbf3wvtMwvLv4GTwhvevTwSoXghGhD6h:43FULWttbdEVoES8gshD6h
                                                    MD5:11FBE427747012444AEEAFD6134034A4
                                                    SHA1:58C72C432053264EAE6335D6CC93C5FFA33C42B8
                                                    SHA-256:2B6D15A191437F1B84FA7023E34153B61E6BF1DE1452EA921E9CCBBE5D4BEB1C
                                                    SHA-512:4F993BDF5D50D6D9F7410C83D226FEF30BA8C989F9977A7025C36BE22CEECCD6C68CDD6AFC5C9CE3D700559C4EDC619042E14DD88EE7583B9D5AA66F0268FD23
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ja DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u6708"\.. "\u706b"\.. "\u6c34"\.. "\u6728"\.. "\u91d1"\.. "\u571f"].. ::msgcat::mcset ja DAYS_OF_WEEK_FULL [list \.. "\u65e5\u66dc\u65e5"\.. "\u6708\u66dc\u65e5"\.. "\u706b\u66dc\u65e5"\.. "\u6c34\u66dc\u65e5"\.. "\u6728\u66dc\u65e5"\.. "\u91d1\u66dc\u65e5"\.. "\u571f\u66dc\u65e5"].. ::msgcat::mcset ja MONTHS_FULL [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"].. ::msgcat::mcset ja BCE "\u7d00\u5143\u524d".. ::msgcat::mcset ja CE "\u897f\u66a6".. ::msgcat::mcset ja AM "\u5348\u524d".. ::msgcat::mcset ja PM "\u5348\u5f8c".. ::ms
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1025
                                                    Entropy (8bit):4.097746630492712
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83E7XIE/OWbjH3Tw2PzJrIsmZ5maAXaMHPB:43WlrraA/vB
                                                    MD5:2F79804667D6F8C77BB188D59EF5F3DF
                                                    SHA1:10950ECA798F24A7C405B3E18B559CCC0C056EC1
                                                    SHA-256:96FF17F1CFF976E4E204D3616D1EFCED4D0F907C5E6A0F04B4536CB4AD1190C9
                                                    SHA-512:1B8ADC3B7FF920F8F53A17BFCC7EA24A0F8E276A42E5C63F9880DAE9B74E12716DD12DB647A80A9D99294449146C643EC58A33B03681AA4FA26A5FBC508C248C
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl DAYS_OF_WEEK_ABBREV [list \.. "sab"\.. "ata"\.. "mar"\.. "pin"\.. "sis"\.. "tal"\.. "arf"].. ::msgcat::mcset kl DAYS_OF_WEEK_FULL [list \.. "sabaat"\.. "ataasinngorneq"\.. "marlunngorneq"\.. "pingasunngorneq"\.. "sisamanngorneq"\.. "tallimanngorneq"\.. "arfininngorneq"].. ::msgcat::mcset kl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset kl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "martsi"\.. "aprili"\.. "maji"\.. "juni"\.. "juli"\.. "augustusi"\.. "septemberi"\.. "oktoberi"\.. "novemberi"\.. "dece
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.882476709336307
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoEpb53FuoEpLE3vLjoEpLE3v6mjoEpba+3vnFDoAkvn:4EnLB383jF3Fyw3vxw3v6A/3v9dmn
                                                    MD5:255830678C8724E65C05A7E020E68B5B
                                                    SHA1:0AEA48AB0439C04F92B5CA9A3B5182718B7F116B
                                                    SHA-256:3027CFE9EBD2172CEFC15C025786CAD47A6E2894BF0474AFC1B0C341E70202AA
                                                    SHA-512:99039FFA7269DD136D1693121E261DB5586E86EC401D2B1EB8FB1D13A9A7F1E514D9FC941B838286B986C02ED281828ED67E59002D837E350A64F4832340516A
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl_GL DATE_FORMAT "%d %b %Y".. ::msgcat::mcset kl_GL TIME_FORMAT "%T".. ::msgcat::mcset kl_GL TIME_FORMAT_12 "%T".. ::msgcat::mcset kl_GL DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1621
                                                    Entropy (8bit):4.612163420716489
                                                    Encrypted:false
                                                    SSDEEP:48:43fMlylslXlslxl1hVuqLGuqqntH4xUyw9:2fKYqVq3f
                                                    MD5:CCB2C2254D3FA3025183DB7E010CAD66
                                                    SHA1:510BBB6A9162F2EF908E6561CC714848C2EA74CA
                                                    SHA-256:EF6FB319C398EEA79B3A951319F831F3B186D556565D17D738E5F9B4B77570F2
                                                    SHA-512:A0264565899BD1B0783ADC0388F893CCE713ADB23BDD63907CF092A74ACB4F7D3BE09DA29801E9C11A7B08CB1706E3771C598ACED351A0FCCBF4EBBD7871148D
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko DAYS_OF_WEEK_ABBREV [list \.. "\uc77c"\.. "\uc6d4"\.. "\ud654"\.. "\uc218"\.. "\ubaa9"\.. "\uae08"\.. "\ud1a0"].. ::msgcat::mcset ko DAYS_OF_WEEK_FULL [list \.. "\uc77c\uc694\uc77c"\.. "\uc6d4\uc694\uc77c"\.. "\ud654\uc694\uc77c"\.. "\uc218\uc694\uc77c"\.. "\ubaa9\uc694\uc77c"\.. "\uae08\uc694\uc77c"\.. "\ud1a0\uc694\uc77c"].. ::msgcat::mcset ko MONTHS_ABBREV [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\.. "7\uc6d4"\.. "8\uc6d4"\.. "9\uc6d4"\.. "10\uc6d4"\.. "11\uc6d4"\.. "12\uc6d4"\.. ""].. ::msgcat::mcset ko MONTHS_FULL [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):354
                                                    Entropy (8bit):5.058233326545794
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo56SFZhjAo56m5Ys5o56TGMovBo56a/W3v6mfKo56TT+3+:4EnLB383g62vjV6m5Ysg6TG26a+3v6oo
                                                    MD5:58CA45CE26AF8ECA729BA72898BB633D
                                                    SHA1:CBBEDB7370890A1DB65080A359A9A5C164B525D5
                                                    SHA-256:4CAC8FB43D290A63A4D3215F22228B358AB4FA174F08712DD6C5B64C5E485071
                                                    SHA-512:48CCBD3F7B96D0998B6D1A1F8D7FE2B4B070BB5B8809FABE0A38209AEAF2E95E098292A5B9B5F0954E7729708A2173D32AAD70B6C0F336DB1E9BFA2968E6A56B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko_KR BCE "\uae30\uc6d0\uc804".. ::msgcat::mcset ko_KR CE "\uc11c\uae30".. ::msgcat::mcset ko_KR DATE_FORMAT "%Y.%m.%d".. ::msgcat::mcset ko_KR TIME_FORMAT_12 "%P %l:%M:%S".. ::msgcat::mcset ko_KR DATE_TIME_FORMAT "%Y.%m.%d %P %l:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1997
                                                    Entropy (8bit):4.202940482570495
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83cm48Vc7VczMmDNVcYVcR0prdSmS68FeDJVcYVcR0prdSmS68FeuT:4354a+0prjS68mq0prjS68pT
                                                    MD5:67FA08F588A3B44D67E42EC1025013BC
                                                    SHA1:6895FEF0476DE0349895DB052B335AC46636B23A
                                                    SHA-256:9D215E31A39FED45B3657144E5F73C942E59E500036CE16B1FFF201FD6358595
                                                    SHA-512:4C2708BD9DD98320D3133EEFFD19A8018F49A36AB8348DB7C0B0287ADB4C052D3EFAD3686C8E46E0520F3CE27F361978272BA8752EB04E5A7BC07780398480DB
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok DAYS_OF_WEEK_FULL [list \.. "\u0906\u0926\u093f\u0924\u094d\u092f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset kok MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):260
                                                    Entropy (8bit):4.904340548436718
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo5VsNv+IZo5VsU3v6ry/5o5VsNo+3v+6f6HyFvn:4EnLB383gVsNvlAVsU3v6ry/gVsNF3vj
                                                    MD5:0AA20289A63BA3A14DCFED75EED980DE
                                                    SHA1:2B76013593D886B0724D82849FD1840B20922902
                                                    SHA-256:644F2B6D4BA27AF14891B781DEF60F708A9F18FC2F73566649B631A6DEA3EF09
                                                    SHA-512:6E13E0DC8BFD2ABE0D04B0BC098C40972F088F8D3D6ACA00338B17473ABC6F69840A88EC0C965C493B4270DEC777A0EA2D762BC33044EFE7030E437604EE201B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset kok_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset kok_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1013
                                                    Entropy (8bit):4.060027087416375
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83no1UwRlw4MAwBdc//3rpF6HFoot8:43vglHM7MTCHFs
                                                    MD5:CCEC7B77DCA1F6A406311FC43EE57030
                                                    SHA1:4ED329BB09A8F7C67F8984CD790E9B6819DE6F00
                                                    SHA-256:EAB468AC5BF1833D4F8CD658789413D4A46CAD16B63FB9B906CFF6DC9EA26251
                                                    SHA-512:4EFF6E49CC479A1BF0CEEAE256A1FAE7D4AE7D0ACE23CD87851471EC96BB5AF580C58A142E1B6CE72BC8B6BFF946A38801E681443B7DD9527A1DEB6E7EDD7D22
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw DAYS_OF_WEEK_ABBREV [list \.. "Sul"\.. "Lun"\.. "Mth"\.. "Mhr"\.. "Yow"\.. "Gwe"\.. "Sad"].. ::msgcat::mcset kw DAYS_OF_WEEK_FULL [list \.. "De Sul"\.. "De Lun"\.. "De Merth"\.. "De Merher"\.. "De Yow"\.. "De Gwener"\.. "De Sadorn"].. ::msgcat::mcset kw MONTHS_ABBREV [list \.. "Gen"\.. "Whe"\.. "Mer"\.. "Ebr"\.. "Me"\.. "Evn"\.. "Gor"\.. "Est"\.. "Gwn"\.. "Hed"\.. "Du"\.. "Kev"\.. ""].. ::msgcat::mcset kw MONTHS_FULL [list \.. "Mys Genver"\.. "Mys Whevrel"\.. "Mys Merth"\.. "Mys Ebrel"\.. "Mys Me"\.. "Mys Evan"\.. "Mys Gortheren"\.. "Mye Est"\.. "Mys Gwyngala"\.. "Mys Hedra"\.. "Mys Du"\.. "Mys Kevardhu"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.959913054070712
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoh6AvMoh633v6ay/5oh6Ao+3vR6HyFvn:4EnLB38346AvR633v6ay/46AF3voSVn
                                                    MD5:18E8576F63B978F1AFEF15AC57B44FBF
                                                    SHA1:D50EB90944FF81E3CBFF942B16C1874EB7EA2562
                                                    SHA-256:EDAC14D929D1C6559EC46E9B460F8F44A189B78FB915F2D641104549CBD94188
                                                    SHA-512:F3DE5EE77BB889DA1353F9C9A1811083AB28BBEE4B7D6C8782F38B1AE44CF77565371A0E18F7E2BACD7EF590BC1215CA3E41AF929A15F60B3E85F6099A4CF378
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset kw_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset kw_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1307
                                                    Entropy (8bit):4.506235846178408
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83iHYuAMLzHYCaNu3d3nT15T31FhAlDgK/YrDZ/6Qz2C9kGPCveksvc:43iHFnHuUd3/T3xM/+SQCC9kGPEekKc
                                                    MD5:D4EC2E96995E0EB263F338DD16CC4F8D
                                                    SHA1:7ED86175489B1AE3CA5C0E8D42969F951C895D6B
                                                    SHA-256:855B652FCC8066BA45C7DC8DBFD3807D1B4759EA8D71C523567F47BF445D1DE6
                                                    SHA-512:A55E0D759A22360FF6668CEFAFFB812BABB316C447ADDB1FD5CDBC06AE1DA2E891E09952D073164C013AD9BF4184614102E7ADA553EEEFB2BBA26208B79B277F
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lt DAYS_OF_WEEK_ABBREV [list \.. "Sk"\.. "Pr"\.. "An"\.. "Tr"\.. "Kt"\.. "Pn"\.. "\u0160t"].. ::msgcat::mcset lt DAYS_OF_WEEK_FULL [list \.. "Sekmadienis"\.. "Pirmadienis"\.. "Antradienis"\.. "Tre\u010diadienis"\.. "Ketvirtadienis"\.. "Penktadienis"\.. "\u0160e\u0161tadienis"].. ::msgcat::mcset lt MONTHS_ABBREV [list \.. "Sau"\.. "Vas"\.. "Kov"\.. "Bal"\.. "Geg"\.. "Bir"\.. "Lie"\.. "Rgp"\.. "Rgs"\.. "Spa"\.. "Lap"\.. "Grd"\.. ""].. ::msgcat::mcset lt MONTHS_FULL [list \.. "Sausio"\.. "Vasario"\.. "Kovo"\.. "Baland\u017eio"\.. "Gegu\u017e\u0117s"\.. "Bir\u017eelio"\.. "Liepos"\.. "Rugpj\u016b\u010dio"\.. "Rugs\u0117jo"\.. "Spa
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1271
                                                    Entropy (8bit):4.460631492946299
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83Amshb4mZdA7nl9kMmfpK269rkbi5vWm0W9ARivirXsv05vkn:430bHA7XRr95QWQQgaKkn
                                                    MD5:554ED2CAFD25F5F82DA54AE057F4BA98
                                                    SHA1:E25CDF0F9C4B523B5B05408E7820F7B4F627D19E
                                                    SHA-256:7E90D2008B220DB19C796C7107AD69D263B8AC8C7BDDFB879230699D978E9A0A
                                                    SHA-512:612201CCD64A51EC943921196D8C74D8BCA3AB3E35B0C9E91AE7F3A6B36F4F255AA9ADB3A254EC03629B01BD221B0B3F8CC4DFBFAC1F1718775E81CAD188AA86
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lv DAYS_OF_WEEK_ABBREV [list \.. "Sv"\.. "P"\.. "O"\.. "T"\.. "C"\.. "Pk"\.. "S"].. ::msgcat::mcset lv DAYS_OF_WEEK_FULL [list \.. "sv\u0113tdiena"\.. "pirmdiena"\.. "otrdiena"\.. "tre\u0161diena"\.. "ceturdien"\.. "piektdiena"\.. "sestdiena"].. ::msgcat::mcset lv MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maijs"\.. "J\u016bn"\.. "J\u016bl"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset lv MONTHS_FULL [list \.. "janv\u0101ris"\.. "febru\u0101ris"\.. "marts"\.. "apr\u012blis"\.. "maijs"\.. "j\u016bnijs"\.. "j\u016blijs"\.. "augusts"\.. "septembris"\.. "oktobris"\.. "novembris"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2157
                                                    Entropy (8bit):4.299300188052441
                                                    Encrypted:false
                                                    SSDEEP:48:4389QMsGqdQfRQPjQmofqJp9sk5BstSpWQiQ3QJQ5QL39I0QRQTQ8Ql4J8W:2W8SMq+9sWINi2Kc9I0+gXF
                                                    MD5:888014F13A82511ABEF99497A753BFC3
                                                    SHA1:7F4231BEDE191370B37E8B917B6AD8829D15CA7D
                                                    SHA-256:4C0EB07F0FCB36DD12A3F7EDD6531616611ABF62BF7705B5A37CC59098221D5D
                                                    SHA-512:D748127CC615584901D35B6492EC566448B6C4DA6363858B5145921E9CD09490355CF4315F0F7A8542AA12790CD3432011A643A3A8F74B0119DB0DCE19FD68A4
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0435\u0434."\.. "\u043f\u043e\u043d."\.. "\u0432\u0442."\.. "\u0441\u0440\u0435."\.. "\u0447\u0435\u0442."\.. "\u043f\u0435\u0442."\.. "\u0441\u0430\u0431."].. ::msgcat::mcset mk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0435\u043b\u0430"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0440\u0442\u043e\u043a"\.. "\u043f\u0435\u0442\u043e\u043a"\.. "\u0441\u0430\u0431\u043e\u0442\u0430"].. ::msgcat::mcset mk MONTHS_ABBREV [list \.. "\u0458\u0430\u043d."\.. "\u0444\u0435\u0432."\.. "\u043c\u0430\u0440."\.. "\u0430\u043f\u0440."\.. "\u043c\u0430\u0458."\.. "\u0458\u0443\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1846
                                                    Entropy (8bit):4.220147808639664
                                                    Encrypted:false
                                                    SSDEEP:24:4aR833cXh48Vc7VczfVczPmzNVcYVcR0prdSmS68FezUVcYVcR0prdSmS68FeoV:43K4S+0prjS68Yh0prjS68nV
                                                    MD5:07F99E0A05083B10F80A4D6867163B23
                                                    SHA1:B6036C7DA8043E3401583D03831E7A4BF755D93D
                                                    SHA-256:AE873BF5484EACBBE179913D43451BE53378FA701B5D81594D052266B8A09AF0
                                                    SHA-512:3A032C81B8FBFEE6EB66C1538CBD16329A1B393E4684B4E9B3FBCDD6344CE8AD34FA699F76EF953B3EB597D8E253345F54C2E92E7A43611C721038BCC2471EA2
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset mr MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\u091f\u0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.89440333975705
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoGNv+IZoGU3v6ry/5oGNo+3v+6f6HyFvn:4EnLB383Zvlw3v6ry/ZF3vmSVn
                                                    MD5:67368E8A5715860BABD44E54A168192F
                                                    SHA1:7790D4B4B28FE5E38AB11CD037FFB826A8EB77FD
                                                    SHA-256:B7B1D379355A1D278E13EF557A887A662E84FB6A9B62B8E19A27927926270EF9
                                                    SHA-512:E95C90CFFA7CC4E61026FC328A4AA0BEE6A54A0061BA0B9459F9F0F4B008DD36F81BC9B8D8B964FA051FCEAB7FECE6D107CD456B3FD01A83B4900ECC3A0BCFA4
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset mr_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset mr_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):957
                                                    Entropy (8bit):4.018924167342869
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383Zm/aufodZmt+JHEA7UVRosmAL/7Idzr43xRRosuL1PJHWZ6tHhHjv:4aR83ZsauSHJkA7umE/72UD21PJWZ0hT
                                                    MD5:7E6A943B7D82404F61BDBD95682073CD
                                                    SHA1:B96DBB1738F293D2842FDCEDF2DEF13004F77A8D
                                                    SHA-256:970B2F3ECC04980FCC2F9531CA6CE2BF36BC12942CB614BF70313B4CB0508985
                                                    SHA-512:12F5A5F7A170EE79D1F4398E96FF2DE84472027C5B5003DE7E86F46713E3F0997439E2EBA03FFB7DB611F0CE0E06EB149F5BD08ED2AA0409DB8348867487FFFD
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms DAYS_OF_WEEK_ABBREV [list \.. "Aha"\.. "Isn"\.. "Sei"\.. "Rab"\.. "Kha"\.. "Jum"\.. "Sab"].. ::msgcat::mcset ms DAYS_OF_WEEK_FULL [list \.. "Ahad"\.. "Isnin"\.. "Selasa"\.. "Rahu"\.. "Khamis"\.. "Jumaat"\.. "Sabtu"].. ::msgcat::mcset ms MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mac"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ogos"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dis"\.. ""].. ::msgcat::mcset ms MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Mac"\.. "April"\.. "Mei"\.. "Jun"\.. "Julai"\.. "Ogos"\.. "September"\.. "Oktober"\.. "November"\.. "Disember"\.. ""]..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):265
                                                    Entropy (8bit):4.818053174805798
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoChFfluoChF+3v6xyFjoCh++3vflm68vn:4EnLB383xPflwe3v6gZl3vflm6+n
                                                    MD5:A02F11BE0DF920E63E7A3ACCE746E32D
                                                    SHA1:4A8B1EF1A6F8A5FD022042D6E009A01E4B0FEBD3
                                                    SHA-256:F5B859D8DD2A2B5F756E39B0DFEB26B95878D2F54BA3CE46C56F0F26CF2B554B
                                                    SHA-512:5F9AF8C89F491CB4C158ED73EA4CF32E6A83CF44A94DA6FE1A962C58199BF2348530F3DEFA0C6F433BA3ADEF81AE9B3884F30CD7A841B159D52F9F21008B4F92
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms_MY DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset ms_MY TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ms_MY DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):717
                                                    Entropy (8bit):4.55153350337982
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383VYmxWHWog4QUbxMmAMMiGZu+3v6ay/GK3vZsSVn:4aR83VYsxonQ2MmVVGRvjCGsvGSV
                                                    MD5:D8BBEC2F8935054E6081BB5E4AE8F7E3
                                                    SHA1:33FE6D51A284B8760BC6F442329B10374F506BDA
                                                    SHA-256:7DBC4E82D82FDE8CDF522FA10E082289D46B0C1A4A7D7A5FA83FF116677F052B
                                                    SHA-512:BF39C75DD6B3625897D7D44AC253AF5656CA21D0B394F78611584E2606CBC419C4A02353542D23393BEBCCF0CB4D861CDECD61AD89339F78C0260E966B495777
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mt DAYS_OF_WEEK_ABBREV [list \.. "\u0126ad"\.. "Tne"\.. "Tli"\.. "Erb"\.. "\u0126am"\.. "\u0120im"].. ::msgcat::mcset mt MONTHS_ABBREV [list \.. "Jan"\.. "Fra"\.. "Mar"\.. "Apr"\.. "Mej"\.. "\u0120un"\.. "Lul"\.. "Awi"\.. "Set"\.. "Ott"\.. "Nov"].. ::msgcat::mcset mt BCE "QK".. ::msgcat::mcset mt CE "".. ::msgcat::mcset mt DATE_FORMAT "%A, %e ta %B, %Y".. ::msgcat::mcset mt TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset mt DATE_TIME_FORMAT "%A, %e ta %B, %Y %l:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1209
                                                    Entropy (8bit):4.313626715960843
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83B0tSYuZrIsmYmPAxyIQ4HU92W16EL3Tvav31:43qhuZrIPAt04yTcF
                                                    MD5:42D02C3CAF28BE4994F27CEF5A183AB7
                                                    SHA1:DC411E8AC12C3D588AB2F3A3C95A75D8689AD402
                                                    SHA-256:534C5DACEF12F818FAF4ED806997A559F95D591F1B6236B0C30B07A107DD13F3
                                                    SHA-512:0BE27572106324FE2B6CDFF4513500DE7582AD1ABEF451FFC62B2050D3875A149DDDB66451E1B3F5BA9216268E9998D2A1C1E8343BBB9EF97947DA054B82818E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nb DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset nb DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset nb MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nb MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nb BC
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1129
                                                    Entropy (8bit):4.235969198645435
                                                    Encrypted:false
                                                    SSDEEP:24:4aR837Ed+RxRMZZsmUmnZAEEHM92WFU5vtrvs:43AAHRMZZPnZALsCtt7s
                                                    MD5:B9B949794203D204628D4DBEA29587AE
                                                    SHA1:1642D8040144469B5C359E80693E68036F87B849
                                                    SHA-256:9E2FE3851CF13EC79A9B10A09B01CEB0A26044AE0DC90A4E00BE57745E854C79
                                                    SHA-512:0CCCCF6D61423CEE0389C3BA1A8E94F2B092C53465D1937F5595AF91E46DD38B318D6C7EE3D88B89F32BFB952C0D55E0E67B46D7DF306ECA6690E283ADEB2CB9
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl DAYS_OF_WEEK_ABBREV [list \.. "zo"\.. "ma"\.. "di"\.. "wo"\.. "do"\.. "vr"\.. "za"].. ::msgcat::mcset nl DAYS_OF_WEEK_FULL [list \.. "zondag"\.. "maandag"\.. "dinsdag"\.. "woensdag"\.. "donderdag"\.. "vrijdag"\.. "zaterdag"].. ::msgcat::mcset nl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mrt"\.. "apr"\.. "mei"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset nl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "maart"\.. "april"\.. "mei"\.. "juni"\.. "juli"\.. "augustus"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset nl DATE_FORM
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.865165930946383
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xo4gPPdjog9X3vLjog9X3v6mjo49+3vnFDoAkvn:4EnLB3835gHdPF3vjF3v64I3v9dmn
                                                    MD5:3261F397ED0291368FF1881E7BA08ECE
                                                    SHA1:7147ABB62034EB152B1FED9246A533535F07372C
                                                    SHA-256:77A69DD60D171B321512B14794E75A66FF753410C007997B310790D86E09B057
                                                    SHA-512:C1526F454FA594DAD056B056F76F01D8B2AB713D04EB2A3643416B8E741B248CC94E000BAEE5B0F60436B88B1216FB1DE7F7C3FA456D4A4FBDE24F97C3B739B8
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl_BE DATE_FORMAT "%d-%m-%y".. ::msgcat::mcset nl_BE TIME_FORMAT "%T".. ::msgcat::mcset nl_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset nl_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1200
                                                    Entropy (8bit):4.282788574144479
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83tCtrJwuQrIsmYmLAxyIQ4HU92W1W4/3Hv+v31:434suQrILAt0EafIF
                                                    MD5:985E97517C2BF37719A618F575DF392C
                                                    SHA1:65BC07FC3A955300ED09B7485F90AEC18CBAD43F
                                                    SHA-256:06FA2D6D8C59D0B8EAC2EDE5AB0DDB8B6E095D1A023B1966FCE3B65916FA14FB
                                                    SHA-512:75BC14DBAD147A98D32D2AF0BE0BE50F115BB9C3BBE283B53977B9F264A055734B30F6B1C4EEE9686F1874D178C535111731C92D495B7D370FB17213B65C9A40
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nn DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "m\u00e5"\.. "ty"\.. "on"\.. "to"\.. "fr"\.. "lau"].. ::msgcat::mcset nn DAYS_OF_WEEK_FULL [list \.. "sundag"\.. "m\u00e5ndag"\.. "tysdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "laurdag"].. ::msgcat::mcset nn MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nn MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nn BCE "f.Kr."
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1263
                                                    Entropy (8bit):4.459506202908786
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83lUj0ORGgIzdW6RDYKG7FwRc0ypvOvX:43+HMg2W6RDYnFwRc0ydYX
                                                    MD5:79AB7C13AA3833A1DAEADDB1144CCE55
                                                    SHA1:C01ABC2F16549CAEC6B081448B2CBA88A680E250
                                                    SHA-256:61462C325DB0065352D8155307F949869862A86CAC67AD7BB6703F57A7FA2FF3
                                                    SHA-512:79EB696164FDDD9B121558C2780E54E295FF2DC4D8E87A0DE507B4F2925612721A98FF5010199CB68CF894ACA7A07884E9E02F3DC1E078D241431E3DC884C0A1
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pl DAYS_OF_WEEK_ABBREV [list \.. "N"\.. "Pn"\.. "Wt"\.. "\u015ar"\.. "Cz"\.. "Pt"\.. "So"].. ::msgcat::mcset pl DAYS_OF_WEEK_FULL [list \.. "niedziela"\.. "poniedzia\u0142ek"\.. "wtorek"\.. "\u015broda"\.. "czwartek"\.. "pi\u0105tek"\.. "sobota"].. ::msgcat::mcset pl MONTHS_ABBREV [list \.. "sty"\.. "lut"\.. "mar"\.. "kwi"\.. "maj"\.. "cze"\.. "lip"\.. "sie"\.. "wrz"\.. "pa\u017a"\.. "lis"\.. "gru"\.. ""].. ::msgcat::mcset pl MONTHS_FULL [list \.. "stycze\u0144"\.. "luty"\.. "marzec"\.. "kwiecie\u0144"\.. "maj"\.. "czerwiec"\.. "lipiec"\.. "sierpie\u0144"\.. "wrzesie\u0144"\.. "pa\u017adziernik"\.. "listopad"\..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1177
                                                    Entropy (8bit):4.394980756969744
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83CYkjBc1yHYJt//0/I31YMY47flV7YaqgCyt9Fo8g6Gtvt76svi:43C5LHcNnxJ9Ltg6Gpt76Ki
                                                    MD5:8F53B3571DD29E12BD33349CFA32F28F
                                                    SHA1:C125E059B8BFE5FECD482D1A1DA50B8678872BF6
                                                    SHA-256:6F6EEEDDCF232BDCB952592A144810CED44A1CBB4BCC2C062D5F98D441505380
                                                    SHA-512:5CD7E7097B720E5399795126A71348816CBA697FD8F14160779E982ADAB00D5994978E2F9445785B0DE62F6F14232278AD1A65BC53730CA58D676B057F0BC406
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Seg"\.. "Ter"\.. "Qua"\.. "Qui"\.. "Sex"\.. "S\u00e1b"].. ::msgcat::mcset pt DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Segunda-feira"\.. "Ter\u00e7a-feira"\.. "Quarta-feira"\.. "Quinta-feira"\.. "Sexta-feira"\.. "S\u00e1bado"].. ::msgcat::mcset pt MONTHS_ABBREV [list \.. "Jan"\.. "Fev"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset pt MONTHS_FULL [list \.. "Janeiro"\.. "Fevereiro"\.. "Mar\u00e7o"\.. "Abril"\.. "Maio"\.. "Junho"\.. "Julho"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Dezembro"
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):4.8608779725401785
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xofm6GPWWjofAW3vLjofAW3v6mjofm6T+3vnFDoAkvn:4EnLB383+NGdg93vk93v6fNK3v9dmn
                                                    MD5:A2626EA95C2480FEA68906AE6A1F6993
                                                    SHA1:A0592902337C00FC2E70B1DFB3A42453A86535BB
                                                    SHA-256:320BE7D5B730091E6FA35F196314737261C8E154577DCF6AC8C2057D44394AD7
                                                    SHA-512:9801A87D024565676D4F3EAF0702C213E59FC2B6719D8BE95C19C9ED53FC43487F65F5408378B401A2B4C2BD4E2E391C2D848CA87739A6082AB7766EC6B9EFE1
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt_BR DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset pt_BR TIME_FORMAT "%T".. ::msgcat::mcset pt_BR TIME_FORMAT_12 "%T".. ::msgcat::mcset pt_BR DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1224
                                                    Entropy (8bit):4.350784108088039
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83coPUMSeZmkTMm41icpK+7ZVoImEcVUCWdvHvWIn:43lPHFmkm1iMVoxEc+CWZPWIn
                                                    MD5:F6575EC17966320106FF7ABDFB3186E2
                                                    SHA1:68C6B72D664FDA27450FCE8B5734AB627CE825D7
                                                    SHA-256:25ED6AC7A353E23B954B98611AE3B7E56BDCF2B0CB0DB358253CFB8BEBBB831C
                                                    SHA-512:E564543231922A17C898419545BFA65E5E31FE9F005FDD201B735CFDE08E96FB3B98349C2A7959E29CA8F7E6934B0C4C6DE6B5E67209D0DD9A7746DFEBF037B3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ro DAYS_OF_WEEK_ABBREV [list \.. "D"\.. "L"\.. "Ma"\.. "Mi"\.. "J"\.. "V"\.. "S"].. ::msgcat::mcset ro DAYS_OF_WEEK_FULL [list \.. "duminic\u0103"\.. "luni"\.. "mar\u0163i"\.. "miercuri"\.. "joi"\.. "vineri"\.. "s\u00eemb\u0103t\u0103"].. ::msgcat::mcset ro MONTHS_ABBREV [list \.. "Ian"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mai"\.. "Iun"\.. "Iul"\.. "Aug"\.. "Sep"\.. "Oct"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset ro MONTHS_FULL [list \.. "ianuarie"\.. "februarie"\.. "martie"\.. "aprilie"\.. "mai"\.. "iunie"\.. "iulie"\.. "august"\.. "septembrie"\.. "octombrie"\.. "noiembrie"\.. "decembrie"\.. ""].. ::msgcat:
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2091
                                                    Entropy (8bit):4.2886524607041006
                                                    Encrypted:false
                                                    SSDEEP:48:43D+pQ7keidQfRQPgQHB81Z/sFIAZSQWQXQrQxJQjQRnQBFQiWftkWt:26pgkeoSnpjA4tMYiJcCMFmVRt
                                                    MD5:9F1C8DD58550558977821FD500E7C0E0
                                                    SHA1:EFDD809BC2872A5BE0E353D31BE6D7D72E4B829C
                                                    SHA-256:BB35BB6F07BAEF72C329EC3E95D6527A2736070EE2FFE5DE227E1FF0332390F8
                                                    SHA-512:AA3C5C40AE9D342F8287958355C3321CF60566AD3E84E3D18D782FC022A998DA275506A61010A65D2E7D7578F2919C47C63AB0BA63A38800AA48D4B88ACE54D3
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru DAYS_OF_WEEK_ABBREV [list \.. "\u0412\u0441"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset ru DAYS_OF_WEEK_FULL [list \.. "\u0432\u043e\u0441\u043a\u0440\u0435\u0441\u0435\u043d\u044c\u0435"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440\u0433"\.. "\u043f\u044f\u0442\u043d\u0438\u0446\u0430"\.. "\u0441\u0443\u0431\u0431\u043e\u0442\u0430"].. ::msgcat::mcset ru MONTHS_ABBREV [list \.. "\u044f\u043d\u0432"\.. "\u0444\u0435\u0432"\.. "\u043c\u0430\u0440"\.. "\u0430\u043f\u0440"\.. "\u043c\u0430\u0439"\.. "\u0438\u044e\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):248
                                                    Entropy (8bit):4.9420431225061
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoVAgWIZoVY9X3vtfNrsoVA9+3vW6Q9vn:4EnLB383SFWIyaX3vtNl/3vWHNn
                                                    MD5:DC98D88964650E302BE97FDB3B33326E
                                                    SHA1:1DDDCC4265D7B980B867FEE674BEF2FD87D823F7
                                                    SHA-256:13E4E79A0ED82034BADE0CFF8DEF5DE1222F6968108AD710662BDB7DAF36D7E1
                                                    SHA-512:F3B9D528C529DD520FEDA3C20ED354E521C5B3C29F3317E15B7939CE06A3D67554D34DD6E54FE038585E46C560C604A1FD7E7F84914086B5994D52CE2C9E99CE
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru_UA DATE_FORMAT "%d.%m.%Y".. ::msgcat::mcset ru_UA TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset ru_UA DATE_TIME_FORMAT "%d.%m.%Y %k:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1212
                                                    Entropy (8bit):4.359036493565628
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83/YIXo4YY0dD6kMm7fX2NaSIvZdHZgHZ/IxvaGWxvtl9svWTN:43rLTR44/yWltOWB
                                                    MD5:E297221FA73BD78577B398BC7D061D21
                                                    SHA1:F2A6B456272F913A9E97C495CEE73AC774C90FA1
                                                    SHA-256:E65D6E5E837DF0A2DF0DB77BCE45334BBC27EFFF9023C37119E75D49932D9D6C
                                                    SHA-512:AB9DDAE7CB21193C7753041F0B88CF2D40987E7E604B47816219458D217F084AA4EBF36719E22AAB3FD71A271D9F956ADC353182991903D7ADE8C8F00F6B2F9B
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sh DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Uto"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sub"].. ::msgcat::mcset sh DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljak"\.. "Utorak"\.. "Sreda"\.. "\u010cetvrtak"\.. "Petak"\.. "Subota"].. ::msgcat::mcset sh MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maj"\.. "Jun"\.. "Jul"\.. "Avg"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset sh MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "Mart"\.. "April"\.. "Maj"\.. "Juni"\.. "Juli"\.. "Avgust"\.. "Septembar"\.. "Oktobar"\.. "Novembar"\.. "Decembar"\.. ""].. ::msgcat::mcset sh BC
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1255
                                                    Entropy (8bit):4.4043119723436135
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83c46o40u3rIsmJIcm93ApLDVb2IcU95WFGEXF3eUCvtz/v3e6:43c3ow3rF93Ap7tEXFREtznp
                                                    MD5:24DA40901D907D35195CC1B3A675EBC7
                                                    SHA1:8AF31248F06FADA5CFB0D83A940CFF5CE70E2577
                                                    SHA-256:976813F6C53C9BEBBF976B0F560FD7FC5E4EC4C574D7E1CD31F9A4056765CB7A
                                                    SHA-512:A9BC6AAFE9AEEDFD1E483E54A2D27871A09ADD6807D8F90410CD2BB82A91BA9DF435652EC9A7C3AD0A080D7F153CA848BB47DAD3936BA30E4AEFF3C474C433CC
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sk DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "Ut"\.. "St"\.. "\u0160t"\.. "Pa"\.. "So"].. ::msgcat::mcset sk DAYS_OF_WEEK_FULL [list \.. "Nede\u013ee"\.. "Pondelok"\.. "Utorok"\.. "Streda"\.. "\u0160tvrtok"\.. "Piatok"\.. "Sobota"].. ::msgcat::mcset sk MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sk MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "marec"\.. "apr\u00edl"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "august"\.. "september"\.. "okt\u00f3ber"\.. "november"\.. "decem
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1216
                                                    Entropy (8bit):4.333705818952628
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83MIXpC9opYuGS/BrIsmZ5hv1yAxyIVjd392WFThENvt0vJoO:43fXYujZrqyApYJtyR
                                                    MD5:CB76F54CBE0D1AAE8BA956B4C51CBD2A
                                                    SHA1:C1F78375EDB0BD2504553E33B2024C0C63FDB1B2
                                                    SHA-256:11A6264676DBED87E4F718075127E32E107854F35F141642454F484984084486
                                                    SHA-512:69964348FF08DE6EEB5E3DD61057FF0DF5441105EB7BEE7FB7E9AC5E26DCC164E3C7C011CA5CD7BC5B97A7872532331C97CCBC80563F6C5A3548014BFA8BEF16
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sl DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Tor"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sob"].. ::msgcat::mcset sl DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljek"\.. "Torek"\.. "Sreda"\.. "\u010cetrtek"\.. "Petek"\.. "Sobota"].. ::msgcat::mcset sl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "avg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sl MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marec"\.. "april"\.. "maj"\.. "junij"\.. "julij"\.. "avgust"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset sl B
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1321
                                                    Entropy (8bit):4.408176575111904
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83F7ONQEwXwjjTlVoSEh76W/X+WZQJ4hv+H6v2V:43NwjPEwl4VQ8q
                                                    MD5:E606F620F03EC0FBDBE6551601299C5F
                                                    SHA1:0B50AB679E8D90D8E7319BCADAC426E004594D3B
                                                    SHA-256:1F4EFD78F6B45B65F73F09B2F52FC13C2A7C4138DCB7664804878D197B6EBDF9
                                                    SHA-512:08AF2B51EB7111E334ADDA3A03F9A8816C104E9742B523EC363FB5131A3DF73D298A8DDCD573D23C23C65CCFD2B8898DF75AE3D4F04BF80744044FB6BAB5EC0A
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sq DAYS_OF_WEEK_ABBREV [list \.. "Die"\.. "H\u00ebn"\.. "Mar"\.. "M\u00ebr"\.. "Enj"\.. "Pre"\.. "Sht"].. ::msgcat::mcset sq DAYS_OF_WEEK_FULL [list \.. "e diel"\.. "e h\u00ebn\u00eb"\.. "e mart\u00eb"\.. "e m\u00ebrkur\u00eb"\.. "e enjte"\.. "e premte"\.. "e shtun\u00eb"].. ::msgcat::mcset sq MONTHS_ABBREV [list \.. "Jan"\.. "Shk"\.. "Mar"\.. "Pri"\.. "Maj"\.. "Qer"\.. "Kor"\.. "Gsh"\.. "Sht"\.. "Tet"\.. "N\u00ebn"\.. "Dhj"\.. ""].. ::msgcat::mcset sq MONTHS_FULL [list \.. "janar"\.. "shkurt"\.. "mars"\.. "prill"\.. "maj"\.. "qershor"\.. "korrik"\.. "gusht"\.. "shtator"\.. "tetor"\.. "n\u00ebntor"\.. "dhjetor"\.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2087
                                                    Entropy (8bit):4.307749748884122
                                                    Encrypted:false
                                                    SSDEEP:48:43ilQTSBQrQP9QenzMKSFD9NI/QiNQEQrQL1KKYjU5rtAx:2I5EyLMKSFZNIYMzYMKKiqW
                                                    MD5:BF363AB60B57F6D8FDCDBFD230A28DDF
                                                    SHA1:6375CBA0A2197DA7E65BEE45C42F02C4F0B9142D
                                                    SHA-256:FA00A7B22C9941F6C2B893F22B703DCB159CA2F2E4005FD6A74A632AEB786BFA
                                                    SHA-512:91AD8085EF321A5A0E4D2ED204940CB66E8E230BBEDE59A8A07D1CEED9155FCC6B075A1FCC44AE834C1FEEEB3A59256C4310684C5AC453D4C50DFABD88469814
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sr DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0435\u0434"\.. "\u041f\u043e\u043d"\.. "\u0423\u0442\u043e"\.. "\u0421\u0440\u0435"\.. "\u0427\u0435\u0442"\.. "\u041f\u0435\u0442"\.. "\u0421\u0443\u0431"].. ::msgcat::mcset sr DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u0459\u0430"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u0459\u0430\u043a"\.. "\u0423\u0442\u043e\u0440\u0430\u043a"\.. "\u0421\u0440\u0435\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u0440\u0442\u0430\u043a"\.. "\u041f\u0435\u0442\u0430\u043a"\.. "\u0421\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset sr MONTHS_ABBREV [list \.. "\u0408\u0430\u043d"\.. "\u0424\u0435\u0431"\.. "\u041c\u0430\u0440"\.. "\u0410\u043f\u0440"\.. "\u041c\u0430\u0458"\.. "\u0408\u0443\u043d"\.. "\
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1219
                                                    Entropy (8bit):4.3542418837714285
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83qoLt6yLQoAusrIsmZ5m4AcjTHX92WFfjr4MvBvX:43ZLxQNusrr4Aw3Jkq1X
                                                    MD5:3B5C3FFA0829768470BDA1B46D882060
                                                    SHA1:C96799036EC5CCDE799A6B50CD7748908935A2F3
                                                    SHA-256:483916B51BD7E071E88F9EC36AAF3E08FEA823991532F832DE491C6C40B55A9F
                                                    SHA-512:684FA249123878AA7F856DF0FD3B0D9F041113CFEA8EEFA47D0E1948DA23694330BF0D62BA896A3891CD559C16CAE9330BF31508F530AC003D2929D5FD9246D8
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sv DAYS_OF_WEEK_ABBREV [list \.. "s\u00f6"\.. "m\u00e5"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f6"].. ::msgcat::mcset sv DAYS_OF_WEEK_FULL [list \.. "s\u00f6ndag"\.. "m\u00e5ndag"\.. "tisdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f6rdag"].. ::msgcat::mcset sv MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sv MONTHS_FULL [list \.. "januari"\.. "februari"\.. "mars"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "augusti"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat:
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1040
                                                    Entropy (8bit):4.108744949579904
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383A4mScvhkzoR4mtuWckRkoay3UVxMmALfG7IdzVJ633xRCPLMYMvYo76u:4aR83/Shkz1uckO76kMmEf62qOTdMvvn
                                                    MD5:5774860C8AEECBD48F1502E616158CAB
                                                    SHA1:DE7059713EA7913A0C79F5386833CE2BCAD2CFD7
                                                    SHA-256:1DA068C9AA02EF14A2440758C6040D632D96044A20EC501DBB9E40D8592E0E7F
                                                    SHA-512:91E69222DDF55E9E0E389DB77D7A0F2E082351DC3FB34A1A2C1E350E4187E8BB940F6C2EDE1B8651159C2787AA0BE4D7268F33F7A82CAED03514FCE462530408
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sw DAYS_OF_WEEK_ABBREV [list \.. "Jpi"\.. "Jtt"\.. "Jnn"\.. "Jtn"\.. "Alh"\.. "Iju"\.. "Jmo"].. ::msgcat::mcset sw DAYS_OF_WEEK_FULL [list \.. "Jumapili"\.. "Jumatatu"\.. "Jumanne"\.. "Jumatano"\.. "Alhamisi"\.. "Ijumaa"\.. "Jumamosi"].. ::msgcat::mcset sw MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset sw MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Machi"\.. "Aprili"\.. "Mei"\.. "Juni"\.. "Julai"\.. "Agosti"\.. "Septemba"\.. "Oktoba"\.. "Novemba"\.. "Desemba"\.. ""].. ::msgcat::mcset sw BCE "
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1874
                                                    Entropy (8bit):4.080580566597515
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83AI0xnJdnQhmHlHYPKtul+eOPfIxyH5ztUSLu8tptLtrl+eOPfIxyH5ztUSU:43N0dQmHlHYPKtu1HxMtr1Hx/
                                                    MD5:85288236C3997302EA26D7403BBA2C15
                                                    SHA1:05AB389CC4DCF17B37BFF6ED1ECD58D6E9850A01
                                                    SHA-256:AEFDC4255890D5B3FFE5CEE1B457B7D711283C2287ABA644155C10956012F6C1
                                                    SHA-512:8E389D46606176EE14B8356153095B49C9426B80139B672A620F488891F091D1A272D4FB116775900E4AB4EC84DDDEBD8D6AF81AC672F14F148F2BFC638D2B10
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta DAYS_OF_WEEK_FULL [list \.. "\u0b9e\u0bbe\u0baf\u0bbf\u0bb1\u0bc1"\.. "\u0ba4\u0bbf\u0b99\u0bcd\u0b95\u0bb3\u0bcd"\.. "\u0b9a\u0bc6\u0bb5\u0bcd\u0bb5\u0bbe\u0baf\u0bcd"\.. "\u0baa\u0bc1\u0ba4\u0ba9\u0bcd"\.. "\u0bb5\u0bbf\u0baf\u0bbe\u0bb4\u0ba9\u0bcd"\.. "\u0bb5\u0bc6\u0bb3\u0bcd\u0bb3\u0bbf"\.. "\u0b9a\u0ba9\u0bbf"].. ::msgcat::mcset ta MONTHS_ABBREV [list \.. "\u0b9c\u0ba9\u0bb5\u0bb0\u0bbf"\.. "\u0baa\u0bc6\u0baa\u0bcd\u0bb0\u0bb5\u0bb0\u0bbf"\.. "\u0bae\u0bbe\u0bb0\u0bcd\u0b9a\u0bcd"\.. "\u0b8f\u0baa\u0bcd\u0bb0\u0bb2\u0bcd"\.. "\u0bae\u0bc7"\.. "\u0b9c\u0bc2\u0ba9\u0bcd"\.. "\u0b9c\u0bc2\u0bb2\u0bc8"\.. "\u0b86\u0b95\u0bb8\u0bcd\u0b9f\u0bcd"\.. "\u0b9a\u0bc6\u0baa\u0bcd\u0b9f\u0bae\u0bcd\u0baa\u0bb0\u0bcd"\.. "\u0b85\u0b95\u0bcd\u0b9f\u0bcb\u0baa\u0bb0\u0bcd"\.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):257
                                                    Entropy (8bit):4.863003494480733
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xosDv+IZosK3v6ry/5osDo+3v+6f6HyFvn:4EnLB383ZDvl5K3v6ry/ZDF3vmSVn
                                                    MD5:CF078352DA0507C767F04E31D6C14296
                                                    SHA1:0A9B1255BD85B60D3620AE61370F54748AB7A182
                                                    SHA-256:4978A193076DE56944236F7F1DCECACFF739536DFB3DBEFC1F7FE2B97A8AEAF4
                                                    SHA-512:6FFC85B2A8DECB373EC76B1CD1A9459A30E443319F2C8DB9BBE6E115F5EFEEBAC314D4E8BE996EA55EE46466C6F6057A73078F5FDCF1C4CBAF1A270E45BC10C0
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset ta_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset ta_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2149
                                                    Entropy (8bit):4.097884113767283
                                                    Encrypted:false
                                                    SSDEEP:48:43a8mxI9k3JR0UjjFbPcniLHVktjjFbPcniLHVM:2a8v9k3JdbPcIidbPcIG
                                                    MD5:61E4CB2AAD66285E9113071057F39C35
                                                    SHA1:A2BD21090859669C4B6A875E077825381B7E2702
                                                    SHA-256:9E96C7123100234A7018533764502985A208F2EB3314F5B6332D46016725A63F
                                                    SHA-512:589A2D65508B07B5FDEDA883F71A4B496B25458CA1ECE7C4D4F5DAE82EB683DA82C8E21E57D63A235AB600174C9D362A746B2E27BAA6E3ADE1B7BD9D6000BE27
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te DAYS_OF_WEEK_ABBREV [list \.. "\u0c06\u0c26\u0c3f"\.. "\u0c38\u0c4b\u0c2e"\.. "\u0c2e\u0c02\u0c17\u0c33"\.. "\u0c2c\u0c41\u0c27"\.. "\u0c17\u0c41\u0c30\u0c41"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30"\.. "\u0c36\u0c28\u0c3f"].. ::msgcat::mcset te DAYS_OF_WEEK_FULL [list \.. "\u0c06\u0c26\u0c3f\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c38\u0c4b\u0c2e\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2e\u0c02\u0c17\u0c33\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2c\u0c41\u0c27\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c17\u0c41\u0c30\u0c41\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c28\u0c3f\u0c35\u0c3e\u0c30\u0c02"].. ::msgcat::mcset te MONTHS_ABBREV [list \.. "\u0c1c\u0c28\u0c35\u0c30\u0c3f"\.. "\u0c2b\u0c3f\u0c2c\u0c4d\u0c30\u0c35\u0c30\u0c3f"\.. "\u0c2e\u0c3
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):419
                                                    Entropy (8bit):5.058324650031252
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383LjZWsn0sHjoD0savzda3v6ry/ZF3vMSVn:4aR833Z1nnHjoDnavzd8vSCZNvMSV
                                                    MD5:BCA040A356E7E8CC597EFB9B9065F8E1
                                                    SHA1:ADAF7EC8C2035BC06E168D3F1BD7F39277E9273F
                                                    SHA-256:B110FEEDDA21ECCEFA624BEF8E1476E9F221FB253880AC370967AE4D0237CA7A
                                                    SHA-512:D408ECE8CF89FB23B45420D3CBA7655EEE713498210889A84EE25D3417360705546D97028EAAAA47764B6E9B0A3699669B98C0A53861A38E0DFCB9F3B8A47BEC
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te_IN AM "\u0c2a\u0c42\u0c30\u0c4d\u0c35\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN PM "\u0c05\u0c2a\u0c30\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset te_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset te_IN DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2359
                                                    Entropy (8bit):4.382796122808316
                                                    Encrypted:false
                                                    SSDEEP:48:439X4QKPQJecQwFA0P9JmDsxQ7KHfWkD2CQM0DnWxFDzCYmdrtVP:29ohCi1028QmHfIC4jW3DmHB
                                                    MD5:7F61E1EA256D78948189EF07119663CD
                                                    SHA1:6867E9780049FACE9984B7788B6F362B8D1AD718
                                                    SHA-256:48BEAF693BF5B6EED15234DB0D375B97E6D576A749E9048420C153E6CAFC0259
                                                    SHA-512:F3E24E0B41A7D722AC2FA0E429A2DCB1CCB5BAECC9912ADF6AF79C51366EA1AC9F931F0F44F068F3CEE6873516E6223CC5E7616CF523B1DFB9E528DE4D58454A
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset th DAYS_OF_WEEK_ABBREV [list \.. "\u0e2d\u0e32."\.. "\u0e08."\.. "\u0e2d."\.. "\u0e1e."\.. "\u0e1e\u0e24."\.. "\u0e28."\.. "\u0e2a."].. ::msgcat::mcset th DAYS_OF_WEEK_FULL [list \.. "\u0e27\u0e31\u0e19\u0e2d\u0e32\u0e17\u0e34\u0e15\u0e22\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e08\u0e31\u0e19\u0e17\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e2d\u0e31\u0e07\u0e04\u0e32\u0e23"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e38\u0e18"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e1a\u0e14\u0e35"\.. "\u0e27\u0e31\u0e19\u0e28\u0e38\u0e01\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e40\u0e2a\u0e32\u0e23\u0e4c"].. ::msgcat::mcset th MONTHS_ABBREV [list \.. "\u0e21.\u0e04."\.. "\u0e01.\u0e1e."\.. "\u0e21\u0e35.\u0e04."\.. "\u0e40\u0e21.\u0e22."\.. "\u0e1e.\u0e04."\.. "\u0e21\u0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1183
                                                    Entropy (8bit):4.390397293529625
                                                    Encrypted:false
                                                    SSDEEP:24:4aR83ZVUflVdq4qTr6dyX59508THHCh5LbQgWiNv9KvWIn:43PXTtbTngLhWiJGWIn
                                                    MD5:017F0F989BD5DBBF25E7C797CE09C45C
                                                    SHA1:162922DBD55A31A74410375A36EE7BC50E092BDD
                                                    SHA-256:4B85B345D6C43F7257C6849A60A492397FD5FD9D82DF3A2252189D7A1ECCBB64
                                                    SHA-512:73B6CF395753D863330687404E8A584CB08B81A8CC456DCE7BB49C4EA15EA19E45E3CC1E1367E10915DE14AC6258383289BCFEF55AD2768A50889DF390D37EF9
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset tr DAYS_OF_WEEK_ABBREV [list \.. "Paz"\.. "Pzt"\.. "Sal"\.. "\u00c7ar"\.. "Per"\.. "Cum"\.. "Cmt"].. ::msgcat::mcset tr DAYS_OF_WEEK_FULL [list \.. "Pazar"\.. "Pazartesi"\.. "Sal\u0131"\.. "\u00c7ar\u015famba"\.. "Per\u015fembe"\.. "Cuma"\.. "Cumartesi"].. ::msgcat::mcset tr MONTHS_ABBREV [list \.. "Oca"\.. "\u015eub"\.. "Mar"\.. "Nis"\.. "May"\.. "Haz"\.. "Tem"\.. "A\u011fu"\.. "Eyl"\.. "Eki"\.. "Kas"\.. "Ara"\.. ""].. ::msgcat::mcset tr MONTHS_FULL [list \.. "Ocak"\.. "\u015eubat"\.. "Mart"\.. "Nisan"\.. "May\u0131s"\.. "Haziran"\.. "Temmuz"\.. "A\u011fustos"\.. "Eyl\u00fcl"\.. "Ekim"\.. "Kas\u0131m"\.. "Aral\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2165
                                                    Entropy (8bit):4.289021158621493
                                                    Encrypted:false
                                                    SSDEEP:48:436yILgoQjQPxUIkgPDRQnQ0vVQbC1iQwweIgWQDIoZI7QDI3QbI87IVQnIzQ7mh:2AzUe3EhV8CYgrbH7z3fLVTzgn5jyX7p
                                                    MD5:323BD95809A44B0BADC71AD36E5F095B
                                                    SHA1:44F6016873CA955D27545C56CCD24BDB06A83C43
                                                    SHA-256:7093DA7E39CEB6D3F51EB6CF1CCA2D7F3680ED7B8FE4A5F0CECEEF6BEB21AC77
                                                    SHA-512:DB16E0E2D17CE47673DE781A7171944C14CC550FB8EB0920C05B979E4D067E36DF0B59B8BFA81F82D8FCE1FFDDAAD2755E68BFE5BC0DBB11E8716A4D18BA5F7E
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset uk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0432\u0442"\.. "\u0441\u0440"\.. "\u0447\u0442"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset uk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0456\u043b\u044f"\.. "\u043f\u043e\u043d\u0435\u0434\u0456\u043b\u043e\u043a"\.. "\u0432\u0456\u0432\u0442\u043e\u0440\u043e\u043a"\.. "\u0441\u0435\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440"\.. "\u043f'\u044f\u0442\u043d\u0438\u0446\u044f"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset uk MONTHS_ABBREV [list \.. "\u0441\u0456\u0447"\.. "\u043b\u044e\u0442"\.. "\u0431\u0435\u0440"\.. "\u043a\u0432\u0456\u0442"\.. "\u0442\u0440\u0430\u0432"\.. "\u0447\u0435\u0440\u0432"\.. "\u043b
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1471
                                                    Entropy (8bit):4.44729506678271
                                                    Encrypted:false
                                                    SSDEEP:24:4aR836DNjYTP55YAUy2tJ9kyzW68IFYHMBSW1K1pvhv1O:43dbYJyC8ySgI1dV1O
                                                    MD5:C127F54C462917D3B3EEF5F29F612138
                                                    SHA1:B1D9A67F856D93F98524C6372B352EA0DE1B9CD3
                                                    SHA-256:E9B7AECD456F1D2288604C982B5DED0DCF71DCA968C0B0EAFF4CA16CC3B73EC2
                                                    SHA-512:0B0F132F10580751258D37E070338C3B39DF57FDECDB9D0AFA67E90D6766DDCB4D711876E551ED759D177F1B8F4E9E1DD8F7899F7CB57F8039F55EC4C2984E87
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset vi DAYS_OF_WEEK_ABBREV [list \.. "Th 2"\.. "Th 3"\.. "Th 4"\.. "Th 5"\.. "Th 6"\.. "Th 7"\.. "CN"].. ::msgcat::mcset vi DAYS_OF_WEEK_FULL [list \.. "Th\u01b0\u0301 hai"\.. "Th\u01b0\u0301 ba"\.. "Th\u01b0\u0301 t\u01b0"\.. "Th\u01b0\u0301 n\u0103m"\.. "Th\u01b0\u0301 s\u00e1u"\.. "Th\u01b0\u0301 ba\u0309y"\.. "Chu\u0309 nh\u00e2\u0323t"].. ::msgcat::mcset vi MONTHS_ABBREV [list \.. "Thg 1"\.. "Thg 2"\.. "Thg 3"\.. "Thg 4"\.. "Thg 5"\.. "Thg 6"\.. "Thg 7"\.. "Thg 8"\.. "Thg 9"\.. "Thg 10"\.. "Thg 11"\.. "Thg 12"\.. ""].. ::msgcat::mcset vi MONTHS_FULL [list \.. "Th\u00e1ng m\u00f4\u0323t"\.. "Th\u00e1ng hai"\.. "Th\u00e1ng ba"\.. "Th\u00e1ng t\u01b0"\.. "Th\u00e
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with very long lines (1598), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3385
                                                    Entropy (8bit):4.5164095151631125
                                                    Encrypted:false
                                                    SSDEEP:48:43qrY2BBT7uxDqwPqDa8c3FLbYmhyvMDKbW0YGLuoEyke2gdr:2yPTKdo
                                                    MD5:2F356DE14D48B1091DEAA32D20C38D96
                                                    SHA1:4AB78D47A73290000955A7C1DFDF7106093F69FD
                                                    SHA-256:EB247F5184A59414D3DF7E3ECA51F5998C248CFB27D2C02E62A7A30AB35197A7
                                                    SHA-512:602410830018B455C68AE2EBDD83BA561CF59DA5898E00C80CE7EF619912E591EB38B4C8FE8D9B1F024E7105B0C4D2D326FC855F31E79C1B954429B947DFFBB1
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh DAYS_OF_WEEK_ABBREV [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh DAYS_OF_WEEK_FULL [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh MONTHS_ABBREV [list \.. "\u4e00\u6708"\.. "\u4e8c\u6708"\.. "\u4e09\u6708"\.. "\u56db\u6708"\.. "\u4e94\u6708"\.. "\u516d\u6708"\.. "\u4e03\u6708"\.. "\u516b\u6708"\.. "\u4e5d\u6708"\.. "\u5341\u6708"\.. "\u5341\u4e00\u6708"\.. "\u5341\u4e8c\u6708"\.. ""].. ::msgcat::m
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):319
                                                    Entropy (8bit):5.167825099880243
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoX5YBoHJ+3vtfNrsoHJ+3v6MYBoXa+3vYq9vn:4EnLB383U5YMJ+3vtN3J+3v6LcL3vYqN
                                                    MD5:9FCDC2E80E13984D434E3CC91E1ED14C
                                                    SHA1:710D9EE2A71021F4AB609886138EED43C1380ACD
                                                    SHA-256:4C8A855700FEFE8EE21B08030FF4159D8011AE50353F063229C42DE6292475CF
                                                    SHA-512:D899A1F58DF1051BB2C2C4AC859C52A2D19B1593C37022A29439B37A8057ADC3941F3564E2E1D9CEB72AE123A4E12E24C3736343AA3A5EC8749AB5AEBBF65085
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_CN DATE_FORMAT "%Y-%m-%e".. ::msgcat::mcset zh_CN TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset zh_CN TIME_FORMAT_12 "%P%I\u65f6%M\u5206%S\u79d2".. ::msgcat::mcset zh_CN DATE_TIME_FORMAT "%Y-%m-%e %k:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):780
                                                    Entropy (8bit):4.716025632367214
                                                    Encrypted:false
                                                    SSDEEP:12:4EnLB383HmSBBHZovDh4ToC4qU3WwVW3v6P3v3WwSn:4aR83Hxo14u3Ww+viv3WwS
                                                    MD5:CFDA7B6463305FA15DBBA72D725A1876
                                                    SHA1:2BF885073FBAF4A38B7AFDA76CA391F195A5A362
                                                    SHA-256:7E1C5BD9EC1A17BB851B0DCABD0DFA9FF9D64B89603D9D3FBEAAC609172346AE
                                                    SHA-512:55F974C706933ECE0575A33C381D9B370B8A408C5C5514C805EC04C8B0CA5BAFAA47267DA98E1805B478A9589FFB7549D79002B2A7AF387049011D78DD7605B6
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_HK DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u4e00"\.. "\u4e8c"\.. "\u4e09"\.. "\u56db"\.. "\u4e94"\.. "\u516d"].. ::msgcat::mcset zh_HK MONTHS_ABBREV [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"\.. ""].. ::msgcat::mcset zh_HK DATE_FORMAT "%Y\u5e74%m\u6708%e\u65e5".. ::msgcat::mcset zh_HK TIME_FORMAT_12 "%P%I:%M:%S".. ::msgcat::mcset zh_HK DATE_TIME_FORMAT "%Y\u5e74%m\u6708%e\u65e5 %P%I:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):347
                                                    Entropy (8bit):5.062880051437783
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoOpEoPpFocMohX3v6Zwoh+3v6fxvn:4EnLB383J53v6O3vCn
                                                    MD5:3218F8E6BEDD534277DE0849C423158E
                                                    SHA1:10C006446A10406A5644C4033665E877EBF72AF7
                                                    SHA-256:500546B3211D454659D845B4AB9AEF226125100DF40407C49530DE17CDD4363F
                                                    SHA-512:3142893DA85BA8F83A5B6851B313B5F5FF80D2B989C1AE015665EE70373249B44EFB4FF7C621F1D8F37AC6019EF5E8D6D21C76C48998C3D9072F9C5060AA8813
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_SG AM "\u4e0a\u5348".. ::msgcat::mcset zh_SG PM "\u4e2d\u5348".. ::msgcat::mcset zh_SG DATE_FORMAT "%d %B %Y".. ::msgcat::mcset zh_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_SG DATE_TIME_FORMAT "%d %B %Y %P %I:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):354
                                                    Entropy (8bit):5.124064818715749
                                                    Encrypted:false
                                                    SSDEEP:6:SlSyEtJLl73oo6d3/xoAykaRULH/XRxy/5oAyjZRULHi5oAyU/G0OMoAyxW3v6ZQ:4EnLB38315xDOiKRRW3v6F3v8A2n
                                                    MD5:9010E34791B5DDB7F1E0AD4DA6BD4623
                                                    SHA1:418F7374BABEF27FEC8E00D3A32F535084593AB9
                                                    SHA-256:DBA0584B8E1925B439F06E0BF0965E97AFB7EB39E70E0E4C9B70769EBC5F996C
                                                    SHA-512:D3AB698B725E84DAB06E472C41FF2EB55D63885D22B4598C596800BAC83A02A44CB524524F267D090952AF7E0031F47720786ACF9E354EF672CF9EEFB7DB3BD4
                                                    Malicious:false
                                                    Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_TW BCE "\u6c11\u570b\u524d".. ::msgcat::mcset zh_TW CE "\u6c11\u570b".. ::msgcat::mcset zh_TW DATE_FORMAT "%Y/%m/%e".. ::msgcat::mcset zh_TW TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_TW DATE_TIME_FORMAT "%Y/%m/%e %P %I:%M:%S %z"..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):33777
                                                    Entropy (8bit):4.60013086740989
                                                    Encrypted:false
                                                    SSDEEP:768:4D0xrpIuhenN4kA0G6sRcl5AdtsPLKiF64aJQ2L:HpnhsS9C5Adqua5aJvL
                                                    MD5:4ECD97188BFED58A15FE22EC566FA6A3
                                                    SHA1:6E4E91096298F1A0AE6CD4241F167C8B4F661EE5
                                                    SHA-256:67A157F1873D606B53DC4D894BD8E71F6B1A0DD66177B9513BD039B348B40349
                                                    SHA-512:1D5067BBB13DAB001168EEB41EBFA2D13BACB0F43A8067CC93923E8F4D062AA387DA23D7D98D6A2AE77D7C849A6026F2343102CBE03690C2CEA0890222339475
                                                    Malicious:false
                                                    Preview:# optparse.tcl --..#..# (private) Option parsing package..# Primarily used internally by the safe:: code...#..#.WARNING: This code will go away in a future release..#.of Tcl. It is NOT supported and you should not rely..#.on it. If your code does rely on this package you..#.may directly incorporate this code into your application.....package require Tcl 8.5-..# When this version number changes, update the pkgIndex.tcl file..# and the install directory in the Makefiles...package provide opt 0.4.8....namespace eval ::tcl {.... # Exported APIs.. namespace export OptKeyRegister OptKeyDelete OptKeyError OptKeyParse \.. OptProc OptProcArgGiven OptParse \... Lempty Lget \.. Lassign Lvarpop Lvarpop1 Lvarset Lvarincr \.. SetMax SetMin......################# Example of use / 'user documentation' ###################.... proc OptCreateTestProc {} {.....# Defines ::tcl::OptParseTest as a test proc with parsed arguments...# (can't be d
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):620
                                                    Entropy (8bit):4.702477618616754
                                                    Encrypted:false
                                                    SSDEEP:12:jHxIRu9zhjJS42wbGlTULuUAZb3KykszLYIGbyAkXaqrQ+pBb6:biRUJS42wbGlTUcZ+yk2LY0XaqrB4
                                                    MD5:07532085501876DCC6882567E014944C
                                                    SHA1:6BC7A122429373EB8F039B413AD81C408A96CB80
                                                    SHA-256:6A4ABD2C519A745325C26FB23BE7BBF95252D653A24806EB37FD4AA6A6479AFE
                                                    SHA-512:0D604E862F3A1A19833EAD99AAF15A9F142178029AB64C71D193CEE4901A0196C1EEDDC2BCE715B7FA958AC45C194E63C77A71E4BE4F9AEDFD5B44CF2A726E76
                                                    Malicious:false
                                                    Preview:# Tcl package index file, version 1.1..# This file is generated by the "pkg_mkIndex -direct" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....if {![package vsatisfies [package provide Tcl] 8.5-]} {return}..package ifneeded opt 0.4.8 [list source [file join $dir optparse.tcl]]..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):23995
                                                    Entropy (8bit):4.884828325514459
                                                    Encrypted:false
                                                    SSDEEP:384:8xgjLNILEHsdAW2UfnImRqXqux6XmihmCchzPLrXJjJh6PLfzdklG:8xgjLNImsdnvIm86uGLhLchzDzJ9h6Dn
                                                    MD5:DDB0AB9842B64114138A8C83C4322027
                                                    SHA1:ECCACDC2CCD86A452B21F3CF0933FD41125DE790
                                                    SHA-256:F46AB61CDEBE3AA45FA7E61A48930D64A0D0E7E94D04D6BF244F48C36CAFE948
                                                    SHA-512:C0CF718258B4D59675C088551060B34CE2BC8638958722583AC2313DC354223BFEF793B02F1316E522A14C7BA9BED219531D505DE94DC3C417FC99D216A01463
                                                    Malicious:false
                                                    Preview:# package.tcl --..#..# utility procs formerly in init.tcl which can be loaded on demand..# for package management...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval tcl::Pkg {}....# ::tcl::Pkg::CompareExtension --..#..# Used internally by pkg_mkIndex to compare the extension of a file to a given..# extension. On Windows, it uses a case-insensitive comparison because the..# file system can be file insensitive...#..# Arguments:..# fileName.name of a file whose extension is compared..# ext..(optional) The extension to compare against; you must..#..provide the starting dot...#..Defaults to [info sharedlibextension]..#..# Results:..# Returns 1 if the extension matches, 0 otherwise....proc tcl::Pkg::CompareExtension {fileName {ext {}}} {.. global tcl_platfor
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):844
                                                    Entropy (8bit):4.883013702569192
                                                    Encrypted:false
                                                    SSDEEP:12:TF7S2n2wn2SNHaeYF9xcwrmXhbs1GUiSYX3EtSK78ex4VIpynEw88/McUBbPgnz:TF7Hn2wnlk2KwyZSM4SkV/3UB7Cz
                                                    MD5:577787C2F4F5956BA70F83012B980AE5
                                                    SHA1:040B2469F796F3FDFCD1E1DD2EB1C5B799EDEF62
                                                    SHA-256:E269029C8263E3CBC1920C3604ECDCF15EDCCB208A0D68F9EB42B73954D620C0
                                                    SHA-512:C2940F6F3D77412EFC537B8AB67352F519DFFA95739FCC17BF1817335AFD9E5BFE91ABE98CBA99E278CB4923D4E6D431ED9D72282745203C0F7D73193F550238
                                                    Malicious:false
                                                    Preview:# parray:..# Print the contents of a global array on stdout...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....proc parray {a {pattern *}} {.. upvar 1 $a array.. if {![array exists array]} {...return -code error "\"$a\" isn't an array".. }.. set maxl 0.. set names [lsort [array names array $pattern]].. foreach name $names {...if {[string length $name] > $maxl} {... set maxl [string length $name]...}.. }.. set maxl [expr {$maxl + [string length $a] + 2}].. foreach name $names {...set nameString [format %s(%s) $a $name]...puts stdout [format "%-*s = %s" $maxl $nameString $array($name)].. }..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):42223
                                                    Entropy (8bit):4.822635446297551
                                                    Encrypted:false
                                                    SSDEEP:768:H/Jo8y7AyARYhZfc3njlVdRIp4xOtoYx4WneNiBq5vIhfwEaqadlUCJ2Pbb1P6:H/c7AmhZmnjvdRIG924WneNiBq5+fwEc
                                                    MD5:B8C1561D471CFBF4111C706411D59883
                                                    SHA1:71483EAEEF377EE9AF90BEC44F70C7B12C5BC720
                                                    SHA-256:C21DCE3AB31893118BBED01E559070F1D3541877FEE331BD45F5BF4300ED9654
                                                    SHA-512:465065A938C71AF4588B3331B51A62DD57F57492EB1CB6C0F52B9FD0A2FE7A54B1E995AA56E4A41D7A99EAFF665C1E23E3B240FB3F9840AB242C21B1DBFFFF45
                                                    Malicious:false
                                                    Preview:# safe.tcl --..#..# This file provide a safe loading/sourcing mechanism for safe interpreters...# It implements a virtual path mechanism to hide the real pathnames from the..# child. It runs in a parent interpreter and sets up data structure and..# aliases that will be invoked when used from a child interpreter...#..# See the safe.n man page for details...#..# Copyright (c) 1996-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....#..# The implementation is based on namespaces. These naming conventions are..# followed:..# Private procs starts with uppercase...# Public procs are exported and starts with lowercase..#....# Needed utilities package..package require opt 0.4.8....# Create the safe namespace..namespace eval ::safe {.. # Exported API:.. namespace export interpCreate interpInit interpConfigure interpDelete \...interpAddToAccessPath interpFindInAccessPath setL
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5617
                                                    Entropy (8bit):4.747404679682368
                                                    Encrypted:false
                                                    SSDEEP:96:eOaVhNUMUuUQU2UsUIUbUEUEeUkgU6UWSO0DT5RTdcvsilrvs+jscMK57ehXowrz:ejVHRRLP3LWDXewTbSO0DT5RTdcvsilg
                                                    MD5:C62FB22F4C9A3EFF286C18421397AAF4
                                                    SHA1:4A49B8768CFF68F2EFFAF21264343B7C632A51B2
                                                    SHA-256:DDF7E42DEF37888AD0A564AA4F8CA95F4EEC942CEBEBFCA851D35515104D5C89
                                                    SHA-512:558D401CB6AF8CE3641AF55CAEBC9C5005AB843EE84F60C6D55AFBBC7F7129DA9C58C2F55C887C3159107546FA6BC13FFC4CCA63EA8841D7160B8AA99161A185
                                                    Malicious:false
                                                    Preview:# Tcl autoload index file, version 2.0..# -*- tcl -*-..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(auto_reset) [list source [file join $dir auto.tcl]]..set auto_index(tcl_findLibrary) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex_old) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::init) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::cleanup) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::mkindex) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::hook) [list source [file join $dir auto.t
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):12204
                                                    Entropy (8bit):4.763796758810551
                                                    Encrypted:false
                                                    SSDEEP:192:55CjnlRfMKqaOH5bE2KjNkkpgpCmqkkuowUh9PTYMsvSO+xy8h/vuKisM68E:5q3MKYH5bE1jNkkpgomq/uCPTYMC+k83
                                                    MD5:215262A286E7F0A14F22DB1AA7875F05
                                                    SHA1:66B942BA6D3120EF8D5840FCDEB06242A47491FF
                                                    SHA-256:4B7ED9FD2363D6876092DB3F720CBDDF97E72B86B519403539BA96E1C815ED8F
                                                    SHA-512:6ECD745D7DA9D826240C0AB59023C703C94B158AE48C1410FAA961A8EDB512976A4F15AE8DEF099B58719ADF0D2A9C37E6F29F54D39C1AB7EE81FA333A60F39B
                                                    Malicious:false
                                                    Preview:# -*- tcl -*-..#..# Searching for Tcl Modules. Defines a procedure, declares it as the primary..# command for finding packages, however also uses the former 'package unknown'..# command as a fallback...#..# Locates all possible packages in a directory via a less restricted glob. The..# targeted directory is derived from the name of the requested package, i.e...# the TM scan will look only at directories which can contain the requested..# package. It will register all packages it found in the directory so that..# future requests have a higher chance of being fulfilled by the ifneeded..# database without having to come to us again...#..# We do not remember where we have been and simply rescan targeted directories..# when invoked again. The reasoning is this:..#..# - The only way we get back to the same directory is if someone is trying to..# [package require] something that wasn't there on the first scan...#..# Either..# 1) It is there now: If we rescan, you get it; if not you don
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):147
                                                    Entropy (8bit):4.995501022397479
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2DcsBdNMXGm2OHnFvpsYoHsdSalHFLwy:SlSWB9eg/2DBpDm2OHnFvmYoH1alHOy
                                                    MD5:FF8B5540631A6EE93507338C4E7AA49D
                                                    SHA1:817B261A1B6B92AA498EC286349964EA10FB5A84
                                                    SHA-256:7213997BB9CF9D384A7002B8C8EFEF25C01ABA6083D9835A16D583D5DCEE40A0
                                                    SHA-512:8D78AC4868ED0013EDA536C0E82E0E91398772AA18C637AEFE22F24B142FCDA55A4CB853B2282951E907C9E2F62BD3F831A5CF995F52898F5225D16889943A9C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Abidjan) {.. {-9223372036854775808 -968 0 LMT}.. {-1830383032 0 0 GMT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.832432925672155
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dc9XfBQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DUGDBS
                                                    MD5:52FDFD3DB98475FBBB620D0D5565C5CC
                                                    SHA1:C7750452859663605272553DBEE0B6C134E1517C
                                                    SHA-256:6040827AFED8CEF45F252FBD7E3E862C0B5E9D06C1C98C58BAD61DFE67BD57CC
                                                    SHA-512:2FF9D96D81279148A86BE208FEEACCBCB8B4224D093D6C092ECD1C4EA2186589CCF947027D3A726600C703611B4CFEE029AA14ED3E8593C477B427C4F342CF27
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Accra) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.817170256300069
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DczqIVDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DnaDkO
                                                    MD5:30CDD4D37E9DD60FBF6D754C9343F364
                                                    SHA1:56F896C21068764B7B8F884F374B18913CA3D9CA
                                                    SHA-256:E11FD8AD8572B684333810CFDC23B92E1ACF619875866985E288D92F8277D07F
                                                    SHA-512:78FC8043CCE25713404E70996229E5EA8238BF5C0F59029064EDA5494E2D4F54398931F3D855E30C82B2C53B789C40EE4CBF09D0F98C2BA6734595D4AA75017A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Addis_Ababa) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1080
                                                    Entropy (8bit):4.187497782275587
                                                    Encrypted:false
                                                    SSDEEP:12:MB862D7nmdHh5Cv6/lHY8SOSuvvzXipFSgSO5vW5aKmvbsF6VWsXN87QBWcAFy:5veSvKlHYXNujXipFSjKRKXiWsXCGWJy
                                                    MD5:E8D3DF11CE0E7575485573FA07D955D5
                                                    SHA1:3B2C00C85B6C0BFAA1C676C970D6DF1B4BDC3D4A
                                                    SHA-256:E6874647561CE1C5FD1F650C9B167F77AC5B24FD2026046399A9043CF998E5C4
                                                    SHA-512:E2968BE847622CF243C0E498436FD21BDC2E1DF0FD8D694F2C70569D17CE896CDE4968BB8ABDEF9F687439E4EA2D955AE87D6C15E81F881EE1413416A90765D4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Algiers) {.. {-9223372036854775808 732 0 LMT}.. {-2486592732 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1531443600 0 0 WET}.. {-956365200 3600 1 WEST}.. {-950486400 0 0 WET}.. {-942012000 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796262400 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766630800 3600 0 CET}.. {-733280400 0 0 WET}.. {-439430400 3600 0 CET}.. {-212029200 0 0 WET}.. {41468400 3600 1 WEST}.. {54774000 0 0 WET}.. {231724800 3600 1 WEST}.. {246240000 3600 0 CET}.. {259545600 7200 1 CEST}.. {275274000 3600 0 CET}.. {309740400 0 0 WET}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.801054282631739
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjEUEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DGs+DR
                                                    MD5:A543BDEB3771017421FB75231F0004F2
                                                    SHA1:D682C58C27562FF3ABAB8EDE8EB6EA754DA7C02E
                                                    SHA-256:064EB7F9A1FA05A317C6BDCA6B102BC1560D980758F9E4DDB010C9E7DC068ECB
                                                    SHA-512:44848D60EDC79AF784A819714C0D9F62DCCB6329B47F25D74AB8C174BF9EC3F783C66FEB27F588A93FABA9BECAF076F453D6D797CE4F28461F7AE69440EA54C7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmara) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.806258322241929
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjAWDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2D8DkOn
                                                    MD5:1B5E386E7A2F10D9385DE4C5683EBB85
                                                    SHA1:FECBA599C37493D2E0AEE8E21BAB40BF8E8DC82A
                                                    SHA-256:76939852A98EA7BF156D0AC18B434CC610DAF5232322C0FBB066CD52C5B72AF7
                                                    SHA-512:B36FABFCDB2187A3A4A211C8E033D96C91E3C4D47907D284E10786555562C82231566033EAB4753EF1E48DF1233CFC8C6C0FB3CA50748BE0B2554A972A88FBA0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmera) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.883634030944169
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcxAQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwNDBS
                                                    MD5:6B9BB5B37C41AA727E31BF03483DC1CA
                                                    SHA1:CB3BBA37B063EA4A54CD15C6E30C14D8CA30D3C0
                                                    SHA-256:F6D1BA22115A6565B6D6ABEB578F001DDB41E673C422C8EA70D0DF77B24115F6
                                                    SHA-512:23DB3E298FDEB165FD85D99E03C00835B584984B814AF7F54A9CDD4A9F93E16B0C58342D319129F46CF8EC36F93DE5EA51B492CA4CABDAB75D84709BC6C26119
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Bamako) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.882974805254803
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcx2m/2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dw/2D4yn
                                                    MD5:92FF9E5835C0C80F358BFE69120660A0
                                                    SHA1:724758B43BD79DD8A29B02BE6910D492924F8280
                                                    SHA-256:5047A507D22B68C9349EB6A48C41C80DB4C69F98F99C6574059DEA87178E36C0
                                                    SHA-512:6FCB709DB4AC19191FECE1E8BAC55E77F265B5AF89F7A3565F06BFAF0BEE12E3EAF2F52CA09C68D75C358C25A31867505CE8AD75D7386DCD15F4BE1CE61272CD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Bangui) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.888193386512119
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcx79FHp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dw7J4c
                                                    MD5:46E5703CF284E44E15E5872DF075FCBC
                                                    SHA1:EA4BFA6D568DFA877F72302ADA21ECC2840D9FD5
                                                    SHA-256:77E610A02CCECE3045B09D07A9BE6100F5AA9C3C2AEB543535C9AE941194F4E4
                                                    SHA-512:1454467FE63E97DFA4DE66E359F68B2D80C92CDE59FC15A4BE513629FFD154D2281EADF3FC78F7AFDDF5A5896195F3A69E66697A659BBB1A0EAFD3E1DA6565EC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Banjul) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.847843768169462
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2Dc5iDMXGm2OHGVkeoHsdSawwF6hSVPVFwy:SlSWB9eg/2D4uDm2OHCkeoH1awwFMmMy
                                                    MD5:7E710C939B9CC0C1AC1ECF4239B543C5
                                                    SHA1:429CC87086FB22727815ED05AC6472333FF06013
                                                    SHA-256:2A870E534DE67713C27F2F3B9BF26FA7498C240CF633988CE76DBDAC5B69214D
                                                    SHA-512:70D9365C31C43A95211FC20E9290B24D356FFEFA935B8829CE32831026A196DECDD12226097F6DA3B4B919E137AA0181714680CDBB72B00C130A87E3A4735004
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Bissau) {.. {-9223372036854775808 -3740 0 LMT}.. {-1830380400 -3600 0 -01}.. {157770000 0 0 GMT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.904342145830274
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc8ycXp75h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAmp1hs
                                                    MD5:7AD3749D7047855CB9B9EC9696015402
                                                    SHA1:F792359AD9EEC2ABD98DAFA6661C1E57BAB89EBE
                                                    SHA-256:8F700409B8EEE33ACE5F050414971FFEE0270949842E58E9299BB5CD6CCF34DE
                                                    SHA-512:681C1B318746C587DEBA6E109D1D5A99D1F3E28FE46C24F36B69D533D884FDDC6EA35BB31A475575D683B73BF129FED761523EC9285F2FF1E4CACA2C54C046C5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Blantyre) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.901235831565769
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DciE0TMJZp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D4qGp4D1
                                                    MD5:7028268EE88250AC40547A3FDBBFC67C
                                                    SHA1:5006D499CD1D1CB93EB3DA0EC279F76B7123DAA6
                                                    SHA-256:596DB2D64CDD6250642CB65514D5BCB52F3E3EA83F50D8915D9D4FDEA008F440
                                                    SHA-512:D623C69FE8A6050E77FB819C2F5FAEE35D5034182B1D30A409C17208155501656133E774E402875537335F8201E4734A0B5D327712CBF623AC330F1014D9025B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Brazzaville) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.947752840781864
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DclbDcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkbDEi
                                                    MD5:0EBC2D8F0BD1A32C21070F9397EAC9E2
                                                    SHA1:95AAA97427265635784E8AC624CA863DB9F1475D
                                                    SHA-256:9A15867255B43A954CA60DA11660F157553AAB6A15C50ACD49D182276E0CF4CC
                                                    SHA-512:4CD2E14F84C58E955742637A51D99DB9493972671A2B5D801EBD9D901D4903654E374C59BF010C70071D33FA17788358F78004201A787CCA2AD714D670393488
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Bujumbura) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3852
                                                    Entropy (8bit):3.7766651198444507
                                                    Encrypted:false
                                                    SSDEEP:48:58ybRwEa40MF4pt0/jaGYbaJF0a3T07ITB85oWXmSGmuyTVuV0apRQnL0KD3rZza:fLg1GbJFp3gHRQVy7DPUUQkiHMo
                                                    MD5:9DCDB3DD41DA13D81EB8E1CAF56964DA
                                                    SHA1:F95EE7B1EF464F2640EC4AE29F3C18B5BF2B2905
                                                    SHA-256:8698B0A53D858AEA7C495EDF759EF0E6C63F7E07A256599393DEC7B7A7413734
                                                    SHA-512:BA5898ABEE541BC72C9DEDD77BABB18024C7AEA0274FA3F809748FCBFF770BFAD902BF70680DDE989F7D3592E5398C100D0E0EA388D4200911ED7DE089535D6D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Cairo) {.. {-9223372036854775808 7509 0 LMT}.. {-2185409109 7200 0 EET}.. {-929844000 10800 1 EEST}.. {-923108400 7200 0 EET}.. {-906170400 10800 1 EEST}.. {-892868400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-857790000 7200 0 EET}.. {-844308000 10800 1 EEST}.. {-825822000 7200 0 EET}.. {-812685600 10800 1 EEST}.. {-794199600 7200 0 EET}.. {-779853600 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165801600 7200 0 EET}.. {-147402000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5532
                                                    Entropy (8bit):3.535398586134154
                                                    Encrypted:false
                                                    SSDEEP:96:zE+CJZtmaG6/eszBrlxs5MRhk9xPmwv7KbGKCDp0d:7MZSszBrlKcJC9k
                                                    MD5:18183122D242E0B69A80BC02BC0328DF
                                                    SHA1:C9976ABC0663EB29A2FEAAFDF6746C05A264B67C
                                                    SHA-256:8776EEDFDFEE09C4C833593127CEFAC9C33E2487AB9BF4BF8C73E5E11B4E5613
                                                    SHA-512:9611A6EF9C5B55FAB752C1EC7E464B8AF60AE32383CE9BA72F35168ABB68A45DB0654A9099CBDC123F5F6E2B6DB7C8FBF56A8DDB813824187AD1090971F12219
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Casablanca) {.. {-9223372036854775808 -1820 0 LMT}.. {-1773012580 0 0 +00}.. {-956361600 3600 1 +00}.. {-950490000 0 0 +00}.. {-942019200 3600 1 +00}.. {-761187600 0 0 +00}.. {-617241600 3600 1 +00}.. {-605149200 0 0 +00}.. {-81432000 3600 1 +00}.. {-71110800 0 0 +00}.. {141264000 3600 1 +00}.. {147222000 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {448243200 3600 0 +01}.. {504918000 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {13731
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7536
                                                    Entropy (8bit):3.8315604186920704
                                                    Encrypted:false
                                                    SSDEEP:96:TzLdXKy9f4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:TdayR41sFpM5vwA6Efv03TBZLl
                                                    MD5:30155093248C4F7E45EF7C0132D2B2AB
                                                    SHA1:FAD100CC49F0CB0910BDE39B43295A47512E1BE6
                                                    SHA-256:8827F7311EDE69A9679BDF2B7418DBF350A2FC8F973E8B1E1E4390D4D5C6D2E8
                                                    SHA-512:469A24AF0C2A4A40CB2488C3E21BB9BBDE057F876EACA08A31FC6F22845063D917A0A4AE96680401E45792DE534EE3A305F137A93C4DF879B4602510D881270E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ceuta) {.. {-9223372036854775808 -1276 0 LMT}.. {-2177452800 0 0 WET}.. {-1630112400 3600 1 WEST}.. {-1616810400 0 0 WET}.. {-1451692800 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1293840000 0 0 WET}.. {-94694400 0 0 WET}.. {-81432000 3600 1 WEST}.. {-71110800 0 0 WET}.. {141264000 3600 1 WEST}.. {147222000 0 0 WET}.. {199756800 3600 1 WEST}.. {207702000 0 0 WET}.. {231292800 3600 1 WEST}.. {244249200 0 0 WET}.. {265507200 3600 1 WEST}.. {271033200 0 0 WET}.. {448243200 3600 0 CET}.. {504918000 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.88110192592456
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcmMM1+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DCM1+c
                                                    MD5:8CDD2EEB7E0EC816F3EC051350FEBF13
                                                    SHA1:37F3A149B4A01DFA2EAB42A28C810BE66AAB7C52
                                                    SHA-256:3176C99FC45337CBCE0CD516DE4B02B8BAA47D00E84F698122A2ADD57797984E
                                                    SHA-512:5A90B6DB45EDAD7734D596FB81FD1959A433F57E71D2212E1DCBD6A12F3FD1FE747FA363C4C787A4D3023F542553C1E2C9CF4F61E28F1BB13042E4AFE3D0FF31
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Conakry) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.856992353568779
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXXMFBx/2DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DKXEBn
                                                    MD5:946D3B52F915445DBB8EE8BF67F4EFAB
                                                    SHA1:18345968B95E886CA72634D49F2B38F9B29BA629
                                                    SHA-256:D50F9732757B284BAC75526F2CFA585DF7F6974160827AFB0FF66124C7CFD361
                                                    SHA-512:00B531D1352CF35045EE25C777C7FEA17294E9861E68CE2DE0D9884C05EBDEA84D5F4F0E8B5605721295E25C259979446B7DB76525A633C7D2FA35B38962CF43
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Dakar) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):191
                                                    Entropy (8bit):4.8447607449193075
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2Dc8bEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DJbVDR
                                                    MD5:7A819572758BC60F4085DF28F1DD1C01
                                                    SHA1:0A5BA34EBFBA5A8E8B896713BA527781FC90FF01
                                                    SHA-256:AB69948637416219A3D458777990FA4568BEBC89388884BBF129C0E1370A560B
                                                    SHA-512:C03E785D1E85292056BB0BDD8DF8326C5DFEB6070AB1C071E1032D14EA69C9DEBC57B2CC7852E35D31652187126CCF0009A6A5C32F9DBB75D56C705535DF05CC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Dar_es_Salaam) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.829357904445218
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcRHKQ1BQDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DOrkDR
                                                    MD5:7981499F9430DC1636C9F834273E0B91
                                                    SHA1:1D63F8578420D56E4A5D9D0881FBEC015421E416
                                                    SHA-256:E7F7560CCD65D53C446ADAE7128A74D37E17DD0B907A2F2FD85322FB8707B497
                                                    SHA-512:3C3F7D78E9A0DE6E2950E1C305EA2DBC986754AE9FB10AC410685F30C39EC235F6F221393099C012E62EE5A7B4F1BED67C96B7B81E90BBA064BA9FE685FE4050
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Djibouti) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.850101792457859
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcnKe2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dml2D4yn
                                                    MD5:44881E75AC32FA95FF6143066EF01B90
                                                    SHA1:A221619B4CDE8BE6A181E1F3869EAB665F2E98B8
                                                    SHA-256:FCF2DAD148F4D2951320EA99730C56D5EB43D505F37416BE4BAD265CE2902706
                                                    SHA-512:4FA67A5F84758366189F0FC4A7FA6C820BA083E1C56EA95D25D21A367F25F76261B7EB5631DFFEB20E095CFD64E770338773F76BD50D4CF6AE29AD3EDFCEC408
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Douala) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5235
                                                    Entropy (8bit):3.541189246992611
                                                    Encrypted:false
                                                    SSDEEP:96:+eCJZtmaG6/eszBrlxs5MRhk9xPmwv7KbGKCDp0d:+eqZSszBrlKcJC9k
                                                    MD5:956F5B51FA8BA2E954A0E59AAC8F3276
                                                    SHA1:AE35A8502E57EA6EE173E3B42509E4CAC73DA091
                                                    SHA-256:5FB102A95B3C004AAB8371840B1A04AC352F48FF9E9EAFDEAAF21960B0F3CAA6
                                                    SHA-512:19E7F2574E2B62DF68CC24737F6B94864B3D64B2472BC7D78E6AB5142A1DC1AB3B3700AB802129CB16AED4A4FED29E2B8A5593EE327ADF496255FE2FEF6A7023
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/El_Aaiun) {.. {-9223372036854775808 -3168 0 LMT}.. {-1136070432 -3600 0 -01}.. {198291600 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {1373162400 0 0 +00}.. {1376100000 3600 1 +00}.. {1382839200 0 0 +00}.. {1396144800 3600 1 +00}.. {1403920800 0 0 +00}.. {1406944800 3600 1 +00}.. {1414288800 0 0 +00}.. {1427594400 3600 1 +00}.. {1434247200 0 0 +00}.. {1437271200 3600 1 +00}.. {1445738400 0 0 +00}.. {1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.866631090752554
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcu5sp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dk4DBS
                                                    MD5:6C115220CF951FC2EE3C299F86935B6D
                                                    SHA1:A1CAB8C710BF20553AF45343118C1726CFE922B7
                                                    SHA-256:BC53A4D489F48F14C594C4B0E52079B34E043A5751BBC7DF254A560352243575
                                                    SHA-512:E87A4FD145B645DF034182CAD7F9D2BE5B2D9F3A17B6A9B6C84A0B3E846D92EC4C69DF2E85129B7A1AFBC0CCAAC8E3B1D47EB09F0900A82B908E9F6BF63B9736
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Freetown) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.899477454245453
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcHK0o/4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAV+4Dt
                                                    MD5:07222D8ED83CDC456B4D5D84C4BDE320
                                                    SHA1:2C657F461FA3F48D56C791AFE4AB7D2EAF45AF60
                                                    SHA-256:653AF88955C4418D973E2F8681A99552EB7BE95BCA64C736072F488462F7B373
                                                    SHA-512:3016D0636F401BD88BCD460F6A61782E7E8A2C32CE4ECB904C711DF414038A5818F0CA3D7FC671C5ABCE70647FC674A2EF9081C5289EBFD184B44885902E007A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Gaborone) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.884642061266759
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc0B5h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2Dlfh4Dt
                                                    MD5:8666DABE8D196ACD94A9691C592FAF4E
                                                    SHA1:9F7EE009DCEAACA79C6EAA6FC73015D595467919
                                                    SHA-256:06B82C524585192E0E8FC69DCC1CF86183A8C5EF404645DC413FCF3F8C16B0AB
                                                    SHA-512:AAA32FD1B01BFECDD0D1C9C1DF1163374DAFE094C75720EA4095C34F7EAE7DCB594D1A7F6A2A90FB43FF01020F7AEB48E92496E0EE2D039AF23076CD369DD2A7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Harare) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):309
                                                    Entropy (8bit):4.695542624694403
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2DWbzDm2OHePoHvmmXsd//HF2d7d6VcF2d6KsYov:MB862DW7mdHePCvmmcZvF0cVcF/KsFv
                                                    MD5:F0E153FC9B978E30742ABC025CA45E02
                                                    SHA1:73D96F3188190DAC2453E6F18A1C683CECB9CDE3
                                                    SHA-256:5EEF6475E1312051037FCAE3354E32DC0910BE7A5116B71F8CCBE1CCA08D3F1C
                                                    SHA-512:E66F4B5FF18BAAD53AFB1ED36A0827115C793075A61F794F26F32BC9F6799DF816A1F817BEB0C0BC938F89E6F5BFBE1AB4F504F1AF518764103FB287746552C7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Johannesburg) {.. {-9223372036854775808 6720 0 LMT}.. {-2458173120 5400 0 SAST}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {-829526400 10800 1 SAST}.. {-813805200 7200 0 SAST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1127
                                                    Entropy (8bit):4.027824722230131
                                                    Encrypted:false
                                                    SSDEEP:24:5mesdOkMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8M5:5YMV04MSHMzNxMbwM0JXMfCsMzaMq0QJ
                                                    MD5:32EC0589260D9D4BCC85FE91E6F04D00
                                                    SHA1:BAA269852C4AC6B89EA7941E7A75A007E0CF9EDF
                                                    SHA-256:F2646E15488ABF2E960759CEFE5705416E71DA71BB8407B26196244FD1A3394F
                                                    SHA-512:4F485453BE1D186ADBE0908852475C63C57BA498091C222EFFB9A5FEA2DB7F55E1BB2DBDBF6AC0F24CC67D47549FA3F5257655B5449B1BCF1FB5CDB27B03D501
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Juba) {.. {-9223372036854775808 7588 0 LMT}.. {-1230775588 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.837466713772859
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcJEl2DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DIEl2V
                                                    MD5:E929ED1BC316C71AABE7E625BD562FB1
                                                    SHA1:C20C172518C02D93327F4BBBC5D410BFFEF5039D
                                                    SHA-256:8EA3028CE2B025F0C457DC8F7601279CA5AF565A88B9FE80208F9F1030F2B0D0
                                                    SHA-512:B2FBCF06EACCF18DE97AF1D6BC57D9638E0A36DBF17044FF97F6B9E5089CF9E13E1304F304495324C0ACC1128A7D2D494E7C1FDB95DB0855FCE54F7028096C50
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Kampala) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1131
                                                    Entropy (8bit):4.0421745451318385
                                                    Encrypted:false
                                                    SSDEEP:24:5xe9dSXMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8MM:5hMV04MSHMzNxMbwM0JXMfCsMzaMq0Qc
                                                    MD5:2BD3850DDBE2F05BF6F24F3AEFF7516C
                                                    SHA1:22B0DBB54E071F30D51A8654CF103F99537F74CD
                                                    SHA-256:F475DB8A857A46B310B12C21D6A9BC6CA9FF2960DA429A9D57FA375F9439E13B
                                                    SHA-512:1CF82FC07348C697F26625673DA7E3D734358B3FBE69D8E2132CAC0D9F00C7E8CDC353676CD9BAC4CBB9E26CF6638CEAE41DF559E7445D9C453409D7115FFC6C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Khartoum) {.. {-9223372036854775808 7808 0 LMT}.. {-1230775808 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.910322325134086
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcCJRx+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DRX+DEi
                                                    MD5:3017253E1C6ACCA8D470A014E4BB321D
                                                    SHA1:671B7AC04580B56E2C34F88D123E8296947DDD7E
                                                    SHA-256:73FEB807006897B4B485CB82394867444E890265EFE960EC66D6C0E325DA9372
                                                    SHA-512:2498C380D761A16C183D78BC1BB18B1D2A1BFCB9C703D86A3FC04CCCE43D88C8D4BC3C47CC31639B78A5FE9C8A7445E9DBB52062E2F3B737DA1E7D0FF70F140A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Kigali) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.866127364448228
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcqQFeDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DdD4yn
                                                    MD5:41209A335A99803239A854575190C5ED
                                                    SHA1:E6EA627C25513B9DDE053F9A24D509AA317C30A1
                                                    SHA-256:611375C4901AD6C4844C2BB7D02FB17F34996F49E642546A6784D6F0B28530CC
                                                    SHA-512:DF2C0B131F35F54DF5EBF7F8459F98DBABEB6F081247BA95B5D7B41146E2A2EF9BC6B1D909DE57A1223D9C258AB197D9668ED2E111A365C86BABDAA7DF551FB6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Kinshasa) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):235
                                                    Entropy (8bit):4.7936510664790815
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2D4JDm2OHWQvvoHvBsp9boFvoHzIX7uRe6vF9:MB862DymdHWQCvqpmVCzIq
                                                    MD5:EC08046589E85D999A597252FF5368B7
                                                    SHA1:126E3DE158E1E7AF4737D0AB5B51C0F92F416DC7
                                                    SHA-256:DCC9F52F539A67DFD7ABAFDE072ACDAE2B67754C559C8A5FE61979F5A286A066
                                                    SHA-512:84B9AB18BC343C8B8934F5FDD2E2EB413925B04D6F5394AA8337B7B55E6487FB071A83A69BD4D0FA40F7F31EBC57B9908729674542CEA3083D700FCD02D77633
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Lagos) {.. {-9223372036854775808 815 0 LMT}.. {-2035584815 0 0 GMT}.. {-1940889600 815 0 LMT}.. {-1767226415 1800 0 +0030}.. {-1588465800 3600 0 WAT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.865878143076229
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcr7bp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dgfp4D4y
                                                    MD5:35D8A58EE21E603C6FC4FB896AE6B3D0
                                                    SHA1:F1D0A939D761F3F0954F045814CF5339A5597036
                                                    SHA-256:AB3E797548C7663CF9ABA7FE163635FF7CAB9E6CB61FA1644C0F7B4B5CCE8B99
                                                    SHA-512:97717961987F6B6832C24A7833150CDFE7E82BBEB32DFDB84D2500442AAD9263F8BD4E879591E913D56E9A1991C389EF730211853647A889F358AE3FA37C0185
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Libreville) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.862780607964543
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcih4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DNh4D4
                                                    MD5:EA21ABBF8B11953916A1C509B8A1B427
                                                    SHA1:35ADC230C57B001BE8A99A3D2E34B609A60A1162
                                                    SHA-256:EACA9124F17E5B11F27D11FA6141D19EB3AC23E155E155B73467BDAA3BC99AA7
                                                    SHA-512:A7972D4F1C5FB988CA04B39E2CDD580F51383BA9D7A66C478275C11A07B8D7A6EFF53A3E1929B0D89F10BCC39D22F285DB2601ED60DB4647C65465643F70C137
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Lome) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.856982839546061
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DccLtBQDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DXQD4yn
                                                    MD5:40CD47F6DCF51EBEFEF42489F1716257
                                                    SHA1:DF245192A1899A72DE01A57F6969AC060E841734
                                                    SHA-256:4C2FD1E44DFAAF0C0DD2EB56B84B538F1E2D84B301AB2CFB8EE7759783501444
                                                    SHA-512:D39BEB0EEF344B1A44F7D6A806A1D5B956D7D402648EE0C67C4BA46493236840AF975D89A91B2D33B8AA7D6DC9A051E66718DCDBC1C83B0E964215C2E32ED923
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Luanda) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.940313336280723
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcfpT0DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2D8pT0Dt
                                                    MD5:71A5DE1276902DB1542840318F9B1AF3
                                                    SHA1:AC3825BF343482E0E4D9D6FAA6FCA4D1A125433B
                                                    SHA-256:24384EEC359FD24D181AAEF3C017E3C345490A8D352B29D19B1B143A29A811C2
                                                    SHA-512:2984EB42A79B8B32BB93DFE71F1C4C0CABFDC9B0A199971347BB3473463FA07FDB5D20227D288BF8653B1BDE347E1297459BBB4C3C34AF7A5434FBF945683577
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lubumbashi) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.905174746463853
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcOf+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkDEi
                                                    MD5:1D7FDB388535CC59742CA0F1AEE27FBD
                                                    SHA1:A99FF2CAC47FD333429C22B271E190D979EEC024
                                                    SHA-256:B00801A7279741434D9C2D7EC7322DD93B85EA4F5C9976AB3A43F0AB142E1553
                                                    SHA-512:0174D3C6F9116C36C62AD1EB58203EE7DFE8C37F618B8449D5E45AD6290CF8334F28798877D7A563A12EE533026244D6A49BCCF29B5D7FCB5BCC91481D0DDDE2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lusaka) $TZData(:Africa/Maputo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.857096806490649
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcn2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D42D4yn
                                                    MD5:1CA9B3E7BCD5BC1CC881453D16B09389
                                                    SHA1:1B1964B314E72847D71A42C147CF2BF331B44461
                                                    SHA-256:35D56EFFE9E7E60F17B32BD30486E566B635F0AE7A8948D77395B8E6332E26F1
                                                    SHA-512:9E08D57B7824F5B076D159D9A5106E51450DF24729C36F485B9B68E8F47E8DFC50F9BEC3F11E0AE6579A8E372A5C0F0DA18A2E797CF2115519D1B4E5B64413DD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Malabo) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):149
                                                    Entropy (8bit):4.952872531197478
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2DcfKiMXGm2OHoVoHvdSF2I:SlSWB9eg/2DEZDm2OHoVoHvdI
                                                    MD5:CD429B6891CBF603A93F9A9733E2391B
                                                    SHA1:C6833B83B6D1694AC632018A27915E6F97F708AE
                                                    SHA-256:FE6B6A4BE1B61F7F909A3F6137530DFE6D1754499A4D9B0D1CE4952FFF0AE62D
                                                    SHA-512:6E57B70B71515998AD617954F9DDAE19968B20946542201153DAB47FBE63790D42F41AE29148ECBCE6D12812879BCF0A4EC881507B62CDB2675AB20267220BF9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Maputo) {.. {-9223372036854775808 7820 0 LMT}.. {-2109291020 7200 0 CAT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):199
                                                    Entropy (8bit):4.964472328419063
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DZQs+DWb4n:MByMaHw7NH/t2DZiDWU
                                                    MD5:88C8FF2B480648EDADBD0FB93F754275
                                                    SHA1:BED7A784C378909914CEB0D303DFE6D05FD576B7
                                                    SHA-256:1D80FD86CB733D57D88ECD404E702F750B233ED0CCBFBFFFEED1AAD3B7F1CB04
                                                    SHA-512:CB7F831CF099E85B948AE57FCE9D91C7EAAD39753AF82C56EC15B65830EB4115A71BBC83A71A2AC947CAB24DEDDB557E02FAA5A3264546AE6E60607DF6BD2FA3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Maseru) $TZData(:Africa/Johannesburg)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):200
                                                    Entropy (8bit):4.957246428185456
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DzjEHp4DWb4n:MByMaHw7NH/t2DzjEJ4DWU
                                                    MD5:CA7255B86425BA706D214924856B6818
                                                    SHA1:E9BE6CF871BB1786E842953D41392299952EC9AC
                                                    SHA-256:547197C09C1987350AE5720A4EEC7E8D8F4B9F4A0559726E225E13C707F7C564
                                                    SHA-512:23F9AD0F926A0945A17BBC3DCFF9A3D7EE68EC9423EA78985F5FFC60CC61641B57871F9AA703B5FB9BE842DCD4693D0641F9EDED702240873F58D24CD4D60C32
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Mbabane) $TZData(:Africa/Johannesburg)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.877126792757121
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcBEBXCEeDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DFSVDR
                                                    MD5:5C2E2B5189E0E816D5BD7AFC8B49A35E
                                                    SHA1:4E43A1ED51399528636D6442B1DDFFD820911407
                                                    SHA-256:25E221BE49DEC5547A74AEB91B0041859C59BC866987272A447AB2343D1CC30C
                                                    SHA-512:B74735CFAB692756BAADFB1A51A8CC0C986F981D8E7E7A8182370A9017E67439875F0115820A349AFB3BE2FA581A721440968EF817471DD2C5E1286E53B2FE99
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Mogadishu) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):208
                                                    Entropy (8bit):4.8660011420394955
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2D3NPDm2OHrFGxYoHvlHIg5pTwdPsy:MB862D3NbmdHhmYCvdIg5GPsy
                                                    MD5:1B3C94B5098E454981C73C1F2AF80164
                                                    SHA1:1EBA9E2DBEA70BB1AE5EB13739518AB5A62D2130
                                                    SHA-256:2BF0D90610211651127402680519B29AB50B15D344263D0C1A22EDEBE5E01E27
                                                    SHA-512:DA4A0BCE7C6750BD7D3BA76B6301B9390723BE0C001C39BE453D80BD87020C2253A75629F68F83C19410D2A75FAF5223A435299CD4AA53DE545EC7C5B5AA54B7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Monrovia) {.. {-9223372036854775808 -2588 0 LMT}.. {-2776979812 -2588 0 MMT}.. {-1604359012 -2670 0 MMT}.. {63593070 0 0 GMT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):277
                                                    Entropy (8bit):4.655052651600954
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2Dk1Dm2OHsvT5oH99VCV22ufPnVCkVBKBQn9q:MB862DGmdHsvVCjkifvdH9q
                                                    MD5:B640661FB37BB74FAB172DBDF1B433E1
                                                    SHA1:0236A5B53443A4A18B8B9D6AA7732620BE9A6553
                                                    SHA-256:BD8E9765174431C0D403249D3E881C949C83966E9F8162552DA88AE53132467B
                                                    SHA-512:53DCC6DF7C3E0B00A6D98A8DCC4988C8CFD6B53CC89E6F8D32DA41CB532A62D9C6A823675C5039F5639CE0D423F6D571F46F5B93FFC7EFFB4EDFFBF89D46AA12
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Nairobi) {.. {-9223372036854775808 8836 0 LMT}.. {-1946168836 9000 0 +0230}.. {-1309746600 10800 0 EAT}.. {-1261969200 9000 0 +0230}.. {-1041388200 9900 0 +0245}.. {-865305900 10800 0 EAT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):208
                                                    Entropy (8bit):4.856754881865487
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2DjUfDm2OHNseoH1axCXFHzaSmkFWTvF9:MB862DjULmdHPC1XNzaS3yz
                                                    MD5:EDB548348E590C8CFE04ED172D96B86C
                                                    SHA1:AD3B631FB03819772164402E202AFA781687F597
                                                    SHA-256:9ADA5F5AFB25E823E1F0E8AD2489AAA1C09F01356634A9403670D7AB21CA2E2C
                                                    SHA-512:17E396A9BE497077B774AD1108CC8760ED35FC92F65FFF070F9ACD3C4FB67A335C1C57DF1CCB1570DE14B708EFCA0063990A969E30759C9A47731DA45ED25EFE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ndjamena) {.. {-9223372036854775808 3612 0 LMT}.. {-1830387612 3600 0 WAT}.. {308703600 7200 1 WAST}.. {321314400 3600 0 WAT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.871519187180041
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcdhA9Ff2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dsh2f2D1
                                                    MD5:0134039CD1666E983A9B6E43ABD6AF59
                                                    SHA1:A2A99345390F4D17C892CEADE58C604257686764
                                                    SHA-256:B517120AD8DB3F21EAB4E44A78001EE856EB4EA35852C54CCA96D38887DEBCFA
                                                    SHA-512:E5911ADD3D776D87ACFC986C4D2564E3ED9AB12C67F23391ED35FF2A31AD8314B873E31DB8DA4D5E0DAEA12BE34110A8F0C27C9C6126977BAD51C6AD5CDFA39B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Niamey) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.909962899502589
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcboGb+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dqbb+c
                                                    MD5:550E482599C2F4280F2C258019BB2547
                                                    SHA1:A39045BEF313094CEDC100A7D695AE51BC9E498D
                                                    SHA-256:64CAF2BF9D45095DF97F419714D5617CF6300ACDB544B621DCE1D594AA9B910C
                                                    SHA-512:4FD29C5B4C0D2BDE69C437E9BF4F08A11E1DAAA689B69F28F3551F550BDCCDD055E4C1A241EDB2FA48B18825AFF792F4860F55983E106EA8224F1D87ED4F7546
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Nouakchott) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.920023025906233
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXCZDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2D1DBS
                                                    MD5:6CFC4E938E50C9B591F8CC42A14FA82A
                                                    SHA1:FCE14A5CA62C9005C76D27B849A238E76C834F8A
                                                    SHA-256:03B9C1FE350B5E9F6F333F9519FA394DCC562308D9388A903AF3D3FECEBDC762
                                                    SHA-512:98F22F1D23A9930276A2D306A1473E64DC43547A16CFD01226E4F030A26A3CC4FDED77F790583CC5C078FC6DFCCE81C16A50879AE46A0D3A6F1FA98373F413C7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Ouagadougou) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.893842293207225
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcyTKM0DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DQD4yn
                                                    MD5:6D979FCD225D5431C7391AE568C6409F
                                                    SHA1:6C9DCD222061CC00FD386773C6BB2861F3429A60
                                                    SHA-256:8FB8692DB9281AE2B087D704168BFD47D3D0901781FEF65BFD62FCB213BA6B50
                                                    SHA-512:32AFA6AF6BFC3D42CA636DD2B96906048EF1ADFBB135BB7E7B77C444FED99FDABB84FBBADF56EC63828FFA7B3371191FF1311822B1C75241EBD9CF602467088E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Porto-Novo) $TZData(:Africa/Lagos)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):234
                                                    Entropy (8bit):4.818597723513168
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2DXDm2OHH5oHvzdoH1aNbbFHRMy:MB862DTmdHH5CvzdC16bZRMy
                                                    MD5:28A5967C797F4B38FB63F823D6F07168
                                                    SHA1:17872E91683B884191D2E4C777FB79DCE6D73EE7
                                                    SHA-256:BA1D60DF2B41320F92A123A714E17E576C89383526B96E0541A464C3FBA415B7
                                                    SHA-512:B335E3D3268631F3A71F4BAD59740F3A5222344E8223C201B8FE885BAA7F1A550FA7778E498D6DC2111F41053856F50B21413AECCE84B80833EC8176F2A1009C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Sao_Tome) {.. {-9223372036854775808 1616 0 LMT}.. {-2713912016 -2205 0 LMT}.. {-1830384000 0 0 GMT}.. {1514768400 3600 0 WAT}.. {1546304400 0 0 GMT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.905303708777235
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcHdDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwdDBS
                                                    MD5:F2D7F7BC4EA3629EC7F0E45300A0CFD2
                                                    SHA1:E7594D378C5DCFEB1E87E13AC79A026260D2E630
                                                    SHA-256:9D8009ACAB019B32B1E87AB10E0AC3765ABCABE8066318DA8CA4905D41562F72
                                                    SHA-512:795E58172907020C85CF0B10BBA35842D5F92872CCB3382DFDC787BAA504C79927FA23BC3104AD63541A95C44CA80977E8247846DE918A0B00963B970F4823D2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Timbuktu) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):954
                                                    Entropy (8bit):4.151253074491018
                                                    Encrypted:false
                                                    SSDEEP:12:MB862DrmdHrCDWR+f7Zn9ueRSmNvlTtuyI/ZBv8dq8Jw4VFZBZYEuAENSfp8kSYx:5veuDkWx3NdT18kbjjAkxTx
                                                    MD5:2DF9B050D82B06EB89DA908C31C1F1C9
                                                    SHA1:CB294E12560A98D5CEA3BA7004B5519B6C22BAAC
                                                    SHA-256:B447B6B1C351E77F22A2D77C0437F2BBB7D8BDFDFDC3D6285E0D260519CC7110
                                                    SHA-512:BBE281D551E9F8DA7B6BB08D809177615410A11E4B1184ABD220EA8B1F355B2BBC090C6BAAF7E07FD61286891388ECD4026D4433C4E4B6A8D201F8D95E174532
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tripoli) {.. {-9223372036854775808 3164 0 LMT}.. {-1577926364 3600 0 CET}.. {-574902000 7200 1 CEST}.. {-512175600 7200 1 CEST}.. {-449888400 7200 1 CEST}.. {-347158800 7200 0 EET}.. {378684000 3600 0 CET}.. {386463600 7200 1 CEST}.. {402271200 3600 0 CET}.. {417999600 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {465429600 3600 0 CET}.. {481590000 7200 1 CEST}.. {496965600 3600 0 CET}.. {512953200 7200 1 CEST}.. {528674400 3600 0 CET}.. {544230000 7200 1 CEST}.. {560037600 3600 0 CET}.. {575852400 7200 1 CEST}.. {591660000 3600 0 CET}.. {607388400 7200 1 CEST}.. {623196000 3600 0 CET}.. {641775600 7200 0 EET}.. {844034400 3600 0 CET}.. {860108400 7200 1 CEST}.. {875919600 7200 0 EET}.. {1352505600 3600 0 CET}.. {1364515200 7200 1 CEST}.. {1382662800 7200 0 EET}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1111
                                                    Entropy (8bit):4.150944563639585
                                                    Encrypted:false
                                                    SSDEEP:12:MB862DHmdHjCvbB/lxRjntMVyoKCyFWeey0XSe/OSyHaCgmvLOcSFQSFeSTC6ZPJ:5LemvbplxRhbv+yuh2tIee6kvcw9Cy
                                                    MD5:0C99335A41D33AA8BC1EDA0CB4CDCBF5
                                                    SHA1:5CABC28D318FA5B8307429EA571FFF91EB8E1252
                                                    SHA-256:0760D1028E733888E43E7F1E057217DC2B52786029FCEC67B27EB69CC6A54938
                                                    SHA-512:C8FE685ACA46FD4836F3AABC15833F294E5EBED123A487D04E74A8C5668BDFAFB96D2326760452A6E5A1B9CC25AC6C3918D8C10A7F8EF737456640E3000BBA2F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tunis) {.. {-9223372036854775808 2444 0 LMT}.. {-2797202444 561 0 PMT}.. {-1855958961 3600 0 CET}.. {-969242400 7200 1 CEST}.. {-950493600 3600 0 CET}.. {-941940000 7200 1 CEST}.. {-891136800 3600 0 CET}.. {-877827600 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-842918400 3600 0 CET}.. {-842223600 7200 1 CEST}.. {-828230400 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796269600 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766634400 3600 0 CET}.. {231202800 7200 1 CEST}.. {243903600 3600 0 CET}.. {262825200 7200 1 CEST}.. {276044400 3600 0 CET}.. {581122800 7200 1 CEST}.. {591145200 3600 0 CET}.. {606870000 7200 1 CEST}.. {622594800 3600 0 CET}.. {641516400 7200 1 CEST}.. {654649200 3600 0 CET}.. {1114902000 7200 1 CEST}.. {1128038400 3600 0 CET}.. {1143334800 7200 1 CEST}.. {1162083600 3600 0 CET}.. {11747
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1649
                                                    Entropy (8bit):3.9974091170263066
                                                    Encrypted:false
                                                    SSDEEP:48:5t+Lmcz0iMHHWMbnHoMcHiM0H+MCySHr/MDHqMafHO8MwHJMHHOMHSHWMHHXM5Hs:OLjQDI6jZ2WFcv
                                                    MD5:4846FB13467BA93EB134D88228D7F534
                                                    SHA1:477FC6144B7DF365606A2E44EF1430F8DF6FB841
                                                    SHA-256:DFC3D1FC182B315B31D999BC103C264BD205EB16F971C8636003A71170D7BD7C
                                                    SHA-512:A719F5083F66CE44FE047880A10B2ED04B66E01C7F0F7DADAE2FFB95172308F091D669BCFED5A236D2A0F80A4A1D78DA7A778DDE3FAECB40170ECDA705573769
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Windhoek) {.. {-9223372036854775808 4104 0 LMT}.. {-2458170504 5400 0 +0130}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {637970400 7200 0 CAT}.. {764200800 3600 1 WAT}.. {778640400 7200 0 CAT}.. {796780800 3600 1 WAT}.. {810090000 7200 0 CAT}.. {828835200 3600 1 WAT}.. {841539600 7200 0 CAT}.. {860284800 3600 1 WAT}.. {873594000 7200 0 CAT}.. {891734400 3600 1 WAT}.. {905043600 7200 0 CAT}.. {923184000 3600 1 WAT}.. {936493200 7200 0 CAT}.. {954633600 3600 1 WAT}.. {967942800 7200 0 CAT}.. {986083200 3600 1 WAT}.. {999392400 7200 0 CAT}.. {1018137600 3600 1 WAT}.. {1030842000 7200 0 CAT}.. {1049587200 3600 1 WAT}.. {1062896400 7200 0 CAT}.. {1081036800 3600 1 WAT}.. {1094346000 7200 0 CAT}.. {1112486400 3600 1 WAT}.. {1125795600 7200 0 CAT}.. {1143936000 3600 1 WAT}.. {1157245200 7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8447
                                                    Entropy (8bit):3.867931581740766
                                                    Encrypted:false
                                                    SSDEEP:96:6hvOs5vveFaHU6lgqN/zNMkixlrxYTMcmo1LWF59:6hvOstgqN/zNMkArxiZmf
                                                    MD5:DF52E726B33FA47EB115C1233614E101
                                                    SHA1:26B0E49022FCB929F0160617F9C9D2DBEDC63610
                                                    SHA-256:77231D179260C08690A70AEE6C2517E4B621ED4794D9AEEA7040539F4FF05111
                                                    SHA-512:48AAF25419E07B06E076B0E19F9A0C27EB257556E62FD8F7B2AA963A817823DD89D33AB6AFEAAC2EF2230361D76776355E19CC2BBBB4D19536F823A347AC8AA4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Adak) {.. {-9223372036854775808 44002 0 LMT}.. {-3225223727 -42398 0 LMT}.. {-2188944802 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8685
                                                    Entropy (8bit):3.9620252256806845
                                                    Encrypted:false
                                                    SSDEEP:96:esKLO6KLC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:etLhN9DiaJCUbPI+D/iMpCIBSuk
                                                    MD5:BFEACEA04AAA8A69A9AC71CF86BCC15C
                                                    SHA1:1693971B8AAA35021BA34799FB1B9FADC3DA0294
                                                    SHA-256:DE7FBE2B3ED780C6B82099E1E249DD41F4452A3ADB9DD807B1D0EC06049C2302
                                                    SHA-512:E94112A2A5F268C03C58CE3BB4C243B2B9B0FC17CB27FDD58BCD2CCC8D377B805C87A552AE7DE1C5698C5F2C4B0FCAB00A3420B1DAD944C1A2F7A47CE7118F78
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Anchorage) {.. {-9223372036854775808 50424 0 LMT}.. {-3225223727 -35976 0 LMT}.. {-2188951224 -36000 0 AST}.. {-883576800 -36000 0 AST}.. {-880200000 -32400 1 AWT}.. {-769395600 -32400 1 APT}.. {-765378000 -36000 0 AST}.. {-86882400 -36000 0 AHST}.. {-31500000 -36000 0 AHST}.. {-21470400 -32400 1 AHDT}.. {-5749200 -36000 0 AHST}.. {9979200 -32400 1 AHDT}.. {25700400 -36000 0 AHST}.. {41428800 -32400 1 AHDT}.. {57754800 -36000 0 AHST}.. {73483200 -32400 1 AHDT}.. {89204400 -36000 0 AHST}.. {104932800 -32400 1 AHDT}.. {120654000 -36000 0 AHST}.. {126705600 -32400 1 AHDT}.. {152103600 -36000 0 AHST}.. {162388800 -32400 1 AHDT}.. {183553200 -36000 0 AHST}.. {199281600 -32400 1 AHDT}.. {215607600 -36000 0 AHST}.. {230731200 -32400 1 AHDT}.. {247057200 -36000 0 AHST}.. {262785600 -32400 1 AHDT}.. {278506800 -36000 0 AHST}.. {294235200 -3
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):202
                                                    Entropy (8bit):4.908728298285591
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/8J5290ppv:MByMYbpwt290/8m90b
                                                    MD5:1C3CE9F156ABECEAA794E8F1F3A7ADDB
                                                    SHA1:6F84D0A424FD2DE85E3420EA320A186B277B0295
                                                    SHA-256:F38610019C0A2C18AC71F5AA108B9647D9B5C01DCB55211AFB8312308C41FE70
                                                    SHA-512:CA2DA6F9551E4DBF775D7D059F6F3399E0C4F2A428699726CD2A1B0BB17CCF5CDEEF645EE1759A2A349F3F29E0343600B89CE1F4659CF5D2B58280A381C018AD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Anguilla) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.898881450964165
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290//MFe90ppv:MByMYbpwt290//V90b
                                                    MD5:DB16FFE76D625DEC731AB6320F5EF9BF
                                                    SHA1:D286994E03E4F82C08DE094B436FA098648AFADE
                                                    SHA-256:561E58E11DC5A86CAE04B5CB40F43EFCFF9ABC0C841FAC094619E9C5E0B403F8
                                                    SHA-512:8842B616205378AF78B0B2FC3F6517385845DE30FFD477A21ACFA0060D161FB6462A3C266DCFD54F101729446B8E1B2ECF463C9CF2E6CE227B2628A19AF365F9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Antigua) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1782
                                                    Entropy (8bit):3.733307964154526
                                                    Encrypted:false
                                                    SSDEEP:48:5KChlvEw6kSSx5H4a8tf3fkuozd23t8VZDG8+GCRRRd:QIlvEwJSSxdF8tfMuozdCt8VZy8+GCRB
                                                    MD5:9B01680A362EA7B462DC236F6A35E14C
                                                    SHA1:456A5E771F6B749BFDB2BFD59836A6A930499881
                                                    SHA-256:B1327CBEC20A21E3FF873E28A2EDFA271EE3A5C01933779300EABD6B185DA010
                                                    SHA-512:E6C2F5C489BEA31B0AAC3CB1DB750AC2B665DAC0AC82C1CE6756E768305300297BA5E3B32EDEB9E1715452F02223E47674C4F2B1844920F664623C9F34309240
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Araguaina) {.. {-9223372036854775808 -11568 0 LMT}.. {-1767214032 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2048
                                                    Entropy (8bit):3.7664759014118188
                                                    Encrypted:false
                                                    SSDEEP:48:5p9uuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0wi:jIu3pfe92jCs/VOHv2kdeRtnxafwwfF0
                                                    MD5:2B9A1EDE5110B46E24F4726664EA1E3F
                                                    SHA1:939D1A7A50544F34B318ACDB52BC6930FE453F6D
                                                    SHA-256:BC86AC89121EC4AA302F6259CCC97EFFD7022DC6CEE3B291C57DA72B6EA0C558
                                                    SHA-512:C204740DACBCECF2CC5CF4FEB687E86B9150512623203C999D6F4EB5FB246D07681A35C28D8445F6A50F49940C321E0AA5E51FE5A73B8ED076F29CEB5B4D4CA2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Buenos_Aires) {.. {-9223372036854775808 -14028 0 LMT}.. {-2372097972 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2077
                                                    Entropy (8bit):3.742645155048276
                                                    Encrypted:false
                                                    SSDEEP:48:5/nuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0NC:Vuu3pfe92jCs/VOHv2kdeRtnxafww3mP
                                                    MD5:3D2AF5714DFC392ED4BC976784D5A58A
                                                    SHA1:9252DE40B6EF872E1D2F7CDD53DDD21145E93C5C
                                                    SHA-256:A516BB0937977EF949D47B3C8675E30F1CA6C34F8BD298DCF6EBB943580D5317
                                                    SHA-512:8D5FFDB5B578B8EA0291D3A21BDDE25F8301CB16B11AE794FFBA8DCFFE46F6AC5EC03D93E511061B132D84E69E5FAF1BB212837EB8A5A4B4BE517F783837E615
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Catamarca) {.. {-9223372036854775808 -15788 0 LMT}.. {-2372096212 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522740
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):242
                                                    Entropy (8bit):4.72138001874583
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/290/MquQ90/MMXAy:MByMY/MYp/MrRt290/MquQ90/MK
                                                    MD5:8A609667DE461CEDC1127BE38B161459
                                                    SHA1:557D2D55DEA38D1CD1103E183F89C65F4016662B
                                                    SHA-256:8CCD6FC77D55582938F1912B1BA66035882D1BFC18A797C631E5E89ABFBF570B
                                                    SHA-512:DBAFDA069DB5FDBCBA11050AC91A733C1712BD6395939CFFFC5EAA78BD0B70B4AF2D9FB8954C6841CCF3AC5F8EDCF08E604D3F2CF67F1CBEA5EB6D3C4DC7F2FA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Argentina/ComodRivadavia) $TZData(:America/Argentina/Catamarca)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2043
                                                    Entropy (8bit):3.7481312409221594
                                                    Encrypted:false
                                                    SSDEEP:48:5lxQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0n:/xBu3pfe92jCs/VOHv2kdeRtnxafww3j
                                                    MD5:8C1D665A25E61CE462C2AC57687763BF
                                                    SHA1:B5BBC26CF6A24BD5BEA42AC485D62C789B80905F
                                                    SHA-256:FA75E274240A341C6BFE3539CFDC114D125AEAEA3161D3C2409347CF8046042A
                                                    SHA-512:A89A7A92C025B87DA4CDFE99BF70CD0E64690D7BFE827DCBFBF0E91B188003FA26487E72B6B950D3BFC9C854B890E5936F414BBEAAD5F3F0673AC5EFE273CDF4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Cordoba) {.. {-9223372036854775808 -15408 0 LMT}.. {-2372096592 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2041
                                                    Entropy (8bit):3.7481290145270245
                                                    Encrypted:false
                                                    SSDEEP:48:5HluuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwcSPAC8OS0E:xwu3pfe92jCs/VOHv2kdeRtnxafwcDCK
                                                    MD5:995EDE9E1E86DB500C7437A196325E21
                                                    SHA1:4A8FB1511AA124CA2D299EC8DE155EE9D0479180
                                                    SHA-256:43EB79ABC03CBAC661C563DE1BC09D9DD855CBC72DD2B6467EA98F0F90421BA9
                                                    SHA-512:B58B35EA1B2F0388B8108DCF254F3BD1B21894F00A9F313ABC093BC52C36FCDD94B7486DBA38161C9EFCDB12BC3CD81E7E02395B0CA480A7F01148C43CD3054F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Jujuy) {.. {-9223372036854775808 -15672 0 LMT}.. {-2372096328 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2106
                                                    Entropy (8bit):3.744252944523733
                                                    Encrypted:false
                                                    SSDEEP:48:5lduuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0NC:Tou3pfe92jCs/VOHv2kdeRtnxafwwkFP
                                                    MD5:4A45A063D45EB94214005EF3CA5BCD6D
                                                    SHA1:2420E8591DC53A39EE1A58B2E45DCFAF9503685F
                                                    SHA-256:2B018B791E48269FA9EDA12662FFEC3E2DC33603A918E8B735B8D7D6BEB3B3AA
                                                    SHA-512:0B2824FA3D40B2EDBE8488D50C30368F4CF6E45A39FF6DEBC5BB4FD86F85AD52F5331AD1EB50E5166FA2E735B7E8AA9D94A5FED9421334DB0499524DBE08F737
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/La_Rioja) {.. {-9223372036854775808 -16044 0 LMT}.. {-2372095956 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2077
                                                    Entropy (8bit):3.738002814507529
                                                    Encrypted:false
                                                    SSDEEP:48:5CPBuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwGSmSc8OSI:GUu3pfe92jCs/VOHv2kdeRtnxafwGJld
                                                    MD5:F6CB24E8567B2443224E9E17EE438BFE
                                                    SHA1:8029426C30C4C645EA77C6240391CDB1C3107568
                                                    SHA-256:DC39400BBFD5BDDDC174FE099194806FBFD3FC3AA20E670D67BE0AC35FE97AD4
                                                    SHA-512:6869CFC24C21FBB2DFCCAA9AE7E21A0B24DC002EE792FB28A8F2F05C75C20E93C95A39BD8653AA272AF10FE95922B99EECC1208AACE814817D9441F84360E867
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Mendoza) {.. {-9223372036854775808 -16516 0 LMT}.. {-2372095484 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2080
                                                    Entropy (8bit):3.7580685839169545
                                                    Encrypted:false
                                                    SSDEEP:48:5oQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0NC:qBu3pfe92jCs/VOHv2kdeRtnxafwwfFP
                                                    MD5:212D13CE27AF114A8EC2E04023D218C4
                                                    SHA1:C4C5F86BC6EC0D5EA4C9CF199309D085767B97E8
                                                    SHA-256:A05B6708DEFF0607396BFC6661C2287341C3432841AE353D94A67AC742B5FAFA
                                                    SHA-512:CE7201EEA6A86FB49641410D2EEE4030EDB1B96F3218D764762F5AE23883C796F5742ED69CEC985A9D3582D6C72ED74114DE81508F6DEB4B54865B6974ADC965
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Rio_Gallegos) {.. {-9223372036854775808 -16612 0 LMT}.. {-2372095388 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2011
                                                    Entropy (8bit):3.7415813345133975
                                                    Encrypted:false
                                                    SSDEEP:48:5NPuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0wF:72u3pfe92jCs/VOHv2kdeRtnxafww3mz
                                                    MD5:A06C33CDFD7E7B630CB1DF34E72E61E5
                                                    SHA1:694826B9B910DA0BD70A9CB547C26E6838B08111
                                                    SHA-256:CAEFC60F2F36EF9FFE0C5921C3C392DE1E95755683A96C1C4EC0BA2C242A4D84
                                                    SHA-512:D6696A6C14EECF2B77EC586F40137BDD95E5CE5C5193570C809FAB9E5FCA4B8744283CEB6818E525C73F6EFF657274410B2622902EE8C15912C8D5F5FA5C805E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Salta) {.. {-9223372036854775808 -15700 0 LMT}.. {-2372096300 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2106
                                                    Entropy (8bit):3.747934819596411
                                                    Encrypted:false
                                                    SSDEEP:48:5vXxuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0K:hUu3pfe92jCs/VOHv2kdeRtnxafwwkFl
                                                    MD5:32A50D0ABF408D9E59C0580D5B8CC472
                                                    SHA1:EA5BB8860982F8BAFEAEFDE1D6ACD440DA132DFE
                                                    SHA-256:41B2C25E42146A76934B866061BB3245B8ADA0FF4E1BFBA6F8842A30BDD5C132
                                                    SHA-512:E5D2521A4EF53AAD3E74506708EC2768C4D2EE8D6D014DCCF4A6DC290B713B4D46021B66527548C35004E10D753E1B685EEFD55BBE7BF01EC6104D7D8AAC4403
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Juan) {.. {-9223372036854775808 -16444 0 LMT}.. {-2372095556 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2081
                                                    Entropy (8bit):3.7399269084699975
                                                    Encrypted:false
                                                    SSDEEP:48:5MDuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafw6bS2nZSbdI:yCu3pfe92jCs/VOHv2kdeRtnxafwWnZr
                                                    MD5:FB06B66F5D41709C7E85C8B1E9BFCFA0
                                                    SHA1:D5C0C4B12C6190856C300321B1C106C7474BA54B
                                                    SHA-256:A43B35F25E54EF359D046E33281C0A978F0EE8811C93A6809F1F65750878BBB6
                                                    SHA-512:D445F46D6A17A075AD995885E45234A711F53BF3FE2DFC6DFBB611E8AC154B10C91E137927DD66D6A7C596A93BAE5DE283796F341B5095FA0DD05595E1C3A077
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Luis) {.. {-9223372036854775808 -15924 0 LMT}.. {-2372096076 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2105
                                                    Entropy (8bit):3.741704529449777
                                                    Encrypted:false
                                                    SSDEEP:48:5yZujuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OSf:suiu3pfe92jCs/VOHv2kdeRtnxafww3w
                                                    MD5:D9497141EC0DC172E5FF5304FED0BE6B
                                                    SHA1:CD20A4F0C127A84791093010D59DF119DD32340A
                                                    SHA-256:0F7DB23E1280FC19A1FB716E09A9699ADA2AAE24084CAD472B4C325CC9783CCF
                                                    SHA-512:0B71952055013CD6045ED209FD98168083550655FAB91B7870C92098E40C4FE6827EAAF922D34ECE28298CBB14327A76AD6780D480E552F52F865AA11A4AA083
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Tucuman) {.. {-9223372036854775808 -15652 0 LMT}.. {-2372096348 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2075
                                                    Entropy (8bit):3.7445758155279836
                                                    Encrypted:false
                                                    SSDEEP:48:5SHuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0jE:YOu3pfe92jCs/VOHv2kdeRtnxafwwfFn
                                                    MD5:16A89FD2CDEE50E534301A9797311A9D
                                                    SHA1:4A4EBA1798214C7CF5ACDC0B2EC8B4716CD968CB
                                                    SHA-256:10B6FF51314D8EE1D010187D8805C4E3D71B778BC6DECB26E66193A5BB3E9EA2
                                                    SHA-512:DBB0BA3F8AA2B54C86EA8B6530C16DF95AF1331FC5F843B113A204DA20B8EF011FE93C27EB917D01B9040D4914057687B4AACCD292A847559AF69150D1BDC4B5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Ushuaia) {.. {-9223372036854775808 -16392 0 LMT}.. {-2372095608 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):199
                                                    Entropy (8bit):4.893042770292303
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/V90ppv:MByMYbpwt290/V90b
                                                    MD5:CC015E3E5D3293CAA1348B4E0EE5795C
                                                    SHA1:75E7EFD905C9001CE9CA5872DA3915A19BCB00E0
                                                    SHA-256:7490CD66408B8A14C549278FE67DC3338FE9E458F423F01CCBEA00B5E6F6CEF6
                                                    SHA-512:66523F050E4A42A1C9FC8C02B822CD3864A6E35F6364FB6A675F2A503BD8030FE6E380B252068668A79A6593B5042520EE40700DA033517742B3F0ED33D79DAF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Aruba) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7944
                                                    Entropy (8bit):3.5156463862656775
                                                    Encrypted:false
                                                    SSDEEP:192:j7RXBXLqbvdvZsV4GGdzVUFg7XaMOhKpJq3o5GMJq90vRFhjGF3RxTBhcXBACBLo:jEJgXh
                                                    MD5:181203CAD98E94355B9914A205514904
                                                    SHA1:D361CB53955437270905A9432DE9E7F6C1AE7189
                                                    SHA-256:EAEFE21276EE60C7F876C1D65039999AC069339DCDB82A23FC9206C274510575
                                                    SHA-512:AE9262DFC35579AEB610DF8BB5F7FBB49232195F55F78402405017681F72C0D2A09FA9EB605B406065A1F44FE6785AC0163870C921DAFFC4746DA6EDA3081521
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Asuncion) {.. {-9223372036854775808 -13840 0 LMT}.. {-2524507760 -13840 0 AMT}.. {-1206389360 -14400 0 -04}.. {86760000 -10800 0 -03}.. {134017200 -14400 0 -04}.. {162878400 -14400 0 -04}.. {181368000 -10800 1 -04}.. {194497200 -14400 0 -04}.. {212990400 -10800 1 -04}.. {226033200 -14400 0 -04}.. {244526400 -10800 1 -04}.. {257569200 -14400 0 -04}.. {276062400 -10800 1 -04}.. {291783600 -14400 0 -04}.. {307598400 -10800 1 -04}.. {323406000 -14400 0 -04}.. {339220800 -10800 1 -04}.. {354942000 -14400 0 -04}.. {370756800 -10800 1 -04}.. {386478000 -14400 0 -04}.. {402292800 -10800 1 -04}.. {418014000 -14400 0 -04}.. {433828800 -10800 1 -04}.. {449636400 -14400 0 -04}.. {465451200 -10800 1 -04}.. {481172400 -14400 0 -04}.. {496987200 -10800 1 -04}.. {512708400 -14400 0 -04}.. {528523200 -10800 1 -04}.. {544244400 -14400 0 -04}.. {5
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.791603790249234
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE/qlOi+4IAcGEu5B:SlSWB9vsM3y7oDSHAIgpdN/290/qlf+M
                                                    MD5:5A45B70C79F533548B3DD332F988E15B
                                                    SHA1:C7485828619A1D4F5CA59D80ABD197100AC58F64
                                                    SHA-256:518BEB6E54AE811F8C725EA8CC42787D48FC605A3476D6E7A00A1B5733CBD6AC
                                                    SHA-512:A81C2EBE282E019ED011EADDB8F74C3E6FBE88D87E8D8706B3022CDCC48EF92AD90F9BCF9F25031664BB6EFE069EAFDD23D9B55BF672FC7528A2DD8CB6B986B4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Atikokan) $TZData(:America/Panama)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):177
                                                    Entropy (8bit):4.812527147763069
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/2IAcGE/ol7x+IAcGs:SlSWB9vsM3y7/yrHAIgp/yH0AN/290/e
                                                    MD5:13479F64BFBDC7583C637E1562C454B4
                                                    SHA1:2F59484C779B0D6033FC14E205DA9BCAB7A5FCB1
                                                    SHA-256:1D6FEE336E71FFFB64874A830C976867C071EBF6B133C296B32F87E3E7D814C9
                                                    SHA-512:D2C5D35BBBDAB8D58BF6185328124796C06B67ADFB4C1828BA5A9CCA500A01BB8BE69635AE7EEA7FA837A27B20D488A08A29B121DD1617BC373390AD95D67E39
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:America/Atka) $TZData(:America/Adak)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2012
                                                    Entropy (8bit):3.703391569010329
                                                    Encrypted:false
                                                    SSDEEP:48:5/ChlvEw6kSSx5H4a8tf3fku+da2XUd23t8VZDG8+GyOd:VIlvEwJSSxdF8tfMu+da2kdCt8VZy8+K
                                                    MD5:69DCC2477D8D81E2F49D295DB6907190
                                                    SHA1:3C6ED0CEF15D3265C962873480EE1809A4DCACA2
                                                    SHA-256:64F1EC14F6B43FF10B564F839152E88DF9262F0947D1DB347557FA902F6FD48C
                                                    SHA-512:71DEA6D47F267AA7326A011872FA74762FA4F8CD57EB149E3B56B3DE9097B0B9258BC4F6C29188B49FC60C1942869B92D9E59FEE6980A5DA5D0029C383D99F39
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia) {.. {-9223372036854775808 -9244 0 LMT}.. {-1767216356 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6847
                                                    Entropy (8bit):3.8753284304113196
                                                    Encrypted:false
                                                    SSDEEP:48:5pUSdFS1Y3FUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAqyQUrBbp7uos6u:DG1sehpYtpjyrz7nKED4KPddGEYA/Gx
                                                    MD5:E7EF08880C64C898BB7A5266EBF1A47A
                                                    SHA1:E2D2F36961C9CADB2736FFAF2DBA9A1F4B372DBD
                                                    SHA-256:B24AE5FA20F5329644529F660EEC8BAA3B966F9730AF58F1C21E94C02AE17228
                                                    SHA-512:6C47D875682CCE8B769EB0458CEC20FB8D4950A70D6904A32CED803D30F8B407828D7A12B4F560CF6B86541E985817B4394F9AEAAFEAA80593B5B42BA92D38CB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia_Banderas) {.. {-9223372036854775808 -25260 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):648
                                                    Entropy (8bit):4.251560000277241
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290eWmdH9Colj/uFkv/lC1/uFkOzQs/lps/Ozfah/OzT/lN/uFkX/ll/uFki:5TWeUo5Skv/Y1SkA/g/Bh/m/rSkX/zSt
                                                    MD5:DC4FA44B2174A4E6F0644FA8EA2E83F9
                                                    SHA1:C12DF8C862A05D569EAF189272F8BF44303595A1
                                                    SHA-256:FD5E04136506C6543A9ACDC890A30BCF0D561148E1063EC857E3913DE1EBA404
                                                    SHA-512:5AC307CD48132B57215CCBAF0BB63F7FA9C5B28DC9F6217C905885D75B0DF131238D4DB2AE707C3DDEE2EDE6C0914644B435FB1CDD9913600D8B69AE95578B0F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Barbados) {.. {-9223372036854775808 -14309 0 LMT}.. {-1841256091 -14400 0 AST}.. {-874263600 -10800 1 ADT}.. {-862682400 -14400 0 AST}.. {-841604400 -10800 1 ADT}.. {-830714400 -14400 0 AST}.. {-820526400 -14400 0 -0330}.. {-811882800 -12600 1 AST}.. {-798660000 -14400 0 -0330}.. {-788904000 -14400 0 AST}.. {234943200 -10800 1 ADT}.. {244616400 -14400 0 AST}.. {261554400 -10800 1 ADT}.. {276066000 -14400 0 AST}.. {293004000 -10800 1 ADT}.. {307515600 -14400 0 AST}.. {325058400 -10800 1 ADT}.. {338706000 -14400 0 AST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1031
                                                    Entropy (8bit):3.8842563546204225
                                                    Encrypted:false
                                                    SSDEEP:24:5fe300cChlrLPsw6kSS3h5R14eH8tf3xd:5+CChlvEw6kSSx5H4a8tf3xd
                                                    MD5:DFA5E50F6AEF1311A4CF74970477E390
                                                    SHA1:5B63676EB8039B2BE767BAA44820F2DAE5B62876
                                                    SHA-256:549625CCB30BD0E025BAC47668BA3AA0CDD8569E5887E483C8D62B5B7302FA50
                                                    SHA-512:4BBB43694E3B54339C549AC3A5488B77366DB1189D8D1834DCF618D9448084A950B575E207064521B1CDFD2E41F7D1D8C5CD9CEB4668D4459585649556136EB0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belem) {.. {-9223372036854775808 -11636 0 LMT}.. {-1767213964 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3284
                                                    Entropy (8bit):3.8546064195941097
                                                    Encrypted:false
                                                    SSDEEP:48:5pKSxZwR9IVQU55DG5krgGN8wW+YeD1yyfCwoc:HKSjgIVzrG5krRN8wWheD1yu
                                                    MD5:4DA622B685B3B075CC94FC4E23322547
                                                    SHA1:DEB23F0A434549DAE1BE60ACF757BB212C907B92
                                                    SHA-256:E07F45264E28FD5AA54BD48CB701658509829CF989EC9BD79498D070A1BA270F
                                                    SHA-512:9B00BF8870BC4AAEF7F06FCDFEEEF54686A2CC890103696631EB4DEF5AEEAD051EC9069D70A2B22397F18C0067E03A54E75DA18474D6B1BD3BDA2D5313E0AD16
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belize) {.. {-9223372036854775808 -21168 0 LMT}.. {-1822500432 -21600 0 CST}.. {-1616954400 -19800 1 -0530}.. {-1606069800 -21600 0 CST}.. {-1585504800 -19800 1 -0530}.. {-1574015400 -21600 0 CST}.. {-1554055200 -19800 1 -0530}.. {-1542565800 -21600 0 CST}.. {-1522605600 -19800 1 -0530}.. {-1511116200 -21600 0 CST}.. {-1490551200 -19800 1 -0530}.. {-1479666600 -21600 0 CST}.. {-1459101600 -19800 1 -0530}.. {-1448217000 -21600 0 CST}.. {-1427652000 -19800 1 -0530}.. {-1416162600 -21600 0 CST}.. {-1396202400 -19800 1 -0530}.. {-1384713000 -21600 0 CST}.. {-1364752800 -19800 1 -0530}.. {-1353263400 -21600 0 CST}.. {-1333303200 -19800 1 -0530}.. {-1321813800 -21600 0 CST}.. {-1301248800 -19800 1 -0530}.. {-1290364200 -21600 0 CST}.. {-1269799200 -19800 1 -0530}.. {-1258914600 -21600 0 CST}.. {-1238349600 -19800 1 -0530}.. {-1226860200 -21600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):206
                                                    Entropy (8bit):4.938043196147077
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290F490ppv:MByMYbpwt290S90b
                                                    MD5:09FD8280CC890F238126F9641DB7C90E
                                                    SHA1:98AB4E0DE8173C2BB2532B07FAE2E71F588AB26F
                                                    SHA-256:FACD0A835D1F425CD323EE453ADE231810B2D1CF6EBA227BA1B50522AE3879F7
                                                    SHA-512:117C24389B7BFB079F4409B1FA6AA547654D7C69A6CBB19218BF2B96F6CFE3CBAAD400D4C2EFE8A9BFE25F44402057427FC8A62DC20A98018D23A7CF9B87401F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Blanc-Sablon) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1199
                                                    Entropy (8bit):3.7988385604912893
                                                    Encrypted:false
                                                    SSDEEP:24:5EThevwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQZ:5EHSeSFESoSQSrSsCSeSPS1cSQSQlSsp
                                                    MD5:9529221F9B4E104CC598491703B10E6C
                                                    SHA1:5ACD61B525A18DE1919A7484C92EC5D787DF2F25
                                                    SHA-256:10592EA1CB0D02C06A61059EC601F70A706A5053AC923B9EED29388D5E71EF3A
                                                    SHA-512:66BEDB631469651A5E426155428764E3C1C14483E6FEE1505812E8676EB6E82CF0A88F6CC697F03FDA0AF906D91C7DE6E940DF3D33DD247BEF51DBD9A13DEE16
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boa_Vista) {.. {-9223372036854775808 -14560 0 LMT}.. {-1767211040 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):246
                                                    Entropy (8bit):4.705337479465446
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/290bJhDm2OHDgoHvcuknov/zEXPKV2kR/uFVEV/KVg:MB86290bLmdHDgCvcukCz8O2Y/uF2/Og
                                                    MD5:DB019451A7D678C3E7AEE706283861F6
                                                    SHA1:57E63C5372F50CBD1A7FA32688C1B77ADDCC06EB
                                                    SHA-256:B6ADC16815DC95E537548CA3572D7F93626A6D1DC390DD4CBABAB5AB855BBA30
                                                    SHA-512:6C94B2D7EFA856E6BD41FC45B0E8D16A40E61D8B895397CD71230047FAD4793DDB9ABAAC57D2841549F161C9389D7E61D54D38F1BAC6F13ED3DD4C68CDD3272C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bogota) {.. {-9223372036854775808 -17776 0 LMT}.. {-2707671824 -17776 0 BMT}.. {-1739041424 -18000 0 -05}.. {704869200 -14400 1 -05}.. {733896000 -18000 0 -05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8605
                                                    Entropy (8bit):3.8563913604109064
                                                    Encrypted:false
                                                    SSDEEP:96:eSwtktXNmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/jXNDPlLv/PCenJzS6cy
                                                    MD5:005D0BF1320030A7E9CDC97D0C8BB44B
                                                    SHA1:CB236DA840A49B4BCD261114DCA38DADA567B091
                                                    SHA-256:93AF910CB2AD2203B71C1AD49D56DF4A4A14D07F885AFD4E755271F1372A517C
                                                    SHA-512:16A5483392741673BEC020EF6EBE963AB0FB12629D662C586C27A1E9A1BE3FEA8DC3D05A0E84917B8166E48CADA45C74DFABFDC897A6BC94D3C5058D31AD5126
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boise) {.. {-9223372036854775808 -27889 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-1471788000 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126255600 -25200 0 MST}.. {129114000 -21600 0 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):239
                                                    Entropy (8bit):4.821972751564724
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MQA+zAHAIgp/MQA+zE5N/290BFzk5h490/MQA+zd:MByMY/MV+zhp/MV+zE5t290rzy490/MW
                                                    MD5:6700956D5FE96CEC8D34EB49FF805374
                                                    SHA1:69B9973EF31AE204EFED7485E59CEA99E00815C8
                                                    SHA-256:DEFC5C9DA2D4D4146145A50D692A6BFF698C3B0A1F19EFD82AD0EE7678F39FCF
                                                    SHA-512:A80C03A519F00A4270248E885463090A34B3992B3DEBA94DD6AEBCC50736541655461E4AA10856125B8EF9B92CEB697429EE7088DBC6AB4FAE383FDF11521B7A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Buenos_Aires)]} {.. LoadTimeZoneFile America/Argentina/Buenos_Aires..}..set TZData(:America/Buenos_Aires) $TZData(:America/Argentina/Buenos_Aires)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7739
                                                    Entropy (8bit):3.8713679494465016
                                                    Encrypted:false
                                                    SSDEEP:96:zsGaLV9T1sF7Lv/PCewtA8CzSPyDLbrcUia:h5lLv/PCenJzS6cy
                                                    MD5:E6AE12CDB55FED492C253E46E2690FE0
                                                    SHA1:CD3699E50BC1694827E51E4101C713E52FA646C8
                                                    SHA-256:3E0506A54B562DBC3AA6889DDD39B327FE0B85C63B00F0B39D606921A0936A59
                                                    SHA-512:BA3D5D5420210E74E74A581C9678224948266828A8FACE06383E41E13475C682F82D288426FB915D618FFE7ED95BD8F1C7E9D59D31CE5B464D5EC1363AB5E340
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cambridge_Bay) {.. {-9223372036854775808 0 0 -00}.. {-1577923200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-147891600 -18000 1 MDDT}.. {-131562000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}.. {671014800 -21600 1 MDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2918
                                                    Entropy (8bit):3.6039149423727013
                                                    Encrypted:false
                                                    SSDEEP:48:591PSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxSs:5VsE3LMuJALTvn1ZdP7ZbvLfeAh+KIic
                                                    MD5:230A9F7A87BA56C30ACB3B1732F823F3
                                                    SHA1:8263EA723F2AEA7740C7EC54BE0000A06982D765
                                                    SHA-256:6D5BD1355016B03EDEA58DF98BEC26281CD372725B2DCB60B4D748D2FB4346C8
                                                    SHA-512:C357AA33833DBBDC6BC7DD3F23469EADDF08564AF17D7EE935C8AEA5F35B6E3BBDE1E181BC0DBF264051C4BE139261055633D191413DD610B0150AB3CDE161AF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Campo_Grande) {.. {-9223372036854775808 -13108 0 LMT}.. {-1767212492 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1412
                                                    Entropy (8bit):4.034087321254386
                                                    Encrypted:false
                                                    SSDEEP:24:5s5edTS/uVV3iVP/uaP/uAyAhbS+V8S+FfS+UvS+MS+FB3S+QS+rcS+kS+RS+dSB:5DziZAmELf0On9uhcinzPPoUlWQW3
                                                    MD5:7FBCA91F4B7100C4667F24A9AB263109
                                                    SHA1:163A77FF9EAC49B00B5F838DF4D47F079ECF6A83
                                                    SHA-256:FD6C370F82E5CFE374637E0E222E72570857AC3F85143BEEEF9C3D0E7A6C0D04
                                                    SHA-512:124A5D7F58B38F15A90BA48E63D1D38335371D98A2503E691EC6426EB51E87FD61CA05FCA83573DD1DC06DB9E599302C64D226D5DF13B8A62E0A6943318431BE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cancun) {.. {-9223372036854775808 -20824 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {828860400 -14400 1 EDT}.. {846396000 -18000 0 EST}.. {860310000 -14400 1 EDT}.. {877845600 -18000 0 EST}.. {891759600 -14400 1 EDT}.. {902041200 -18000 0 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):284
                                                    Entropy (8bit):4.588048586971241
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2909+ETlDm2OHXoHv8HkISlvFVFQVgVJUF/R/OXFxWnVVFQVgVVvR/e:MB86290XmdHXCvydSltvAUeFZ/O/qVva
                                                    MD5:5DDB49759D58931A06740A14F76B431C
                                                    SHA1:E9AC99265D42D140E12BB4DAAA24FABAC65E79FA
                                                    SHA-256:D558C25F165E956E980AA8F554AB3BF24E91B51EADBD2B1065EF6DFDA0E2F984
                                                    SHA-512:318804ED41F36A3A8746C8CD286116787A768B06CAD6057559D1C7105170DE6EAB807EFA52AA8A0E353491B6F8C47D623D4473C1AEAD20B5C00747E07BB282B2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Caracas) {.. {-9223372036854775808 -16064 0 LMT}.. {-2524505536 -16060 0 CMT}.. {-1826739140 -16200 0 -0430}.. {-157750200 -14400 0 -04}.. {1197183600 -16200 0 -0430}.. {1462086000 -14400 0 -04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):227
                                                    Entropy (8bit):4.666638841481612
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/29094SXAFB5290/MMXAy:MByMY/MYp/MrRt290mh5290/MK
                                                    MD5:EEB851BE330BCC44A4831763534058B9
                                                    SHA1:A5FC3E69DDBD3C40D9EB4317BBD5BB6C78751B36
                                                    SHA-256:37CD6BDAA6C6EEDFAC3288CA1C11F5CBBE8A17E5F2E790E7635A64B867AFBD87
                                                    SHA-512:7CD0BC822550325EB3198B4AD6CCD38938FA654A03A09C53117560D1FE3FDCD9C892D105F0D7AF44ED52DD7E0475721240D74A10C98619BE9EC4F5410B8FD87D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Catamarca) $TZData(:America/Argentina/Catamarca)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.832612867310476
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGE91INMXGm2OHEFvpoeoHsdR4FIUPvGXFkUwXvp3VVV:SlSWB9eg/2909qDm2OHEdGeoHm4vOXF6
                                                    MD5:6052E52C8E5A5F43102C47D895797A1F
                                                    SHA1:23DBD40AE96C84E44ADCD1AC33E7871D217C17BC
                                                    SHA-256:873285F3E13CB68DD28EB109ECAD8D260E11A9FF6DF6A4E8E0D4C00B0182695B
                                                    SHA-512:DDE89C70B6F24AD4F585DC5424A6D029E5C898254C9085C588AE699CED4C8316840FF7C87685D7CFAA2E689F01687985454A0C9E3886342E936C56AB688DF732
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cayenne) {.. {-9223372036854775808 -12560 0 LMT}.. {-1846269040 -14400 0 -04}.. {-71092800 -10800 0 -03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.774923706273939
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE91mr4IAcGEu5pvn:SlSWB9vsM3y7oDSHAIgpdN/2909Yr49F
                                                    MD5:AD6E086BEDF05A0BEB66990BD9518BEE
                                                    SHA1:FA0B7E8D6931E79092A90F7EECBA2293AE886AE3
                                                    SHA-256:C38C49AE1C3E67BD2118002DCFCC3C0EFB6892FB9B0106908A9282C414D0BF2E
                                                    SHA-512:A1E40422D15DBCB24A6FE353639A1541FAD7F394D20F8AEB32D4E39667BA264C3E815BAA703B88B90D381540168016A0641CA220BACAF05E80EAA698642B6FFA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Cayman) $TZData(:America/Panama)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11372
                                                    Entropy (8bit):3.814348526052702
                                                    Encrypted:false
                                                    SSDEEP:96:l6u30Ke1rdJ8SUklvgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:l1EKwdJ8SUkl4aUqtfA604qSBgI7DBch
                                                    MD5:763E23AA7FB20F8D7CB2F0E87FAFD153
                                                    SHA1:B131A10C1C208BB5E5E178ACD21A679FD0537AC5
                                                    SHA-256:C7707AF88D650F90839E7258356E39D85228B33B6DBCC5C065C3D8733AE28CEE
                                                    SHA-512:FE9C5D2EA253338DDFD79CC8ED2F94D6817BD770C0895752EFB1917E2313735C18475D67191C29BCCD53DEFFF35C1BF0CA5D98C92091DDCD1E97CD6302DC73A4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chicago) {.. {-9223372036854775808 -21036 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-1563724800 -18000 1 CDT}.. {-1551632400 -21600 0 CST}.. {-1538928000 -18000 1 CDT}.. {-1520182800 -21600 0 CST}.. {-1504454400 -18000 1 CDT}.. {-1491757200 -21600 0 CST}.. {-1473004800 -18000 1 CDT}.. {-1459702800 -21600 0 CST}.. {-1441555200 -18000 1 CDT}.. {-1428253200 -21600 0 CST}.. {-1410105600 -18000 1 CDT}.. {-1396803600 -21600 0 CST}.. {-1378656000 -18000 1 CDT}.. {-1365354000 -21600 0 CST}.. {-1347206400 -18000 1 CDT}.. {-1333904400 -21600 0 CST}.. {-1315152000 -18000 1 CDT}.. {-1301850000 -21600 0 CST}.. {-1283702400 -18000 1 CDT}.. {-1270400400 -21600 0 CST}.. {-1252252800 -18000 1 CDT}.. {-1238950800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6814
                                                    Entropy (8bit):3.8786702185951305
                                                    Encrypted:false
                                                    SSDEEP:96:bo1GK5+yBEzg4GaaECHm3FL5TInckNSNi:m5+yBEzVWEaOkv
                                                    MD5:1C8647651377A373D573DCD21001CC0A
                                                    SHA1:EFFE86F9A5C55FAB00415DD0A103B00AA6B237C6
                                                    SHA-256:A816DC1C4C2FB7509A50CB209D748DAC27C5F858A2842D7E12B2EC620FEA988B
                                                    SHA-512:5E78696E68FD13F1C45D880E49D121A7761CC5747060ADA0756D805B9DB6816DBE7054C88EC5BA0ED4C05D8EA019388195520A4B231E36F47BE99C542108481A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chihuahua) {.. {-9223372036854775808 -25460 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.844590153688034
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE9WtEaQXs+IAcGEi:SlSWB9vsM3y7oDSHAIgpdN/2909qEacn
                                                    MD5:A0BF04CD77026DC1D2749848AB0EE45E
                                                    SHA1:EA0F1BC11379DF2E421675BC5DE4805CE94B96D6
                                                    SHA-256:C8CBF5A29CC1D0827390CA6E98B2EFCF90743C6DD0ECA143B300050DD4164041
                                                    SHA-512:61968B4E42ECC60C801F959D18D13187AD39D9B81FA1A947F6B6862F99D73E3A30849AC4233DB5705D46F5373C42D8748B15BE9B82822971B4F47E601E5766D8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Coral_Harbour) $TZData(:America/Panama)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):219
                                                    Entropy (8bit):4.78887878252354
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/29093+90/M7:MByMY/M7p/M16t290c90/M7
                                                    MD5:C7CCF5CEC7AA60D6063D1C30F4263ADC
                                                    SHA1:FD8E9AEEEE50656FD3C694CA051895DDC8E5590B
                                                    SHA-256:28B84710EADEF7AD5E7FA63EF519A9D93996D3BB91DD9018333DE3AC4D8FB8DD
                                                    SHA-512:6974F8B238977EE5222368C4B79327BB240580819FCA082261D6994781144D81E2E8843B4F1C9D07EFBEE27311C8930BDAC9C0D6D6718F6FB1600D0000576CDE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Cordoba) $TZData(:America/Argentina/Cordoba)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):431
                                                    Entropy (8bit):4.506976345480408
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290lnmdHd5CvZN/Mi3yvI8/uF+wSJz/uF+IA/uF+i/X8/uF+ZDVxNv:5mnedIvZN/e5S+w+S+LS+i0S+pB
                                                    MD5:0446EF1A6985A62EDFFB9FFAC7F1DE0E
                                                    SHA1:A43468E120E585E2DCC20205BA1D1E2CCB6C0BC2
                                                    SHA-256:E3061DC6FA9F869F013351A9FDF420448592D7F959C2B4404093432508146F7E
                                                    SHA-512:86D41B0C49489572C3EAEDD5466AA92319C721CCEC9437EBB0F2AAD772FB5ED91A2F2061E00448FB48096B0BAAE9A4E1E644F8AF595B76BE05DBC0C801E6D6ED
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Costa_Rica) {.. {-9223372036854775808 -20173 0 LMT}.. {-2524501427 -20173 0 SJMT}.. {-1545071027 -21600 0 CST}.. {288770400 -18000 1 CDT}.. {297234000 -21600 0 CST}.. {320220000 -18000 1 CDT}.. {328683600 -21600 0 CST}.. {664264800 -18000 1 CDT}.. {678344400 -21600 0 CST}.. {695714400 -18000 1 CDT}.. {700635600 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.8664633847782905
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/2IAcGE9mM7x/h4y:SlSWB9vsM3y7OBHAIgpONYyHN/2909vr
                                                    MD5:0757DD22C0E297CCE8E6678ECA4B39C7
                                                    SHA1:81B31299F9A35C8BA2EC1F59EC21129FFCDCD52F
                                                    SHA-256:A01DDB460420C8765CE8EF7A7D031ABD7BDB17CFA548E7C3B8574C388AA21E17
                                                    SHA-512:F1AFC0F6371A10E4CB74FB2C8985610AEE6C3511861BC09384EDC99D250E9099A1F4430BFC3B0B396C2702BF9991A5A4ECFD53A82C92883460715FA2C1E04579
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:America/Creston) $TZData(:America/Phoenix)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2912
                                                    Entropy (8bit):3.588248620238414
                                                    Encrypted:false
                                                    SSDEEP:48:5tSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxS1S4:rVsE3LMuJALTvn1ZdP7ZbvLfeAh+KIil
                                                    MD5:264E0CEA9491B404993594E64F13479F
                                                    SHA1:6D4D277FA470A2C7AD0A59B5DA3CC15BEEB74E78
                                                    SHA-256:2D8281CF3FD9E859C5206F781E264854FA876CB36562A08C6C01343C65F8A508
                                                    SHA-512:759C19B4DD0E1F7F1176872806BFB1F17ADF9C992E41B96FEA67D77DD67E9DD3C1683E3B6D27FB092C731F534C6A7441BACFFF0301907217A064523B86992E23
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cuiaba) {.. {-9223372036854775808 -13460 0 LMT}.. {-1767212140 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.876961543280111
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2909C4e90ppv:MByMYbpwt290690b
                                                    MD5:9459043060E33E8EDC74E78332E96EDF
                                                    SHA1:27963FE063965584D0F226BAE9A08EB2954398F0
                                                    SHA-256:ACCF08CF53C9431E226714DF8BEDE3C91BAF62D5BD7B98CA8B50D7258124D129
                                                    SHA-512:215D9AFAA7227F4447177CE2ABA5A6F7F2F46A9D787845DD32F10D5C22BF9CBE4047AF5E0E66FA7A4F70EEE064A7EC7B67949E565C3C5C60C31F3C19D6915D76
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Curacao) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1128
                                                    Entropy (8bit):3.8794180227436557
                                                    Encrypted:false
                                                    SSDEEP:24:5geNrmFQqFi77FkiVFw1ZFt9SFUXDFH9vMF0mFdS/FyMF8AWXF7HFEJF7cSXHVFS:5/vx7O11pbzvZ+S0xAqe12vey
                                                    MD5:6E37A78AC686A6B48A78541E1900E33C
                                                    SHA1:D41F39FDB6D45921B57341E95A006251B4875961
                                                    SHA-256:968C56F1D0106E1D92C7B094EEF528B6EE1FFA3D7A18BE2F2BA59178C2C0F1E0
                                                    SHA-512:397623149D95FF9A094750EE697F62DF90124BBBE407FB49FBAE335A61629449F2A61EF4471DBD57745B323DFCF3628611CAE9295F2EF7E4A7412A697651FF68
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Danmarkshavn) {.. {-9223372036854775808 -4480 0 LMT}.. {-1686091520 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -72
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2967
                                                    Entropy (8bit):3.9564096415565855
                                                    Encrypted:false
                                                    SSDEEP:24:5IeVvxBn4nRfngnSSXRwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZg7ywJP:5zxKKpj/AOZFCARCeQbvb5wxMN6Ix
                                                    MD5:F494405F3B250668BE00DC3864B9A2DC
                                                    SHA1:20843AD6D95DD5D5950E2946BCAE4ECE2B676F70
                                                    SHA-256:30E875343C81C8DE473E6313A27C55315F38E7CCDBD2CEE5783EC54D269D5807
                                                    SHA-512:9102BD114436D5FE5A1942E31AE692ECE41F910AC1B6E52C02283801D5AA00CFF22D980C61E69928267D3DD34331E301C7324CA631B71AC2FBBDE06D7914F849
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson) {.. {-9223372036854775808 -33460 0 LMT}.. {-2188996940 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -28800 0 PST}.. {576064800 -25200 1 PDT}.. {594205200 -28800 0 P
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1940
                                                    Entropy (8bit):4.024810417421672
                                                    Encrypted:false
                                                    SSDEEP:24:5/eUv5wk7Zw9JmnRsw78wP+7bw+7zwN7SynwpBZ7Fwk47H+wW73wo5775w572Iwl:5DuY/YRRvkGZ+R64CjSUlTGS
                                                    MD5:7868720D39782147B2BD6B039A5BF7E0
                                                    SHA1:6F66404E5CCFF7F020269A316D792D5E7AD4C280
                                                    SHA-256:540804BECDEAB92340EF02D32A62BFD550B71A3DB8D829BE426EE4D210004643
                                                    SHA-512:9CCD124FF954CA2988F07286FFE9ED740E0CEF5F4D76BF090367B74A577E91BF5590EDFE12AFC83ACF5CBFC88C5A68867C58082A2777D08C326A7B18889B08E2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson_Creek) {.. {-9223372036854775808 -28856 0 LMT}.. {-2713881544 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400082400 -25200 1 PDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8920
                                                    Entropy (8bit):3.8540632258197514
                                                    Encrypted:false
                                                    SSDEEP:96:gjGtwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:gUwDPlLv/PCenJzS6cy
                                                    MD5:0D649599A899ECB3FCF2783DCEE3E37B
                                                    SHA1:ACC796BE75F41A12FB1F8CCBD2B2839AF9876FFE
                                                    SHA-256:3FE2EE8C05C5D6F268B58BD9FC3E3A845DEA257473B29F7B3FB403E917448F3C
                                                    SHA-512:C10D41AB95439B8E978F12F9F58D1ACC9AD15404123FA5FBA0D1CC716E5CF5DA6BD2252450055AC3998DBCB8DD49F7A82ACD53413E3EE78CDA2C42F603DE2C56
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Denver) {.. {-9223372036854775808 -25196 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-1577898000 -25200 0 MST}.. {-1570374000 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1538924400 -21600 1 MDT}.. {-1534089600 -25200 0 MST}.. {-883587600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-757357200 -25200 0 MST}.. {-147884400 -21600 1 MDT}.. {-131558400 -25200 0 MST}.. {-116434800 -21600 1 MDT}.. {-100108800 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -2
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8430
                                                    Entropy (8bit):3.826664943157435
                                                    Encrypted:false
                                                    SSDEEP:96:SGiS1A5tCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:SG/K5ItON0HY2iUmUFLqU
                                                    MD5:2BBA922E9377D257CBDF6E1367BBB1A2
                                                    SHA1:6F33A44834E8041E78660A326A5DDAF3D7F9DC2A
                                                    SHA-256:84F6897B87D3978D30D35097B78C55434CE55EB65D6E488A391DFC3B3BB5A8FE
                                                    SHA-512:D225824945C08A3521A8288B92B26DFFA712ED3505E72DEDE4A7D1777E58DEA79ADF3F042D22624E4142DD4203BAA4DFF8EB08B7033FDF00059F6C39954EA1A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Detroit) {.. {-9223372036854775808 -19931 0 LMT}.. {-2051202469 -21600 0 CST}.. {-1724083200 -18000 0 EST}.. {-883594800 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-757364400 -18000 0 EST}.. {-684349200 -14400 1 EDT}.. {-671047200 -18000 0 EST}.. {-80506740 -14400 0 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {94712400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {157784400 -18000 0 EST}.. {167814000 -14400 0 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):202
                                                    Entropy (8bit):4.86856578093135
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290TL3290ppv:MByMYbpwt290Tr290b
                                                    MD5:398D8DBB24CEA2D174EF05F63869C94A
                                                    SHA1:6D0E04165952E873E6ECA33A0E54761B747F0A98
                                                    SHA-256:3DA98AA7D3085845779BE8ED6C93CCBDA92191F17CA67BBF779803E21DA2ABF3
                                                    SHA-512:2652AFD1A3F8A4B84078A964005FE10C64491EC2D47CDE57D5066D07D1D837308FD696F53B9E7B6B0E72F86F9A85128B8CBF5F302F91EADE6D840DF946DE85CD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Dominica) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8600
                                                    Entropy (8bit):3.8579895970456137
                                                    Encrypted:false
                                                    SSDEEP:96:7SabOGaLm911sF7Lv/PCewtA8CzSPyDLbrcUia:7vf4lLv/PCenJzS6cy
                                                    MD5:EBD169ECA4D45EED28BF7B27809361BC
                                                    SHA1:E89C8484A29D792FB6349CFDFDD30C2FA6B78B6B
                                                    SHA-256:026D51D73D30A3710288F440E0C337E44E3A14D0AA2D7B6C6E53AF43FC72A90C
                                                    SHA-512:45C936ED7D4AF95261180547013454AAEC9FA7672B52AC6077DD99D9FEB6DDD57652FE4EC67BF81F1588384F3027A1872E0C72D9CAEB980B66D2CB6EE9B8ABB0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Edmonton) {.. {-9223372036854775808 -27232 0 LMT}.. {-1998663968 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1600614000 -21600 1 MDT}.. {-1596816000 -25200 0 MST}.. {-1567954800 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1536505200 -21600 1 MDT}.. {-1523203200 -25200 0 MST}.. {-1504450800 -21600 1 MDT}.. {-1491753600 -25200 0 MST}.. {-1473001200 -21600 1 MDT}.. {-1459699200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {136371600 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {167821200 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {23072
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1230
                                                    Entropy (8bit):3.7989525000422963
                                                    Encrypted:false
                                                    SSDEEP:24:5OXUepdkZss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6w:5OXCZsMw57XJh4CxUF/A6GTrtSUUhfL0
                                                    MD5:6766E75702D8C2D1C986DFCEFCE554F9
                                                    SHA1:39553F80D82BC0134FAF70C9830B96BDCBCEFF1C
                                                    SHA-256:48FC987E5999EA79F24797E0450FE4DAB7CF320DFAD7A47A8A1E037077EC42C9
                                                    SHA-512:A812D0D4254BB0B7DB7AE116652D2A8F97D22C59F2709A17D1CE435FCFB38B807A4E0ED6EA114A66897E29D85226875FA84D28B254A5D17BD1CBA95FAD8349B7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Eirunepe) {.. {-9223372036854775808 -16768 0 LMT}.. {-1767208832 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {571204800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):279
                                                    Entropy (8bit):4.760311149376001
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/29078iPDm2OHvJ4YoHxHhgdrV/uF+IcmJ3/uF+ivNv:MB8629078AmdHx4YCJSB/uF+QV/uF+w9
                                                    MD5:CEF7277443EB6990E72C7EA7F79A122C
                                                    SHA1:1D3FEA364B3DC129DE3998A1455D5588EBAA6FF8
                                                    SHA-256:C02C6E79398553BD07BEA0BE4B7F0EBDD8BC821595909CFFB49DE4290A0D1D0F
                                                    SHA-512:E6FC530B2CCF010B8D38BC3F49A6859B5C68F4AB604E6305CE75FBE4FC9FF3FCD0187DEBEF6DAE652EEF9695568DBDE31F426E404CC3CC206D78183E0D919234
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/El_Salvador) {.. {-9223372036854775808 -21408 0 LMT}.. {-1546279392 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.836337676384058
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/2IAcGE7JM7QIAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/2907390eB
                                                    MD5:005D9C0E50291616A727CFB74A9FD37E
                                                    SHA1:846AE6720382B4F67B37B4256E45246C81DAF899
                                                    SHA-256:3E363BF82545F24CCE8CFA6EEC97BA6E1C2A7730B2A9CE6C48F784821D308A5D
                                                    SHA-512:452326D11D01825764BC40A77D17444D822F3AA202582233DD8B122798478FA83E3A27A02508EAC4CF0C7922AC2563742D773AA870562AE496B34FBB41FBAD63
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Ensenada) $TZData(:America/Tijuana)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4578
                                                    Entropy (8bit):3.8944281193962818
                                                    Encrypted:false
                                                    SSDEEP:48:5QIgsB/YRRvkGZ+R64CjSUlTG5Al5pj/A1ZFCARCeQbvb5+:6IgzR864CjSETG5sjgZkR/bvt+
                                                    MD5:4A4E023F635C4202018EA9E8F85B5047
                                                    SHA1:38E121FE2D419413E9E791B6C22BFC8D9F7554BC
                                                    SHA-256:AB15023807E7C7D1026C9970D190F1B405D48952464025242C2BB6C6BBB8391A
                                                    SHA-512:F10D21A2C841224879D1C817FC7F477DF582E1BC3603666B55199C098D51D1D5429F8C088C1083C07FC7588AE5C42A1DFBCC6B7C636AD1BE84ED657807A229E5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fort_Nelson) {.. {-9223372036854775808 -29447 0 LMT}.. {-2713880953 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):231
                                                    Entropy (8bit):4.778858143786314
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/290HXYAp4903GK8:MByMY3GK7Kp3GKnt290Hz4903GK8
                                                    MD5:24C369A3091452DCA7AAEBF4F48F5289
                                                    SHA1:2C2174CB16F490689E6FAC17B6D18F4A0DBD2DC9
                                                    SHA-256:C8948616262CF6990739343ABBBD237E572DB49310099E21DD8F9E317F7D11B3
                                                    SHA-512:80F579572754579706B4EEA49BF30456F3231A308E0616DC430E2428A04992412773421542E4F7FE4E4C7491BA88942FA44B49E87E95A2183211AC2AB523B231
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Fort_Wayne) $TZData(:America/Indiana/Indianapolis)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1423
                                                    Entropy (8bit):3.784027854102512
                                                    Encrypted:false
                                                    SSDEEP:24:5MeajcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaIBXR8nd:5rChlvEw6kSSx5H4a8tf3fkuoYVZDNRo
                                                    MD5:E7939C9A3F83D73B82A6DE359365EFD4
                                                    SHA1:06D6E257DA7C317CAFAF6C0B04567A2453CC1660
                                                    SHA-256:C0A836BDAF07F0376B7B0833A0AB3D52BA6E3E1D6F95E247E1AD351CD1096066
                                                    SHA-512:E2BEA04084489B26ADD9A768D2580C1FF7EBAC8A3EA36818F49E85FB14E01500D59D53904F5A17F4DABEF27B4CC2FC3F977EE4C125E5CE739BBE90C130ED3B07
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fortaleza) {.. {-9223372036854775808 -9240 0 LMT}.. {-1767216360 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8372
                                                    Entropy (8bit):3.8225708746657316
                                                    Encrypted:false
                                                    SSDEEP:192:w4lTPB10KvnpNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/BI:wKCC
                                                    MD5:1C8B0B85BB5578E84A4867546111F946
                                                    SHA1:E08A96F5B369FA53BC1F3F839EC14FF9D334F727
                                                    SHA-256:58C207CBD9DE7A7BB15E48A62CEA9F15DA184B945133DEE88EFF29FD8B66B29E
                                                    SHA-512:54CFBF208AB3E58AFB6BEC40265A452A3C4C684D7F278F51D6495FCA544652A1A5E05BC45F600911191B33C936E5D7D43A28FD2B0884AAB9F63B7AD5EFD574A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Glace_Bay) {.. {-9223372036854775808 -14388 0 LMT}.. {-2131646412 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-536443200 -14400 0 AST}.. {-526500000 -10800 1 ADT}.. {-513198000 -14400 0 AST}.. {-504907200 -14400 0 AST}.. {63086400 -14400 0 AST}.. {73461600 -10800 1 ADT}.. {89182800 -14400 0 AST}.. {104911200 -10800 1 ADT}.. {120632400 -14400 0 AST}.. {126244800 -14400 0 AST}.. {136360800 -10800 1 ADT}.. {152082000 -14400 0 AST}.. {167810400 -10800 1 ADT}.. {183531600 -14400 0 AST}.. {199260000 -10800 1 ADT}.. {215586000 -14400 0 AST}.. {230709600 -10800 1 ADT}.. {247035600 -14400 0 AST}.. {262764000 -10800 1 ADT}.. {278485200 -14400 0 AST}.. {294213600 -10800 1 ADT}.. {309934800 -14400 0 AST}.. {325663200 -10800 1 ADT}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.973070790103308
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wQbSeyXHAIg20wQboAFARL/2IAcGE5GZJ4IAcGEH:SlSWB9vsM3y7lbSeSHAIgplbLFAN/291
                                                    MD5:8263D2B39C2EC3B38A179F8BAD5972DD
                                                    SHA1:18D3462F6846768E16036E860DE90FB345C93047
                                                    SHA-256:5FB2CFBA25CE2F49D4C3911AFF8E7E1FF84EFC2D01F5783772E88246BFBC56AC
                                                    SHA-512:C175CAF972459759553001D48921268E9C6268CED56021BA6339F8CE3DD032DA6180E2B82974D3DCD0DC5F21566DFDBFBE1B6CF24E5E893F2335A449452DB27F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Nuuk)]} {.. LoadTimeZoneFile America/Nuuk..}..set TZData(:America/Godthab) $TZData(:America/Nuuk)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10353
                                                    Entropy (8bit):3.864463676759425
                                                    Encrypted:false
                                                    SSDEEP:192:zfSacO8f7/ewzlrfFj18KvnpNWMPm4bPJvSuYUHgA0G19OBYEi/B51B7/Bm6BTdW:zfSacOI7/V3SuYUHgAuCC
                                                    MD5:0D646C67105FD0525E7CCC79585CE9DF
                                                    SHA1:06D91FDD8FEEDC299E40079569372F97A9AC6F04
                                                    SHA-256:52D2478289682BF95BFB93D64D679E888C9D23C0F68DFFF7E6E34BFC44B3D892
                                                    SHA-512:FD672613C2B65E12425415630A2F489917EB80DDED41338C9AA7D5D3C6B54E52C516A32493593F518DACF22A91D7A9D2C96DB9C5F1BE2C3BB9842D274BDC04FF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Goose_Bay) {.. {-9223372036854775808 -14500 0 LMT}.. {-2713895900 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1096921748 -12600 0 NST}.. {-1072989000 -12600 0 NST}.. {-1061670600 -9000 1 NDT}.. {-1048973400 -12600 0 NST}.. {-1030221000 -9000 1 NDT}.. {-1017523800 -12600 0 NST}.. {-998771400 -9000 1 NDT}.. {-986074200 -12600 0 NST}.. {-966717000 -9000 1 NDT}.. {-954624600 -12600 0 NST}.. {-935267400 -9000 1 NDT}.. {-922570200 -12600 0 NST}.. {-903817800 -9000 1 NDT}.. {-891120600 -12600 0 NST}.. {-872368200 -9000 0 NWT}.. {-769395600 -9000 1 NPT}.. {-765401400 -12600 0 NST}.. {-757369800 -12600 0 NST}.. {-746044200 -9000 1 NDT}.. {-733347000 -12600 0 NST}.. {-714594600 -9000 1 NDT}.. {-701897400 -12600 0 NST}.. {-683145000 -9000 1 NDT}.. {-67044
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7522
                                                    Entropy (8bit):3.84007813579738
                                                    Encrypted:false
                                                    SSDEEP:96:pGStCt/cL1BRv0HY2iU7KKdFL6Aa2K4gSLf8e:pvItOx0HY2iUmUFLqU
                                                    MD5:A17723CE27EC99D1506C45AB1531085B
                                                    SHA1:A83ED7BD09514A829CC8F2EA47BA113F5DCA1090
                                                    SHA-256:560B39485CED4C2A0E85A66EB875331E5879104187D92CB7F05C2F635E34AC99
                                                    SHA-512:110D1253D6915DB046247E4FD3BA9B881146BC3896DE779215E0CC6D1DCC59958C355441955509F5D38E3A3BA166DFD0F2F277000E9E89D6551FBEA0C16974B9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Grand_Turk) {.. {-9223372036854775808 -17072 0 LMT}.. {-2524504528 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {284014800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600 -14400 1 EDT}.. {499240800 -18000 0 EST}.. {514969200 -14400 1 EDT}.. {530690400 -18000 0 EST}.. {544604400 -14400 1 EDT}.. {562140000 -18000 0 EST}.. {576054000 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607503600 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638953200 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671007600 -14400 1 EDT}.. {688543200 -18000 0 EST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.892013473075135
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905Qb90ppv:MByMYbpwt290Ob90b
                                                    MD5:4B9ABEA103F55509550F8B42D88E84B7
                                                    SHA1:E3AA1BCE5E260264E74F77E59C4071B7E496AB41
                                                    SHA-256:EBED070E8E67C5F12FF6E03FE508BE90789F17C793DFE61237B4045B8222580F
                                                    SHA-512:568E375464FF264C5048CB35995945BDE1D5BCC3A108B2A4D0F8389EBF18B4C58EBB1C2122F10BA777D512504A59C7EFDF6069EABD2A5DEA3189204B7F7A6EB4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Grenada) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.9138787435596765
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905AJLr490ppv:MByMYbpwt290qJLr490b
                                                    MD5:92B091A06198E233B73DF12DFCD818D5
                                                    SHA1:C529488D09F86755E4F22CB4F0E3013C3A1B978D
                                                    SHA-256:6CB1930532831D12057FCB484C60DB64A60A4F6D8195DAFD464826923116A294
                                                    SHA-512:55EAE03CDECAC43BEDD3AA1A32C632A46808F29FF4D97A330F818544E4D10B9E9BA909D6627C38065EB7AC8E2C395FA37797F532CCFC8AB89D4698CCDE17F985
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Guadeloupe) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):399
                                                    Entropy (8bit):4.513185345162455
                                                    Encrypted:false
                                                    SSDEEP:12:MB862906GGmdHKznC972f/uF+mP/uF+K67Jqd3/uF+eBxE/uF+DAWNv:5neQCgfS+6S+K67Yd3S+e0S+1
                                                    MD5:569CDE7CE1AB84C0F16A25E85A418334
                                                    SHA1:EADE79AB6EDD98C7FE8B10B480C5C530CA014F5C
                                                    SHA-256:14F6A98D602F3648C816B110F3A0BA375E1FFE8FA06BEEAB419DC1ABFA6EDCAF
                                                    SHA-512:AE2ACBF09EED857906811BE2984D6BF92BF2955A9FE2F9F3FFEBB6790902F5C2C870F8561CA13AD9CB7826EECA434BED7CFE7D0D2739996BACEE506D0EB730DC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guatemala) {.. {-9223372036854775808 -21724 0 LMT}.. {-1617040676 -21600 0 CST}.. {123055200 -18000 1 CDT}.. {130914000 -21600 0 CST}.. {422344800 -18000 1 CDT}.. {433054800 -21600 0 CST}.. {669708000 -18000 1 CDT}.. {684219600 -21600 0 CST}.. {1146376800 -18000 1 CDT}.. {1159678800 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):249
                                                    Entropy (8bit):4.745656594295655
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2905xDm2OHHjGeoHv5laITicKpKV0EX/uFhfF/KVg:MB86290jmdHHLCv5FT/gOR/uFpF/Og
                                                    MD5:DF661E312C6CE279CD6829120BE33CF2
                                                    SHA1:4ACDB31E27EF9175C5452BF95F94F9BC280A237F
                                                    SHA-256:6806AA5814BDC679C6EF653C518D2699114BE71D973F49C0864F622038DC2048
                                                    SHA-512:04E7FD01F4DAD981EE8A02487F4A889015C41D07D6DCF420183D387E2188FF3239E345B5D65FB195CA485F5C7B4AD8CFEF51FFFC11EE0C91F0C88FF7B7EF17C1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guayaquil) {.. {-9223372036854775808 -19160 0 LMT}.. {-2524502440 -18840 0 QMT}.. {-1230749160 -18000 0 -05}.. {722926800 -14400 1 -05}.. {728884800 -18000 0 -05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):248
                                                    Entropy (8bit):4.673559445766137
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2905R3SDm2OHRLx5oH8ZOXFxSyZ1yV/KMMdVVFAKFZ4KVR/ON:MB86290LGmdHBnC8ZODhyV/4d/OeZ4Ke
                                                    MD5:F06C226D8D53EF8859AD91D7EBA5959C
                                                    SHA1:E0B4E6F4ADCB10F1D79FFD928E8684FFE0C0DC5F
                                                    SHA-256:4078D2E361D04A66F22F652E3810CDF7F630CF89399B47E4EC7B1D32B400FD85
                                                    SHA-512:B4385650A0C69B7BD66415CC4BB9FCA854DBB1427E9F2D6C1D8CDB8CCEF9ECBD699C66A83A9AC289DABC5CDBB0A2B044E4097E9A2977AE1802B3BF6E2BB518CF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guyana) {.. {-9223372036854775808 -13959 0 LMT}.. {-1843589241 -14400 0 -04}.. {-1730577600 -13500 0 -0345}.. {176096700 -10800 0 -03}.. {701841600 -14400 0 -04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11124
                                                    Entropy (8bit):3.8106487461849885
                                                    Encrypted:false
                                                    SSDEEP:192:YpQamC9XD81iWQSufutTLBCN8RWnWQ7Z/xVpmtBwXiCDLxcGMe++wzlrfFj10Kvn:2kXCvNc/1/CC
                                                    MD5:6FB9E47841FF397CE36A36C8280E2089
                                                    SHA1:DA210300DC3D94FC3D8BA0A4531341BCA5C5936C
                                                    SHA-256:01E11C7B07925D05E9E1876C310A2B87E0E80EF115D062225212E472B7A964F1
                                                    SHA-512:F61B5A8A7532BBD54A4976DF17A1C6CF51BCC6DC396482FBE169C3081AF27B6CA863F0CDE3E483C59F5A5BD3365592F6984A97173C736B41D3CEEDAD4263A4E5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Halifax) {.. {-9223372036854775808 -15264 0 LMT}.. {-2131645536 -14400 0 AST}.. {-1696276800 -10800 1 ADT}.. {-1680469200 -14400 0 AST}.. {-1640980800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1609444800 -14400 0 AST}.. {-1566763200 -10800 1 ADT}.. {-1557090000 -14400 0 AST}.. {-1535486400 -10800 1 ADT}.. {-1524949200 -14400 0 AST}.. {-1504468800 -10800 1 ADT}.. {-1493413200 -14400 0 AST}.. {-1472414400 -10800 1 ADT}.. {-1461963600 -14400 0 AST}.. {-1440964800 -10800 1 ADT}.. {-1429390800 -14400 0 AST}.. {-1409515200 -10800 1 ADT}.. {-1396731600 -14400 0 AST}.. {-1376856000 -10800 1 ADT}.. {-1366491600 -14400 0 AST}.. {-1346616000 -10800 1 ADT}.. {-1333832400 -14400 0 AST}.. {-1313956800 -10800 1 ADT}.. {-1303678800 -14400 0 AST}.. {-1282507200 -10800 1 ADT}.. {-1272661200 -14400 0 AST}.. {-1251057600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8729
                                                    Entropy (8bit):3.8227313494100867
                                                    Encrypted:false
                                                    SSDEEP:96:BEsWduCtQA/gF6Y3Umjm67yLb5RCzhV28I:BBWACb/gF6Y3UmjBy7
                                                    MD5:564980AECB32F5778422EA15E8956879
                                                    SHA1:545209C95043721C1839CCE5FEFD1A6F2DE3FE5F
                                                    SHA-256:96B62BFBF0C05CF970245597C691F89EBF631175796459642A85287F131D0215
                                                    SHA-512:25FE5DAA55E3466EAE1CDC73918F189403C3360D4E82D72D745FA04A374DE04F479AA9811D6154FC70CC8EA620F18035EA6A3074116806D4405936FA017CE8E6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Havana) {.. {-9223372036854775808 -19768 0 LMT}.. {-2524501832 -19776 0 HMT}.. {-1402813824 -18000 0 CST}.. {-1311534000 -14400 1 CDT}.. {-1300996800 -18000 0 CST}.. {-933534000 -14400 1 CDT}.. {-925675200 -18000 0 CST}.. {-902084400 -14400 1 CDT}.. {-893620800 -18000 0 CST}.. {-870030000 -14400 1 CDT}.. {-862171200 -18000 0 CST}.. {-775681200 -14400 1 CDT}.. {-767822400 -18000 0 CST}.. {-744231600 -14400 1 CDT}.. {-736372800 -18000 0 CST}.. {-144702000 -14400 1 CDT}.. {-134251200 -18000 0 CST}.. {-113425200 -14400 1 CDT}.. {-102542400 -18000 0 CST}.. {-86295600 -14400 1 CDT}.. {-72907200 -18000 0 CST}.. {-54154800 -14400 1 CDT}.. {-41457600 -18000 0 CST}.. {-21495600 -14400 1 CDT}.. {-5774400 -18000 0 CST}.. {9954000 -14400 1 CDT}.. {25675200 -18000 0 CST}.. {41403600 -14400 1 CDT}.. {57729600 -18000 0 CST}.. {73458000 -14400 1 CD
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):616
                                                    Entropy (8bit):4.348926042114513
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290e2mdH5NCtXwl3UXbTMmxL+voudQCvX70qKOV9kYNv:5Ie5k9WUuwuz/Vyu
                                                    MD5:A2192F251D5A62466AF87B90E0EC5ECF
                                                    SHA1:F86DEC1E79FA877F50DAC1B06FEA870D3C9AA741
                                                    SHA-256:7391A186F8DE1FDD5A61B3887E65DCDB4A2186BFD36BBFFB464B63D9775E922A
                                                    SHA-512:AF3E5C13397C315FA7CB7EDB97510283900414A1B9A25EC9C91115D5F80267162FDD2220D8E49D57561A4B331D70706BC0A37E8BFF0D8922CD344E3A1BCCECA5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Hermosillo) {.. {-9223372036854775808 -26632 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {915174000 -25200 0 MST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7230
                                                    Entropy (8bit):3.882344472808608
                                                    Encrypted:false
                                                    SSDEEP:96:nys0KHK1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:nyBKHkN0HY2iUmUFLqU
                                                    MD5:7824B3F2D20F16A9DCC8E0F7DC45C1B8
                                                    SHA1:77014A0502DA1342EFA41B64C5613839B627354B
                                                    SHA-256:4B114545167326F066AB3A798180896B43AC6FDC3B80D32BCC917B5A4A2359EB
                                                    SHA-512:03F6A18C03E79E9177D16CD7AB75AC117197638370FA675BC2854A5A563021F865F3F0672B237B83098787AB9D419AC33D67F28324B1E25AD8560B5838F70807
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Indianapolis) {.. {-9223372036854775808 -20678 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-900259200 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8755
                                                    Entropy (8bit):3.8394539560522585
                                                    Encrypted:false
                                                    SSDEEP:96:+q2KeNrdJ8SvAgahLi8hDlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:+FKUdJ8SvPaUqbA604qSBgI7DBch
                                                    MD5:8AF080A022DA0737E94742C50EAAC62E
                                                    SHA1:704F0565B53AA8A20F70B79A7958D4D07085E07A
                                                    SHA-256:F1253F5F3F5AACD1A5E1F4636DD4E083F4B2A8BD995CF3E684CDD384641849F1
                                                    SHA-512:26AAF6D24B2E2B60451E19A514533DFAEC74F01F9B1AEB9F86690669C14130D77AE1CBFB9FC9091E1CD1FC1CBC2799BB05026DB68768C3CCB960355C18D111ED
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Knox) {.. {-9223372036854775808 -20790 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-725824800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-447267600 -21600 0 CST}.. {-431539200 -18000 1 CDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7273
                                                    Entropy (8bit):3.8700915866109535
                                                    Encrypted:false
                                                    SSDEEP:96:7qvrv7+X1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:7Kv7+bN0HY2iUmUFLqU
                                                    MD5:C1A10440E6CCE4C5052E2510182D9AA7
                                                    SHA1:56D4F3CCA1245D626BADA74CF3F6BAE8034BF58D
                                                    SHA-256:675162381639598E7100E90663D42780F8EE1CB62BD6DA5B948B494F98C02FE3
                                                    SHA-512:96B71472AD38ECFC589F935D9F5F1C8D42C8E942D8772FB6A77F9B9C0E2BD7A07FA61729E57EC02356121518E33797A784679F8DED2FCA3FC79F5C114783DD57
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Marengo) {.. {-9223372036854775808 -20723 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-599594400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7611
                                                    Entropy (8bit):3.87971256165061
                                                    Encrypted:false
                                                    SSDEEP:96:TqervJ8SUklggahyBRP0HY2iU7KKdFL6Aa2K4gSLf8e:TpvJ8SUklvaQN0HY2iUmUFLqU
                                                    MD5:A86042668CD478AFFC05D3383EDEE8FF
                                                    SHA1:6476526F94A247C0ECF3B2813F2C5A4FB93E457E
                                                    SHA-256:23B8FA75CE0A9555DFD84549723A12679FF7FC5FAA58E4B745BA3C547071FF53
                                                    SHA-512:07A5487A087108E6D6E88580865885CA6243EF04BE8263FC913F38CADB8EA016386E8BBAD39F65FD081F1A2F14316FEAF008855E9CF2019B169D9511916AFF67
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Petersburg) {.. {-9223372036854775808 -20947 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-473364000 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 1 CD
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7100
                                                    Entropy (8bit):3.8613085681914607
                                                    Encrypted:false
                                                    SSDEEP:96:yqxrvJ8SUklLgzNA604qSScBgN+4ctDzIVQ/c/3hNxTh:yUvJ8SUkl8BA604qSBgI7DBch
                                                    MD5:E7FE9B7CFBC6505C446056967DEBC87B
                                                    SHA1:81ADAD89F040F62E87D2F26D1D98B3E52710F695
                                                    SHA-256:D368123DB703B55244700876906775837D408C274C5A5801D80B77EADB6D5853
                                                    SHA-512:9C0746DE18C80B548AA443D59BB9971BDC304975717C5FCDEBDE72828ACF408FA1D687F87C42E7B8D6D0284C9F792EA236BF79C815947BE773D07364B630AC99
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Tell_City) {.. {-9223372036854775808 -20823 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 0 EST
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6563
                                                    Entropy (8bit):3.866646181493734
                                                    Encrypted:false
                                                    SSDEEP:96:juqv01BRP0HY2iU7KKdFL6Aa2K4gSLf8e:CoKN0HY2iUmUFLqU
                                                    MD5:2CCFC3980C321ED8A852759C0BCCB12C
                                                    SHA1:A8BFE02E4E71B28EF8E284E808F6EDE7C231F8FF
                                                    SHA-256:0623233AA39A1A82038A56DF255ADF49E648777375B8499491C8897EBEA1CDF1
                                                    SHA-512:A4C77689BC9BF871C756D05BAC4157F0FD324D10AC7D15F3543344C6F8C7FC9218AB7ADFBCE70C8ECCDD6EC15FD7960503FC7A8223FECE6D4227BF0BB04190C7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vevay) {.. {-9223372036854775808 -20416 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-495043200 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {94712400 -18000 0 EST}.. {1136091600 -18000 0 EST}.. {1143961200 -14400 1 EDT}.. {1162101600 -18000 0 EST}.. {1173596400 -14400 1 EDT}.. {1194156000 -18000 0 EST}.. {1205046000 -14400 1 EDT}.. {1225605600 -18000 0 EST}.. {1236495600 -14400 1 EDT}.. {1257055200 -18000 0 EST}.. {1268550000 -144
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7226
                                                    Entropy (8bit):3.879195938909716
                                                    Encrypted:false
                                                    SSDEEP:96:Vq8rdJ5UklpRBRP0HY2iU7KKdFL6Aa2K4gSLf8e:VbdJ5Uklp/N0HY2iUmUFLqU
                                                    MD5:56D1930F5FAE2456DEC6C9AB1B0233E1
                                                    SHA1:F6ED52EF769DF2C015C181BCFF3DC0E24497C768
                                                    SHA-256:B8452B6AA739A78AC6D03806463B03D4175639593E19FAA3CA4B0D0FB77F18C9
                                                    SHA-512:AFCFF383DB441DA9154B639A88700D0604F487A20E830146B14061E485A991AD8DC279AF8C0C2329265CF14C901207B9058157FAA1C039082EB7630916834156
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vincennes) {.. {-9223372036854775808 -21007 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-289414800 -21600 0 CST}.. {-273686400 -18000 1 CDT
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7410
                                                    Entropy (8bit):3.8775722319777968
                                                    Encrypted:false
                                                    SSDEEP:96:uq0KeKrv7c1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:unKxv7yN0HY2iUmUFLqU
                                                    MD5:880526DC23E7BDB00506D7EC2A885907
                                                    SHA1:DB3B13A2A4BF80E7B71C7F0604A0A80EF070B9BA
                                                    SHA-256:4B293FDB7680C4597B8C885333719214492ECF09BD5EA342D1EC15F2BF9C8605
                                                    SHA-512:42EEDC5EA28781D62A457F4843F38D0A3FEFCAD83BA01B07CEF0FA169C6440960E04BABD272C5E9AF2F4B0DBB2A786EF9221A48F084F16752E6D0EA66C31911E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Winamac) {.. {-9223372036854775808 -20785 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):233
                                                    Entropy (8bit):4.7047837427916095
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/2903GfJ4903GK8:MByMY3GK7Kp3GKnt2903GfJ4903GK8
                                                    MD5:DEE404D54FD707C4A27F464B5F19D135
                                                    SHA1:AD95D04738F6B15A93DED1DE6B5FA9F47C8E38CB
                                                    SHA-256:437DA148B94DBA4CEA402169878541DB9C3419ABAB6750D1C36625DD3053019E
                                                    SHA-512:421D6AF30F0C64EA6CB9F9DC4E7EF9E8EE5945F81A5E82A6D959D32AD69F325770DB6A07D8F52EFE7EE7F6C3AD4E1F34AA30A6B5E006C928119A54E746D6FE6B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Indianapolis) $TZData(:America/Indiana/Indianapolis)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7638
                                                    Entropy (8bit):3.8629745113156004
                                                    Encrypted:false
                                                    SSDEEP:96:/nGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/GPlLv/PCenJzS6cy
                                                    MD5:DBF9C2CCF786A593C9D6E4F4BB37ACE9
                                                    SHA1:4D2332A530A36E6DB2802DD9FA2DAF5C0594D5EA
                                                    SHA-256:5A1F7F5EDAD0251B73C33E7B5DDEE194646E9D3992B169DC1A64D155765D472C
                                                    SHA-512:70D75371497CED3B6C731C95299CDD5F8F49C3C6EEDDF31EB05D008769D76ACFE8BFA9A2ECE45BD0BA2E279BBEF65945955791EFC04A569F5CAA13665CD2545F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Inuvik) {.. {-9223372036854775808 0 0 -00}.. {-536457600 -28800 0 PST}.. {-147888000 -21600 1 PDDT}.. {-131558400 -28800 0 PST}.. {315558000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}.. {671014800 -21600 1 MDT}.. {688550400 -25200 0 MST}.. {702464400 -21600 1 MDT}.. {7200000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7671
                                                    Entropy (8bit):3.832645570123566
                                                    Encrypted:false
                                                    SSDEEP:96:7FE5Ct/cQ1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:7FEct/N0HY2iUmUFLqU
                                                    MD5:8020712BBA127EA8AB52E8F5DB14286E
                                                    SHA1:DAEBC76FE10770D3FC2B5E1C14823B2B5543BA35
                                                    SHA-256:AFC4627879F4A618F5E3BA9EA123F3212E161F4CCFD0DF46F3B6B7CD2E2C0D7E
                                                    SHA-512:2F5C63F427A5DEDD5BF2B3867BE4C13774E9276C1472BF4170BCB2DA462B848CC8088743D032765133EE138388DF4217E4FC1475B12D2C8AF657A45ED6FEDE93
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Iqaluit) {.. {-9223372036854775808 0 0 -00}.. {-865296000 -14400 0 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-147898800 -10800 1 EDDT}.. {-131569200 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600 -14400 1 EDT}.. {499240800 -18000 0 EST}.. {514969200 -14400 1 EDT}.. {530690400 -18000 0 EST}.. {544604400 -14400 1 EDT}.. {562140000 -18000 0 EST}.. {576054000 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607503600 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638953200 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671007600 -14400 1 EDT}.. {688543200 -18000 0 EST}.. {7024
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):847
                                                    Entropy (8bit):4.206296468996689
                                                    Encrypted:false
                                                    SSDEEP:24:5seRvZGjFS/uk1p/uue/udYR/u+zN5hi/uW9/uoUF0/u8Bb/u33RU/uMZ8/unuR3:5jUjFo1pFGzfAYFqB43RMER3
                                                    MD5:95B59E3EA2A270A34BDF98AA899203C8
                                                    SHA1:93599597797F4BAFE5C75179FB795058B1E3527D
                                                    SHA-256:4B9D5177CBA057CD53D53120A49B8A47ECCB00150018581A84851E9D5437D643
                                                    SHA-512:032BC07F9E92B756A0732AECC2DFEC4C89A58B3D6D3CA57A0F99F2AD1D51676804C7B6CE50EB3B37BB8A1EF382168AC83989D609D37C57308E29B51F1FDEFB1E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Jamaica) {.. {-9223372036854775808 -18430 0 LMT}.. {-2524503170 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {126248400 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {441781200 -18000 0 EST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):211
                                                    Entropy (8bit):4.94277888588308
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MI6HAIgp/MIwRN/290pPGe90/MIz:MByMY/Myp/M9Rt290h390/M4
                                                    MD5:E020D4F9CB1AF91D373CD9F3C2247428
                                                    SHA1:0ADF2E9F8D9F8641E066764BA1BAF068F0332CE9
                                                    SHA-256:4A0495852CD4D0652B82FB57024645916DB8F192EEF9A82AFD580D87F4D496ED
                                                    SHA-512:03190F0E7EC35A358670B1617CB5C17EA3DD41195B2C4B748479D80ABAB4DB395293F688D94B87662D0469F6C5885CF7E7C9A995493A191905753F740DF659E1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Jujuy)]} {.. LoadTimeZoneFile America/Argentina/Jujuy..}..set TZData(:America/Jujuy) $TZData(:America/Argentina/Jujuy)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8682
                                                    Entropy (8bit):3.9620285142779728
                                                    Encrypted:false
                                                    SSDEEP:96:/fCG0rHPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:/aG0rq9DiaJCUbPI+D/iMpCIBSuk
                                                    MD5:8160A0D27EECEF40F6F34A06D5D02BE6
                                                    SHA1:7CAA64F83BAA0C23EE05A72BB1079AA552FA2F3D
                                                    SHA-256:5FBE6A1FA2D3DFE23C7378E425F32BEBCA44735DA25EA075A7E5CE24BFD4049D
                                                    SHA-512:59B8D04595007B45E582E6D17734999074CA67A93F5DF742EFE1EB78DB8ABD359D4C3B213B678C6A46040A13AAB709A994B6A532D720D3EF6FCA2730ABF4885E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Juneau) {.. {-9223372036854775808 54139 0 LMT}.. {-3225223727 -32261 0 LMT}.. {-2188954939 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {309949
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9553
                                                    Entropy (8bit):3.853353361425414
                                                    Encrypted:false
                                                    SSDEEP:96:tfTwKdrdJ9+StCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:tfUKNdJ9+SItON0HY2iUmUFLqU
                                                    MD5:D721B38F1FFF1A6F5C02B72ECC06CDE5
                                                    SHA1:E70D99A9FC1DA9F30389129EE00FE20FA79D66A8
                                                    SHA-256:9EB1F2B19C44A55D6CC9FD1465BAF6535856941C067831E4B5E0494665014BF5
                                                    SHA-512:3C82A8C27026228F359FD96A4306F1BC337DE655FD1BA02C4399162E44DE59AD58CE569DA5AEA36E586C3BDEE7256420AABB84B44D277E244FE5AD771B4BE307
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Louisville) {.. {-9223372036854775808 -20582 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1546279200 -21600 0 CST}.. {-1535904000 -18000 1 CDT}.. {-1525280400 -21600 0 CST}.. {-905097600 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747251940 -18000 1 CDT}.. {-744224400 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8558
                                                    Entropy (8bit):3.869494272122571
                                                    Encrypted:false
                                                    SSDEEP:96:4F8qMahLi8hR1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:4F8HaUqJN0HY2iUmUFLqU
                                                    MD5:AED6497590DA305D16AC034979C8B1E9
                                                    SHA1:AD6F1788310A3A5A761873FEF1A32416B7DBCA89
                                                    SHA-256:1C6C7FB0AE628EB6BB305B51859C4E5594A6B0876C386ED9C1C3355E7CB37AE1
                                                    SHA-512:58D960AB5F2D9F8E4DD0171E5E36CE2E072F74A7AFDBC43F9340BBCF0CDC0D060AC895F9FCF551F4CC7EB6DBF2E9835C8C3D58E87CA4FBC98C720F51C462EDCD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Monticello) {.. {-9223372036854775808 -20364 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-63136800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.8670778268802195
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/2901iZ903GKT:MByMY3GKDp3GKIt290Q903GKT
                                                    MD5:50434016470AC512A8E2BEBA0BCEBC15
                                                    SHA1:F3541F6EE201FA33C66042F5C11A26434D37D42C
                                                    SHA-256:D66E77E6FF789D4D6CA13CDB204B977E1FE64BE9AFEE7B41F2C17ED8217FD025
                                                    SHA-512:EB1FF97050B7E067DCB68FF7C8F912C8A0C02144BB8E2EAA58C1136C6CC4A2B98C897DD23BB1E9C82D9AF6D028EE45227F97676CB34B6B830CDF5D707B990E57
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:America/Knox_IN) $TZData(:America/Indiana/Knox)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.9362668992592456
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2901Qv090ppv:MByMYbpwt290ev090b
                                                    MD5:FE9CEC6C50DF451B599B98AE8A434FF7
                                                    SHA1:60F997825766662B2C5415FBE4D65CEA6D326537
                                                    SHA-256:5AF9B28C48661FDC81762D249B716BA077F0A40ECF431D34A893BB7EABA57965
                                                    SHA-512:1311605021871BAFAF321AA48B352262C6BA42149101CCD4FDD4000435B2584AC564E0F76D481BB181767C010FD922BAA4E4EBB401AC2FF27B21874D89332872
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Kralendijk) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):218
                                                    Entropy (8bit):4.902526230255025
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/290WDm2OHphvoHvKZdcyFXmBVVON:MB86290ymdHphvCvKfcyy/ON
                                                    MD5:3BC04900A19D0152A31B353C6715A97B
                                                    SHA1:58A6D49E0B6FA00CBEAFD695D604D740AD63C54E
                                                    SHA-256:5488D98AA3C29D710C6AF92C42ACE36550A5BFF78C155CDF8769EE31F71CF033
                                                    SHA-512:65302935090F98A81443A1E1158911F57C3A1564564CD401CA72DDBF66D967DB564EF5AE8A4083D83984B9EF55AB53159010EFE2DB5D7A723F7EA61A1795322D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/La_Paz) {.. {-9223372036854775808 -16356 0 LMT}.. {-2524505244 -16356 0 CMT}.. {-1205954844 -12756 1 BST}.. {-1192307244 -14400 0 -04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):460
                                                    Entropy (8bit):4.2444415392593875
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290B2mdH4VCvvCOt/Os/OCQXR/uFfC3/O3e/uFbs/OX/OqF/O+8/OOS1F5/D:59etvqOVLOR/uGD/utsg38xSP5r
                                                    MD5:5F41E848D2DDE91261F45CB577B1B0A9
                                                    SHA1:DF284499CF57479ADE5E1D3DC01D6DCCF6AFDFE1
                                                    SHA-256:6E01002F264DF9A6FC247F95399F4F42DCCC7AB890B0C259DE93DCC97DEC89CE
                                                    SHA-512:2F5472F812734E892182632B8A34A4AD7B342541D0C3F1107BD95FFBE25D9351A0CDF5F58F35A1F37365DDF8A8A5D883C89C3CC40A9AD09D54CA152DC6BE1A09
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Lima) {.. {-9223372036854775808 -18492 0 LMT}.. {-2524503108 -18516 0 LMT}.. {-1938538284 -14400 0 -05}.. {-1002052800 -18000 0 -05}.. {-986756400 -14400 1 -05}.. {-971035200 -18000 0 -05}.. {-955306800 -14400 1 -05}.. {-939585600 -18000 0 -05}.. {512712000 -18000 0 -05}.. {544248000 -18000 0 -05}.. {638942400 -18000 0 -05}.. {765172800 -18000 0 -05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9726
                                                    Entropy (8bit):3.8515163794355916
                                                    Encrypted:false
                                                    SSDEEP:192:/uX68CWSgG0U9bFzN6IkWq/WHQt/RY4yP:/uX68CWSgGVbGBt/M
                                                    MD5:4D4F198238E4E76753411896239041C3
                                                    SHA1:AD41D199DF0B794B5AB7F165C8A141787FAAC9A9
                                                    SHA-256:DA3F7572F04E6AE78B8F044761E6F48D37EE259A9C1FE15A67072CC64A299FDB
                                                    SHA-512:BA39D174B73B1D4B09E8AC07291BED0B9658A4330AE50881080F0E37C35BD8A6F55C49F1D649ED1F19CE47002435D8724048759DFC813BF9C2E9B06B581486FF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Los_Angeles) {.. {-9223372036854775808 -28378 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-687967140 -25200 1 PDT}.. {-662655600 -28800 0 PST}.. {-620838000 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589388400 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557938800 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526489200 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):228
                                                    Entropy (8bit):4.911677030377383
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y71PiKp4o2HAIgp1PiKp4BvN/290hp4901PiKp44v:MByMYPyApPydt290P490Pyi
                                                    MD5:ACE87B25FE5604C83127A9F148A34C8C
                                                    SHA1:25C8D85B4740C53F40421D0DADCA95225EAB7829
                                                    SHA-256:F85C1253F4C1D3E85757D3DEA4FD3C61F1AA7BE6BAAE8CB8579278412905ACB2
                                                    SHA-512:AC0662B19F336474B146E06778E1FB43B941ABC8FD51BDB31B2640C94CCDFBE7659960EF4FD18329AFA7AD11316FC08D3CF33BB27931EA70AA7218667A8D0737
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Kentucky/Louisville)]} {.. LoadTimeZoneFile America/Kentucky/Louisville..}..set TZData(:America/Louisville) $TZData(:America/Kentucky/Louisville)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):207
                                                    Entropy (8bit):4.900350318979456
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290h48h490ppv:MByMYbpwt290/490b
                                                    MD5:83CE86174ADB5F276AABD26FE132BB55
                                                    SHA1:925E3F4A5DB1A2C33B3A537C8DBC9CFE309FA340
                                                    SHA-256:1E786229B84CE86DB6316B24C85F7CF4CFE66011F973053AD0E108BFCC9A9DE2
                                                    SHA-512:BA2AC5571D772B577735BC8E43FF8023228BC61A974DCCE0EAE20EC9B11FC757E56CABDAE00933A99834108114E598B7EC149BB017EB80BE18301A655F341A36
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Lower_Princes) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1539
                                                    Entropy (8bit):3.7453889877550512
                                                    Encrypted:false
                                                    SSDEEP:48:5QChlvEw6kSSx5H4a8tf3fkuoLdNYVZDNR8nd:OIlvEwJSSxdF8tfMuoLdNYVZJR8nd
                                                    MD5:EB0EDF4E075E3CF9F8EDF2B689C2FE54
                                                    SHA1:9713D7E8AA0E7164824657D00DE6C49483D2BD19
                                                    SHA-256:F65C5957D434A87324AAD35991E7666E426A20C40432540D9A3CB1EEE9141761
                                                    SHA-512:0A0D1E4E0BD7D854E8F139E6F7A9BBC66422B73F7A6C2E1F1B6D2CA400B24B3D220AB519B6AEAA743443E9A4B748709CDF2C276BF52C5382669B12734A469125
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Maceio) {.. {-9223372036854775808 -8572 0 LMT}.. {-1767217028 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):611
                                                    Entropy (8bit):4.303621439025158
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290znTjmdHOYCvprv5EU/dLAyW+/uF+kX8/uF+RZ//dAWcP/QAWcx/uF+rbE:5GnPeOdvhxD1pLS+S8S+RVqzo4xS+3SJ
                                                    MD5:FB09D1F064C30F9E223FA119A8875098
                                                    SHA1:C66173FEB21761AEA649301D77FBB77ACF3A6FB1
                                                    SHA-256:F0F0CCE8DE92D848A62B56EF48E01D763B80153C077230C435D464CF1733BA38
                                                    SHA-512:BC3D841FF48FD0DE7C9ABF5DAE3A42C876BD4D7FBD6684B4513EC7ECC92D938A7133BCC873AD46E453DD1863E843E5C7DD14FFDB41B593E90BEB5CD8F7E66202
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Managua) {.. {-9223372036854775808 -20708 0 LMT}.. {-2524500892 -20712 0 MMT}.. {-1121105688 -21600 0 CST}.. {105084000 -18000 0 EST}.. {161758800 -21600 0 CST}.. {290584800 -18000 1 CDT}.. {299134800 -21600 0 CST}.. {322034400 -18000 1 CDT}.. {330584400 -21600 0 CST}.. {694260000 -18000 0 EST}.. {717310800 -21600 0 CST}.. {725868000 -18000 0 EST}.. {852094800 -21600 0 CST}.. {1113112800 -18000 1 CDT}.. {1128229200 -21600 0 CST}.. {1146384000 -18000 1 CDT}.. {1159682400 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1166
                                                    Entropy (8bit):3.7842934576858482
                                                    Encrypted:false
                                                    SSDEEP:24:5GnqeKwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQz:5mSeSFESoSQSrSsCSeSPS1cSQSQlSsSQ
                                                    MD5:E42719A9B0165490BB9E0E899EFB3643
                                                    SHA1:2991D7EC31F47E32D2C8DB89A0F87D814122DD1B
                                                    SHA-256:DC54E6D4FE14458B0462FA0E15B960FD4290930ADC0D13453BF49B436ED8C143
                                                    SHA-512:F75024E27A2D679A667EA70EC948F983C7B823FDA5962DD88697D61147A6C2B1499E58BA8B01170653C4D025900491AE8E21925500DE39EACBAF883F7E62D874
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Manaus) {.. {-9223372036854775808 -14404 0 LMT}.. {-1767211196 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.900738604616686
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zzJ/90ppv:MByMYbpwt290zzN90b
                                                    MD5:8C60DE8E522FE5D51EACD643FD8EA132
                                                    SHA1:2E09A71DF340ECA6F7AEBD978070D56A627049EC
                                                    SHA-256:5C26D7CE93F91CC4F5ED87E9388B1B180EF9D84681044FD23CC01A628A1284CA
                                                    SHA-512:D2D522D041AFA638542F6FF00F5F40325E3F117C5035BA71F676B4956B054542C67A753055D17E2E2EEA925F13EACC0969D01EC18E40D274D8EA408F92777EA2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Marigot) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):251
                                                    Entropy (8bit):4.849143012086458
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/290zlEDm2OHfueoHv9dMIqR5lRfT/VVFUFkmR/lAov:MB86290zimdHfnCv9dMIqR5lVb/uFkmD
                                                    MD5:CFE10EE56115D3A5F44E047B3661D8ED
                                                    SHA1:03F598CFC9AEDE2F588339B439B2361F2EBDE34F
                                                    SHA-256:D411FB42798E93B106275EC0E054F8F3C4E9FB49431C656448739C7F20C46EDE
                                                    SHA-512:25D6760FDF2F1B0DD91A41D29BDB7048FAE27A03F7B9D9C955ECF4C32E8402836D007B39FE62B93E7BEA017681A0C8AFC1C4CAFD823B0A6C41EDAF09DDF3435D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Martinique) {.. {-9223372036854775808 -14660 0 LMT}.. {-2524506940 -14660 0 FFMT}.. {-1851537340 -14400 0 AST}.. {323841600 -10800 1 ADT}.. {338958000 -14400 0 AST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6745
                                                    Entropy (8bit):3.842851851460931
                                                    Encrypted:false
                                                    SSDEEP:96:nD5NA604qSScBgN+4ctDzIVQ/c/3hNxTh:nDbA604qSBgI7DBch
                                                    MD5:2CE5A1AA4D5AEC9B94FA980FAA0222AB
                                                    SHA1:40838538813002C9E69F8FD244E77D4C22CF654F
                                                    SHA-256:6738B94878D0CF4D88206858ABA03D18B0A2DE71D8F051B7D19C2C367DD59D79
                                                    SHA-512:C6097A3EEDB0E68F3FE9E97816AF76631D0239EF843DEBA87096D8DB6B0E9787FA3820062871A9B22F58833B7B36F51F25B738AD671A21665BE49EAD71CC17F6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Matamoros) {.. {-9223372036854775808 -24000 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6841
                                                    Entropy (8bit):3.872535525478649
                                                    Encrypted:false
                                                    SSDEEP:96:WNG1GK5+yBEzg4GaaECHm3FL5TInckNSNi:/5+yBEzVWEaOkv
                                                    MD5:CBCB4A9A77EE76C16C8EC9DDD3231ABC
                                                    SHA1:270B2C3C8F5A2EFD47E4DFA22521E36CEFD5A774
                                                    SHA-256:F1E4E853758A3D79013D5B24AE45FDFD41A7C110949A5C5DB96CF14B479FA741
                                                    SHA-512:F64FFDA679E360E50C95DFA45CE866E51DC87B440E984CCABDD57E2C1C3F2FAD44256AE44FAA84E0F577B22CD1A80F891E14BF811D6D83ADA9B19DE32692175F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mazatlan) {.. {-9223372036854775808 -25540 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -2520
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):219
                                                    Entropy (8bit):4.812188311941308
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MeHAIgp/MSvYovN/290zpH+90/MX:MByMY/M/p/MSA6t290zpe90/MX
                                                    MD5:2A3BFEEFBB684FB3B420A6B53B588BDC
                                                    SHA1:CC5C0BB90D847CCBB45688A8DA460AD575D64617
                                                    SHA-256:D6B308A1619F2DE450DACBFEF0E11B237DF7375A80C90899DD02B827688CB4B8
                                                    SHA-512:4A35C80D3454E039383FFEB06DC84933B3201BE2487C42A448AF3DA5ABAEEB9882263C011CDD3194E121EC1C31FC80120BF7829F280A79996E376CFA828EE215
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Mendoza)]} {.. LoadTimeZoneFile America/Argentina/Mendoza..}..set TZData(:America/Mendoza) $TZData(:America/Argentina/Mendoza)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8410
                                                    Entropy (8bit):3.8311875423131534
                                                    Encrypted:false
                                                    SSDEEP:96:6quShLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:6lSUqtfA604qSBgI7DBch
                                                    MD5:C74D31382279219F805D2B138C58FBF7
                                                    SHA1:06E2FED0A3BDF62F3D390A4054B6A2D7C1863DD3
                                                    SHA-256:B0863F8B66F0848020651B69E7997307D62209259AE653FDC1A0FAFC8E793068
                                                    SHA-512:7B42CBDC119651E2B2EE8B8F934801D3147A8B72EE060A0D0EA1C0C12CA9ABD03F1A102A85BF8E7424B45620151CE107D16A9173F4AA7597EDB3109840C1B2AE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Menominee) {.. {-9223372036854775808 -21027 0 LMT}.. {-2659759773 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-116438400 -18000 1 CDT}.. {-100112400 -21600 0 CST}.. {-21484800 -18000 0 EST}.. {104914800 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -2160
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6651
                                                    Entropy (8bit):3.8421369120684714
                                                    Encrypted:false
                                                    SSDEEP:48:5bu36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAqy6:1qehpYtpjyrz7nKED4KPddGEYA/Gx
                                                    MD5:BEA04423DB05D122622807857EFD2B36
                                                    SHA1:EE2A2AB89DFFFE2880801E8667AF2AD627E641EC
                                                    SHA-256:2B4FACFC69A195C646842A8B47AFE76D755CEEDAD536DEE7ECE79302BAF97223
                                                    SHA-512:D860332F4A50F886600E9DCF3F0ACA6CC6FAD1421ECCAF0E67D0CB76F5FBFA1DC0F243F0B312A3CFB0614BD76C6A76C45E5C6F582073B23FEC4B72E77950E2EC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Merida) {.. {-9223372036854775808 -21508 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {407653200 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6705
                                                    Entropy (8bit):3.985641709481311
                                                    Encrypted:false
                                                    SSDEEP:96:4DCG0haiaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:42G0IiaJCUbPI+D/iMpCIBSuk
                                                    MD5:4999FE49C1640402CB432BC1EB667479
                                                    SHA1:2ED0044927A66856090793ED6E5FF634617C8C40
                                                    SHA-256:2574831391092AD44D7B2806EEF30D59CE3BAE872111917DD39EC51EFDD62E5F
                                                    SHA-512:39DE1D24037F3FFA3101BBAA885939074E596479F68013CDA9CE53A061EA704F63FB55C15B68B66B0E29E3F07ADC0BDC2D78A2D289277E75D2EF95F54988DB74
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Metlakatla) {.. {-9223372036854775808 54822 0 LMT}.. {-3225223727 -31578 0 LMT}.. {-2188955622 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {30
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7035
                                                    Entropy (8bit):3.8457960083650584
                                                    Encrypted:false
                                                    SSDEEP:48:5CBU/UI+n36fELf5On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10B:EBNqehpYtpjyrz7nKED4KPddGEYA/Gx
                                                    MD5:8688CD1F2C071314E56666D70DAD8261
                                                    SHA1:32F9C882D148BB9568F719099B3DCE25B53FB43C
                                                    SHA-256:3458EAF721C1CDF565B5ADDB487B4F1B93FA46744E9E5FC91D74787173B233A4
                                                    SHA-512:02A110943B2458DA20BC6D2568B19819B4831DAAD6968EC9D1A523DD81D5499AB21630F865C9CF70AEBE54D39CE72A0F833B91492E694F3117E32E06432F30DB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mexico_City) {.. {-9223372036854775808 -23796 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-975261600 -18000 1 CDT}.. {-963169200 -21600 0 CST}.. {-917114400 -18000 1 CDT}.. {-907354800 -21600 0 CST}.. {-821901600 -18000 1 CWT}.. {-810068400 -21600 0 CST}.. {-627501600 -18000 1 CDT}.. {-612990000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001836800 -21600 0 CST}.. {1014184800 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {10357020
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7080
                                                    Entropy (8bit):3.5379714312244217
                                                    Encrypted:false
                                                    SSDEEP:192:2UViR+iORv7bw1aW5AnMyxH5e+fHbxMfOp6D7bF8qMmqyiqV1mjZe7JhlgXY7FWN:02l5qJZS
                                                    MD5:C68889AA813C399939FCFA54E9CE0DFB
                                                    SHA1:F3D58D7BEFF2D1CB94FECE00C31FEF5BDF58C231
                                                    SHA-256:1B131AC968F95652667BD7EB1F6D667C8F679B31270D82B4B4271E787386CCCA
                                                    SHA-512:EBAF8210919E34668E9DDFCB546E5A62F35954957AAE956B6302BF296C7D4CF51E1B10FB13217CB3EEB430DAC246217EB4E9250CB4109C95D8A4367457D02771
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Miquelon) {.. {-9223372036854775808 -13480 0 LMT}.. {-1850328920 -14400 0 AST}.. {326001600 -10800 0 -03}.. {536468400 -10800 0 -02}.. {544597200 -7200 1 -02}.. {562132800 -10800 0 -02}.. {576046800 -7200 1 -02}.. {594187200 -10800 0 -02}.. {607496400 -7200 1 -02}.. {625636800 -10800 0 -02}.. {638946000 -7200 1 -02}.. {657086400 -10800 0 -02}.. {671000400 -7200 1 -02}.. {688536000 -10800 0 -02}.. {702450000 -7200 1 -02}.. {719985600 -10800 0 -02}.. {733899600 -7200 1 -02}.. {752040000 -10800 0 -02}.. {765349200 -7200 1 -02}.. {783489600 -10800 0 -02}.. {796798800 -7200 1 -02}.. {814939200 -10800 0 -02}.. {828853200 -7200 1 -02}.. {846388800 -10800 0 -02}.. {860302800 -7200 1 -02}.. {877838400 -10800 0 -02}.. {891752400 -7200 1 -02}.. {909288000 -10800 0 -02}.. {923202000 -7200 1 -02}.. {941342400 -10800 0 -02}.. {954651600 -7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10507
                                                    Entropy (8bit):3.8204583916930557
                                                    Encrypted:false
                                                    SSDEEP:192:X9+FPHyXFRsivcQYM+T7Z/xVQzxmtBWIXrObx29x8sLxcGMe++wzlrfFjxKvnpNM:gF6L0d0F2TzNc/1cYUH+CC
                                                    MD5:80B88F57B837CD2478815796618A6AC6
                                                    SHA1:CC2BE0213E9F0D3B307A8311D7A1013582E8A338
                                                    SHA-256:D977D045DE5CDAEB41189B91963E03EF845CA4B45E496649B4CB541EE1B5DD22
                                                    SHA-512:9410CBD706CAABFFF88DFF75235597D844B45A061EBD796F6708D7CEAB680273571A17935B7CCFC7C466ABF293C286D0886F47880E692F74C4E8BFB41729C73C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Moncton) {.. {-9223372036854775808 -15548 0 LMT}.. {-2715882052 -18000 0 EST}.. {-2131642800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1167595200 -14400 0 AST}.. {-1153681200 -10800 1 ADT}.. {-1145822400 -14400 0 AST}.. {-1122231600 -10800 1 ADT}.. {-1114372800 -14400 0 AST}.. {-1090782000 -10800 1 ADT}.. {-1082923200 -14400 0 AST}.. {-1059332400 -10800 1 ADT}.. {-1051473600 -14400 0 AST}.. {-1027882800 -10800 1 ADT}.. {-1020024000 -14400 0 AST}.. {-996433200 -10800 1 ADT}.. {-988574400 -14400 0 AST}.. {-965674800 -10800 1 ADT}.. {-955396800 -14400 0 AST}.. {-934743600 -10800 1 ADT}.. {-923947200 -14400 0 AST}.. {-904503600 -10800 1 ADT}.. {-891892800 -14400 0 AST}.. {-883598400 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6714
                                                    Entropy (8bit):3.843663571428462
                                                    Encrypted:false
                                                    SSDEEP:48:5JZKy36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAO:XwDqehpYtpjyrz7nKED4KPddGEYA/Gx
                                                    MD5:7BAF644224F6045B791D64A3AA41B515
                                                    SHA1:FCB940F91B8A7AE599433460C27953890FA38F27
                                                    SHA-256:63813975BC90A2AE8A6500D7A3173A3C81C060F8B5AAA3E86D5FDC4D5F06ABD8
                                                    SHA-512:F2DD85E8F1875274A6ACD3B9F90869ABA0539CFD564DC7DEA490AE3B7DC66B83D6F76EC3F1389FD3DFC111E5A198B7AB9AEE54CCE9A3B9C6871BE0DB211FEB76
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Monterrey) {.. {-9223372036854775808 -24076 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2936
                                                    Entropy (8bit):3.6410670126139046
                                                    Encrypted:false
                                                    SSDEEP:48:5JgQkS4SaEcSyS0sZSUS2kSVSXSulSASX5kAXJMsCXrUari3akaWCa3M+lafpI6L:X5kH4c9GT0E01jm5keJMRXrUEi3akaWO
                                                    MD5:D78DEBC7C0B15B31635DDC34C49248BC
                                                    SHA1:DB2FF76DB3A79BE52E2DFD4C7B8B6592946772F9
                                                    SHA-256:214F97A3BCB2378CCE23D280EA6A3B691604F82E383628F666BE585BB8494932
                                                    SHA-512:E5FCD0B54F61910E70B1D0EE9911C5B4AFF850F16B651A01D69A63A97880913B0BAB99B0D864C4E613594734FA72CCA0E9607B1ADB6E75957C790990114FD0A4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Montevideo) {.. {-9223372036854775808 -13491 0 LMT}.. {-1942690509 -13491 0 MMT}.. {-1567455309 -14400 0 -04}.. {-1459627200 -10800 0 -0330}.. {-1443819600 -12600 0 -0330}.. {-1428006600 -10800 1 -0330}.. {-1412283600 -12600 0 -0330}.. {-1396470600 -10800 1 -0330}.. {-1380747600 -12600 0 -0330}.. {-1141590600 -10800 1 -0330}.. {-1128286800 -12600 0 -0330}.. {-1110141000 -10800 1 -0330}.. {-1096837200 -12600 0 -0330}.. {-1078691400 -10800 1 -0330}.. {-1065387600 -12600 0 -0330}.. {-1047241800 -10800 1 -0330}.. {-1033938000 -12600 0 -0330}.. {-1015187400 -10800 1 -0330}.. {-1002488400 -12600 0 -0330}.. {-983737800 -10800 1 -0330}.. {-971038800 -12600 0 -0330}.. {-954707400 -10800 1 -0330}.. {-938984400 -12600 0 -0330}.. {-920838600 -10800 1 -0330}.. {-907534800 -12600 0 -0330}.. {-896819400 -10800 1 -0330}.. {-853621200 -9000 0 -03}.. {-84
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.748877320903638
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEzQ21h4IAcH:SlSWB9vsM3y7RQtHAIgpRQPN/290zQgp
                                                    MD5:9130CD86BD6417DB877BF9D8F3080CE1
                                                    SHA1:76C37982C37FE54ED539AC14B5A513817E42937C
                                                    SHA-256:97F48948EF5108FE1F42D548EA47C88D4B51BF1896EE92634C7ED55555B06DBD
                                                    SHA-512:EE036350AF95414392BD93DFF528F67D9A93EB192A30056ECBC3D2396AB4B2938B3C096C3EC2BC739294D4C4B7261C427B0AAEB9559F5381CB7F375892781820
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Montreal) $TZData(:America/Toronto)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.878534808314885
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zQ1HK90ppv:MByMYbpwt290zQ490b
                                                    MD5:CB5988A2508285B42C2BD487B8F9D6E1
                                                    SHA1:EAD740A566245B682CE5E284D389DFAE66DF05D9
                                                    SHA-256:6C3EE46983A3DAA91C9ADF4B18D6B4B80F1505B0057569B66D5B465D4C09B9C1
                                                    SHA-512:48796213A67F0E3BC56B54CE4D8BE098E74BA5808C9A1082D9381CB729ADFA2ACB9CE9E39A3244B3901405761C97AEE28D44C3BF7239ECC71175C62E152029C4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Montserrat) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.785765433607229
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEwEzEeIAcGu:SlSWB9vsM3y7RQtHAIgpRQPN/290xzEf
                                                    MD5:F7DAD684104D917E0F29F6951EA627AC
                                                    SHA1:E57B5CA730D90C5865CF32FEC4872F71E033D21C
                                                    SHA-256:A889810B8BB42CD206D8F8961164AD03CCFBB1924D583075489F78AFA10EAF67
                                                    SHA-512:8284F2A357A32B2F5A211904F65E3B5C37B77C9BF38C85DFA0A95A73457F3076EC12F09BC767B4D0B8FC86BF69D01A17A7BF685BAB72F3E519A397D050DA0C3B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Nassau) $TZData(:America/Toronto)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11373
                                                    Entropy (8bit):3.8110553140357086
                                                    Encrypted:false
                                                    SSDEEP:96:HeohzORhK1a8phYvNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:+uORhK1a8phYloSItON0HY2iUmUFLqU
                                                    MD5:385C3BDD3E41E5E75CEF0658322B5CDE
                                                    SHA1:0334C21C8316ED2EE16FC98B1E8867D5E0916C00
                                                    SHA-256:7BA7DA179AA7DF26AC25E7ACCD9BD83784174445285A0D9CCBD7D6A9AA34F4BC
                                                    SHA-512:764B680FB8414B5AC8FB110247C19B1004A4453DD2BAC94BF3CFD80281FF3679A5B1D212238509165E022269503ED14A54B0EF73AF7014344752E6A627657D1F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/New_York) {.. {-9223372036854775808 -17762 0 LMT}.. {-2717650800 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-1577905200 -18000 0 EST}.. {-1570381200 -14400 1 EDT}.. {-1551636000 -18000 0 EST}.. {-1536512400 -14400 1 EDT}.. {-1523210400 -18000 0 EST}.. {-1504458000 -14400 1 EDT}.. {-1491760800 -18000 0 EST}.. {-1473008400 -14400 1 EDT}.. {-1459706400 -18000 0 EST}.. {-1441558800 -14400 1 EDT}.. {-1428256800 -18000 0 EST}.. {-1410109200 -14400 1 EDT}.. {-1396807200 -18000 0 EST}.. {-1378659600 -14400 1 EDT}.. {-1365357600 -18000 0 EST}.. {-1347210000 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-123895440
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8100
                                                    Entropy (8bit):3.8314265228376105
                                                    Encrypted:false
                                                    SSDEEP:96:xhZ8gEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:xAgEItON0HY2iUmUFLqU
                                                    MD5:54722EA33AAC411AA1D51D5E00423937
                                                    SHA1:C6D1E5EAC6A72CCE738E465C8AA32CC76FD1DDC7
                                                    SHA-256:BB4BA3C15C626F6F94AC026A7C3D5DFE3854B17CBFA3F540FFAFFD9D5B491083
                                                    SHA-512:E66F7C2AEFB483526A7F11292B4F5E9C972DB12BAEF42110A45C49DCA5EA1DA2482A9FACA223D9F543F5ABE92CC54311ADA1852332DB184AE49CCFCED8D9405C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nipigon) {.. {-9223372036854775808 -21184 0 LMT}.. {-2366734016 -18000 0 EST}.. {-1632070800 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-923252400 -14400 1 EDT}.. {-880218000 -14400 0 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {136364400 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {167814000 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8680
                                                    Entropy (8bit):3.965662913874442
                                                    Encrypted:false
                                                    SSDEEP:96:OrBvOs5vzC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:OrBvOsM9DiaJCUbPI+D/iMpCIBSuk
                                                    MD5:9A5F536932FED5A93E2C3DEB81960CD1
                                                    SHA1:8E78396D280DD3A9564CEFC7FB722437F3C4D003
                                                    SHA-256:8E971C9560CCE548B46626D072E62AB0F4C9682BF6A6ABFB4D0E8D63745402FE
                                                    SHA-512:60CFDBCE87F9CD7F27E071D66B97E60F62E56F413DC867BC809490B30D00045D0757710D6B5724148E2A28BD1E45FB662391820E6350D998002BF67B16776645
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nome) {.. {-9223372036854775808 46702 0 LMT}.. {-3225223727 -39698 0 LMT}.. {-2188947502 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1397
                                                    Entropy (8bit):3.78056049136398
                                                    Encrypted:false
                                                    SSDEEP:24:5TenykFxCFbF3YCFE2FBCFDFr9CFaFPBCFoF2CFTFKCFDuF1CF2F1CFWFhCFGF3a:5quY9EmFYBosNZNW/bWsBzgCccq7JYN9
                                                    MD5:B4F4530FCE4BF5690042A2DA40413D56
                                                    SHA1:52D5F2102485F5B326C888A287ED83CA18833BBC
                                                    SHA-256:9011C76295E6B17CC1973876B497BEE21B9E6562FB25DF66140F811A1FFA9765
                                                    SHA-512:08CAF75226D190D9FF0AA62AD84B13F1BF9047338A690847DF5B448BDB731A877F3E186298AFD704F4F4E133FF3F3128B098F9D90AE9A8E726AE52F84A7DA2E3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Noronha) {.. {-9223372036854775808 -7780 0 LMT}.. {-1767217820 -7200 0 -02}.. {-1206961200 -3600 1 -02}.. {-1191366000 -7200 0 -02}.. {-1175378400 -3600 1 -02}.. {-1159830000 -7200 0 -02}.. {-633823200 -3600 1 -02}.. {-622072800 -7200 0 -02}.. {-602287200 -3600 1 -02}.. {-591836400 -7200 0 -02}.. {-570751200 -3600 1 -02}.. {-560214000 -7200 0 -02}.. {-539128800 -3600 1 -02}.. {-531356400 -7200 0 -02}.. {-191368800 -3600 1 -02}.. {-184201200 -7200 0 -02}.. {-155167200 -3600 1 -02}.. {-150073200 -7200 0 -02}.. {-128901600 -3600 1 -02}.. {-121129200 -7200 0 -02}.. {-99957600 -3600 1 -02}.. {-89593200 -7200 0 -02}.. {-68421600 -3600 1 -02}.. {-57970800 -7200 0 -02}.. {499744800 -3600 1 -02}.. {511232400 -7200 0 -02}.. {530589600 -3600 1 -02}.. {540262800 -7200 0 -02}.. {562125600 -3600 1 -02}.. {571194000 -7200 0 -02}.. {592970400 -
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8557
                                                    Entropy (8bit):3.8810445182855253
                                                    Encrypted:false
                                                    SSDEEP:96:WEktwmGaLV911sF9A604qSScBgN+4ctDzIVQ/c/3hNxTh:WBwDPPA604qSBgI7DBch
                                                    MD5:10AF9E9461DD03DA4F0AF0595EB36E6C
                                                    SHA1:57AC9BDE3AC665E49D9D2463A4BFA38C053A4A54
                                                    SHA-256:D0D8B108453265B60F525A4EC04DE9555087CD6AC5DDBA980B3A96CF0FCD68D1
                                                    SHA-512:B6DC7D2709A19B911E086C988DB8346F42DBF7601D9E51E3093C6AF897570E43E5F1C101FE88BC5251F3DCC3B532DB22FFE8A12A4D0151BC52AF3E6DDEA7D23A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Beulah) {.. {-9223372036854775808 -24427 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8557
                                                    Entropy (8bit):3.867423227197841
                                                    Encrypted:false
                                                    SSDEEP:96:ZEktwmGaLV9tZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:ZBwD6fA604qSBgI7DBch
                                                    MD5:33C03AD65753D7ADB45FC4899B504D1A
                                                    SHA1:ED719BB67A64DB49901BA38A945A6BA998646B8D
                                                    SHA-256:ABC2B6C97D9E9FBA37AC582ADBA2CE996890D090060E083405D75CDAED9EABE0
                                                    SHA-512:69592E8A370C8A5173827500CDDF8190AB44EA87CD7E0C416055CB7958B13A737801EA6B0FFE6032CB3F14F05001BF9DA83E4AEB20F385019B2985ECE7ACB40E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Center) {.. {-9223372036854775808 -24312 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8560
                                                    Entropy (8bit):3.879452555978431
                                                    Encrypted:false
                                                    SSDEEP:96:GEktwmGaLV9nlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:GBwD2fA604qSBgI7DBch
                                                    MD5:3D3DC12209293086FD843738A4FE87FB
                                                    SHA1:8103DFA18B5F3F36AF0B53FA350E0F2D300E6289
                                                    SHA-256:8803FF7C81C933B57178B9D3C502FB4268D9AA594A3C638A7F17AF60B12D300D
                                                    SHA-512:39BB939780A71B817F82D2B7F56815D33926D150525161051A9950E5A98BA9184670AFC884A1C69D56EADBD6198E3082975448EFBA5FE8A336DB071E6BAB8EF2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/New_Salem) {.. {-9223372036854775808 -24339 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -2160
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7429
                                                    Entropy (8bit):3.5470060859729253
                                                    Encrypted:false
                                                    SSDEEP:192:0ixKXpbzvZ+FxAqe12voJ0euJFNgIHc/QEeF5Z1V8tCSfifK3facfzQWWLQelXuC:0LRJq9LstgV
                                                    MD5:FC9CEA4B9654D0957F55CB0E1B25A3E7
                                                    SHA1:8BFC3E8CEC34C4087579D3DA727143E3EC045B77
                                                    SHA-256:12917DAAA60134BFE56E6979BB27B58A3F295C32BAE02B233E849BCED6B8BCA2
                                                    SHA-512:355628F2EFF86605653A1EE7D976CE8B3229A4169D35576F6007FABAB37DD280D8F296EE88BECE3D84D3A1C476F23275D1D77CAF157E9A98672CBF14801D7292
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nuuk) {.. {-9223372036854775808 -12416 0 LMT}.. {-1686083584 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -7200 1 -0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6843
                                                    Entropy (8bit):3.877923791759769
                                                    Encrypted:false
                                                    SSDEEP:48:5gUq33FS1YluOQiLvf3PCeq5r3xod8CzSP2IZ5Sy4DLbrc6HiviVN:So1c7Lv/PCewtA8CzSPyDLbrcUia
                                                    MD5:32BDE9C2C59F2A34D3B9F98BC9894A99
                                                    SHA1:04A24DC4A3C2A0D7C9C8E0001E320662778A78BF
                                                    SHA-256:549E92BDEC98D21C5C4A996F954671A2F0262463415BF294D122500246309BC4
                                                    SHA-512:A33E583EC5B2B274C4247C109F37F9A4495ED9094849F6A8E68145EBF6A1906B3DD0B31BB7690261FEDA9C72F2288F4D1121365F544B9EC1343E208B472D0660
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Ojinaga) {.. {-9223372036854775808 -25060 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -21
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.970379147398626
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGEu5YfMXGm2OHGf8xYoHv5BidhZvFsc1HRX1va0v:SlSWB9eg/290ZDm2OHDxYoHv5GhZd93p
                                                    MD5:AA408A43079EC8933DE271BE3DA2B502
                                                    SHA1:421A867DB3FD4779C5F759D0B657D8EB5FB2218B
                                                    SHA-256:990213DDE00ADCEB74C8D1ECAF81B9C77963E4AB1F35767F7349236FC8E917DF
                                                    SHA-512:1FB740527555A8E128E05709D05720A249BCBA4B6434D00226C07426E6283AA48973F75268F36E6044F0F0650E012781C8E5519B7EA916C625BBF018B29E9961
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Panama) {.. {-9223372036854775808 -19088 0 LMT}.. {-2524502512 -19176 0 CMT}.. {-1946918424 -18000 0 EST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7736
                                                    Entropy (8bit):3.8533019559841972
                                                    Encrypted:false
                                                    SSDEEP:192:tTqPm4bPJWXtRbALtuO/N0HY2iUmUFLqU:Izod
                                                    MD5:6BA298F9CEB6406802A01C13313F8EF1
                                                    SHA1:D77C113CFA927EF65461781FD080F590C8CFCBB9
                                                    SHA-256:1FB962ECC1E5F02E1001C70460FFF720B114554F9AA7956D6DA154DBEA87B4D7
                                                    SHA-512:C7F4E2DA503A3167098CFAB7AEC8D75A32D6B081E6777DE7BA3D6B4558D0C44D2CD8A0F1626968295031BABFD2CB96B031B4C00A44F2C554B5B217AE67E69EB4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Pangnirtung) {.. {-9223372036854775808 0 0 -00}.. {-1546300800 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-147902400 -7200 1 ADDT}.. {-131572800 -14400 0 AST}.. {325663200 -10800 1 ADT}.. {341384400 -14400 0 AST}.. {357112800 -10800 1 ADT}.. {372834000 -14400 0 AST}.. {388562400 -10800 1 ADT}.. {404888400 -14400 0 AST}.. {420012000 -10800 1 ADT}.. {436338000 -14400 0 AST}.. {452066400 -10800 1 ADT}.. {467787600 -14400 0 AST}.. {483516000 -10800 1 ADT}.. {499237200 -14400 0 AST}.. {514965600 -10800 1 ADT}.. {530686800 -14400 0 AST}.. {544600800 -10800 1 ADT}.. {562136400 -14400 0 AST}.. {576050400 -10800 1 ADT}.. {594190800 -14400 0 AST}.. {607500000 -10800 1 ADT}.. {625640400 -14400 0 AST}.. {638949600 -10800 1 ADT}.. {657090000 -14400 0 AST}.. {671004000 -10800 1 ADT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):253
                                                    Entropy (8bit):4.784405839512086
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/290olofDm2OHekeoHXFIV/1Vw/9vVOzFZg/VVFAKV:MB86290oloLmdHeVCXqV/k/9v4zW/OW
                                                    MD5:BFCE7E2618D6935031D6941AD6DDD8E3
                                                    SHA1:1953CD224FB2363B10372C0476760F3FB020CB00
                                                    SHA-256:B3EE44B3526BEDFC25B806371D3C465FDBD6CC647F30BF093750651E4A0C1BE4
                                                    SHA-512:31262DF034E084DA4CDB57B99178594C29129F61F3535E5D8245B8BB4AB6BF314307B0F5E58B74C349684CD761C9CDE44EB10407FB135BA6427D3D1E9DA99B40
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Paramaribo) {.. {-9223372036854775808 -13240 0 LMT}.. {-1861906760 -13252 0 PMT}.. {-1104524348 -13236 0 PMT}.. {-765317964 -12600 0 -0330}.. {465449400 -10800 0 -03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):496
                                                    Entropy (8bit):4.444598497301421
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290OXmdH514YCvb8o1W4S9xRvhhHRVxORBYUNv:5tekdvYP1x52yq
                                                    MD5:062ECA57C0B795780240CD7AFE70BDA0
                                                    SHA1:89D71A11DD8D4E000F7FADBDDC77C4C1DC1195F7
                                                    SHA-256:DFA0EC91804B789A1A7E1B1977710435D2589A5B54C1579C8E1F5BF96D2FD007
                                                    SHA-512:7D123AA872E0B8286A26E338AE0F8E0D7A6F0F2EA8B1EBEC6DBB59477C812985CB246AD397D0901A58FDB7FF14171CF60169DC15C538B95C58BD2D46106A7A4D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Phoenix) {.. {-9223372036854775808 -26898 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-820519140 -25200 0 MST}.. {-796841940 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-56221200 -25200 0 MST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6613
                                                    Entropy (8bit):3.8549788442269395
                                                    Encrypted:false
                                                    SSDEEP:48:5Ux+E2p3T6ZqrNSMEBPMcywh4NF5zCC7IOTWa1HW1241UWK9BDL+3XC4BMrS2LxP:KOfS0HY2iU7KKdFL6Aa2K4gSLf8e
                                                    MD5:A720323DF122C70C1530788DB24700BA
                                                    SHA1:20674BD7D84CC686ABBB5D6B36B520A5E9C813ED
                                                    SHA-256:A89C580899AD2FF8DF45A783BB90D501DC32C28B92931CA18ABD13453E76244B
                                                    SHA-512:02B71E537B9FDAF1B68E381F0007CCBBA53EB70719ED38F51B56C5BFA64C7E3D9797053C9DE3A920E5CAFA09BBC062FCED62B5D6B9213AFA8286B95DEDAB0532
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Port-au-Prince) {.. {-9223372036854775808 -17360 0 LMT}.. {-2524504240 -17340 0 PPMT}.. {-1670483460 -18000 0 EST}.. {421218000 -14400 1 EDT}.. {436334400 -18000 0 EST}.. {452062800 -14400 1 EDT}.. {467784000 -18000 0 EST}.. {483512400 -14400 1 EDT}.. {499233600 -18000 0 EST}.. {514962000 -14400 1 EDT}.. {530683200 -18000 0 EST}.. {546411600 -14400 1 EDT}.. {562132800 -18000 0 EST}.. {576050400 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607500000 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638949600 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671004000 -14400 1 EDT}.. {688543200 -18000 0 EST}.. {702453600 -14400 1 EDT}.. {719992800 -18000 0 EST}.. {733903200 -14400 1 EDT}.. {752047200 -18000 0 EST}.. {765352800 -14400 1 EDT}.. {783496800 -18000 0 EST}.. {796802400 -14400 1 EDT}.. {814946400 -18000 0 EST}.. {828856800 -14400 1 EDT}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):207
                                                    Entropy (8bit):4.919510214047913
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290e7490ppv:MByMYbpwt290190b
                                                    MD5:4AB394CB233B101627136EB5E070CF9B
                                                    SHA1:F00600CD2DB10FE157C3696F665B9759EEA85F99
                                                    SHA-256:A4952380C89A6903FFE5BF8707B94B1BB72568FFD03DB04BF4D98E38AC82EEB7
                                                    SHA-512:58F4AD08FA10F1884FA641C4EA778C0FC013EABBD68DF5DE04D5B301227396260C3D669DB33DD6A6B33F1550C24BBD7777D756DF0D61CEEAF5EC6541EDFA296C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Port_of_Spain) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.866417687745155
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/290msh490th4:MByMYdIp7t290v490I
                                                    MD5:6B570E79FA2AA7D6CB1E56A11EE0A37C
                                                    SHA1:396A2C9BBE4F264DD5A4F2E44D3E63C57F52186B
                                                    SHA-256:52921EEA2A1925DF06CEA4638ED4128FAAA8FBA40ED4E0741650B419E5152DCB
                                                    SHA-512:FA75A179664BED02A0F5BC1B7C3DD5F3E986544A151634BA4C4401476F5999714C89E240D9AF805484D1BEC04A1A562157FAEECA1603C4FF8CFFB424B9DEB560
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:America/Porto_Acre) $TZData(:America/Rio_Branco)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1051
                                                    Entropy (8bit):3.851275104153641
                                                    Encrypted:false
                                                    SSDEEP:24:5Xe4QJnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/8:5kSeSFESoSQSrSsCSeSPS1cSQSQlSsSX
                                                    MD5:03046BA6F8344C32AD7A22748DC871AB
                                                    SHA1:AB9ED078D80AE99EF6DE4BF34AC45359B82D1284
                                                    SHA-256:E6E6F6753E7D443052A64D4DB07B8D443CE13A573946E7D0A19CDD4BBA4A2F04
                                                    SHA-512:620953BB4C8CF203262EC0C1F807543D24B9894C3B531AE57F7CEF630452CC9AC7CA41D43A6D8891F9CF17594E9EE34CF501F8508E7C0669A8E5EF9C70B6EAA3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Porto_Velho) {.. {-9223372036854775808 -15336 0 LMT}.. {-1767210264 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {5712012
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):283
                                                    Entropy (8bit):4.781646667761219
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/290piDm2OH9VoHvMlFoeVVF70ZVVFUFkzk/lLJpR/lAov:MB862908mdHvCvMlGe/J0Z/uFkzk/lL1
                                                    MD5:E2E2E0D6677FFF2E37BBFC3522F2A9AA
                                                    SHA1:4C1C93E14FBC00B8B1E78B8D9631599164305EB1
                                                    SHA-256:2981248A9F14EBFC8791EC5453170376CBD549557E495EA0E331CC18556C958E
                                                    SHA-512:F056B03EB9945823F5284C840E06E298DD2DE854F1555CD16D0BB19D962B73EF34A05683E6369B0D89CB7C3F7D082C312CCA6F8C6A0BB53F5C75FE4A863FCD95
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Puerto_Rico) {.. {-9223372036854775808 -15865 0 LMT}.. {-2233035335 -14400 0 AST}.. {-873057600 -10800 0 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3698
                                                    Entropy (8bit):3.6242875066986078
                                                    Encrypted:false
                                                    SSDEEP:96:22SW+xUQjzoMUBI0nuUoDKlHslPlgiot7JC/Xk8NWse4r4g5xCEmSdLkUsZOn+ZW:28+xUQjzoMUBI0nuUoDK6lPlgiot7JCV
                                                    MD5:11B8DD9FB854C62D7692EDD2445C6F90
                                                    SHA1:51F2ABF95D73CA21674D1AA1C5F50501F76A7F3D
                                                    SHA-256:22418567D55A0E38CAB005665271D9279A384856FDF0CE5A9AEABDCD66CCBC72
                                                    SHA-512:B657DE13FF71268ABA1790AED7D60CC1DA867434CE78421AD023BDECCC5E1BA9863952029E07FB577B57A3247FA9157B2C0AA9F894658B3F032CC36DDE701887
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Punta_Arenas) {.. {-9223372036854775808 -17020 0 LMT}.. {-2524504580 -16966 0 SMT}.. {-1892661434 -18000 0 -05}.. {-1688410800 -16966 0 SMT}.. {-1619205434 -14400 0 -04}.. {-1593806400 -16966 0 SMT}.. {-1335986234 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}.. {37767600 -14400 0 -04}.. {55915200 -10800 1 -04}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8104
                                                    Entropy (8bit):3.8351355650290304
                                                    Encrypted:false
                                                    SSDEEP:96:InJkLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:IJ3qtfA604qSBgI7DBch
                                                    MD5:98E0F428A3773CE6FF0CEBF2F88EA81A
                                                    SHA1:3DFA7D21A31C99078A139C5F41740B8EAD4085C2
                                                    SHA-256:B1630FA919D652F30D23253E1C561BB76FB4D28844A2F614D08B0A25B17CFB27
                                                    SHA-512:11C8E1F15B3FDC36DAD12229038BE10DA231872F804BD9FFF1786192541C4ABAFB27099C24EC3122F92A0D94D7D4A6E1ACD0A05845EC614982176A859B74E9FF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rainy_River) {.. {-9223372036854775808 -22696 0 LMT}.. {-2366732504 -21600 0 CST}.. {-1632067200 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-923248800 -18000 1 CDT}.. {-880214400 -18000 0 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {136368000 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {167817600 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CS
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7614
                                                    Entropy (8bit):3.8349162993762267
                                                    Encrypted:false
                                                    SSDEEP:96:Wi8h4ZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:bqOfA604qSBgI7DBch
                                                    MD5:793DAEDB7E3077DE52DCC3C8A7CBEC5B
                                                    SHA1:37562E9F28D51DED41FFD5FF2FF19E2E4E453B7A
                                                    SHA-256:AA8866D58BEAB07548180628FF423887BBF48AADB1B55392B288F7310F94A9B1
                                                    SHA-512:68A32B41DC2D3E730D6BE53656B0D566AB1BCC1E189A2FFDB5687A947EF4F4008BC17456F8CE0D59C838EEA87A44400231A44E6AB35BEDBF5D7779E1CD7EFD8A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rankin_Inlet) {.. {-9223372036854775808 0 0 -00}.. {-410227200 -21600 0 CST}.. {-147895200 -14400 1 CDDT}.. {-131565600 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972800 -18000 1 CDT}.. {530694000 -21600 0 CST}.. {544608000 -18000 1 CDT}.. {562143600 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {607507200 -18000 1 CDT}.. {625647600 -21600 0 CST}.. {638956800 -18000 1 CDT}.. {657097200 -21600 0 CST}.. {671011200 -18000 1 CDT}.. {688546800 -21600 0 CST}.. {702460800 -18000 1 CDT}.. {719996400 -21600 0 CST}.. {7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1420
                                                    Entropy (8bit):3.78262494063765
                                                    Encrypted:false
                                                    SSDEEP:24:5aLexyGcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaI1kR8nd:5eTChlvEw6kSSx5H4a8tf3fkuoYVZDm+
                                                    MD5:4D12651CEE804EB9F29567CB37F12031
                                                    SHA1:54B2613475B8BDB1DBCCA53A4895DA021F66BDC0
                                                    SHA-256:A36AD4614FC9A2A433712B555156EDE03980B88EB91D8DC7E8B10451D6D7F7D3
                                                    SHA-512:E6690F6B6DF613C8B7289A2DB71FBC9B87B997707A6C3B4B45BDE8F347082AE8C69F212BAACE50F3C04E325ABE0976AF1F61107BDF8A15D5B88F11FAE11A9D00
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Recife) {.. {-9223372036854775808 -8376 0 LMT}.. {-1767217224 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1781
                                                    Entropy (8bit):4.034282439637634
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290hjmdHfCv24Q1NAvHaE+YB+Q4kRcMxIeRUVX/SEQd1rRR9xRv0+Ro/wPjp:5EjeavTGOtAVvSRBpx0yq1epwD+yz+
                                                    MD5:14B29B4391B643E5707096ADCC33C57E
                                                    SHA1:B3F875ABB79C634C74307B7CB7B276B13AEE11D1
                                                    SHA-256:50105E788288CF4C680B29BBDCDE94D8713A5361B38C6C469FD97CF05503FF7D
                                                    SHA-512:D92A51547DF2C1AB6E6CDEFF34C07B755D3F6BB5E7DD1907693E7658EDE4D2BADC5DEFDB658ADD0F8D8F14B3B87CEA17BC00DAC364C5CB7ACBF8778C245276A9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Regina) {.. {-9223372036854775808 -25116 0 LMT}.. {-2030202084 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1251651600 -21600 1 MDT}.. {-1238349600 -25200 0 MST}.. {-1220202000 -21600 1 MDT}.. {-1206900000 -25200 0 MST}.. {-1188752400 -21600 1 MDT}.. {-1175450400 -25200 0 MST}.. {-1156698000 -21600 1 MDT}.. {-1144000800 -25200 0 MST}.. {-1125248400 -21600 1 MDT}.. {-1111946400 -25200 0 MST}.. {-1032714000 -21600 1 MDT}.. {-1016992800 -25200 0 MST}.. {-1001264400 -21600 1 MDT}.. {-986148000 -25200 0 MST}.. {-969814800 -21600 1 MDT}.. {-954093600 -25200 0 MST}.. {-937760400 -21600 1 MDT}.. {-922039200 -25200 0 MST}.. {-906310800 -21600 1 MDT}.. {-890589600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-748450800 -21600 1 MDT}.. {-732729600 -25200 0 MST
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7610
                                                    Entropy (8bit):3.8312000314798085
                                                    Encrypted:false
                                                    SSDEEP:96:li8h4Z80NA604qSScBgN+4ctDzIVQ/c/3hNxTh:EqOzA604qSBgI7DBch
                                                    MD5:541EACD872723603971058CB205121D7
                                                    SHA1:8F7DFD5ECA2913846D9342839AE1C60882153DA0
                                                    SHA-256:643CC43E3F906779C040E1F0C20E78D6E95CC7301B3C7370A8ADBCBD76A8C5E8
                                                    SHA-512:971D06D3FB67B7AE79EEDB6D3EBB805B5992C2BF4A7166016B405E21BFB25D9A87A757E8065073D5FBEB9084F6F742269A5BF432BF2F03D30913DB092E1AB3A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Resolute) {.. {-9223372036854775808 0 0 -00}.. {-704937600 -21600 0 CST}.. {-147895200 -14400 1 CDDT}.. {-131565600 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972800 -18000 1 CDT}.. {530694000 -21600 0 CST}.. {544608000 -18000 1 CDT}.. {562143600 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {607507200 -18000 1 CDT}.. {625647600 -21600 0 CST}.. {638956800 -18000 1 CDT}.. {657097200 -21600 0 CST}.. {671011200 -18000 1 CDT}.. {688546800 -21600 0 CST}.. {702460800 -18000 1 CDT}.. {719996400 -21600 0 CST}.. {73391
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1112
                                                    Entropy (8bit):3.8413073465060457
                                                    Encrypted:false
                                                    SSDEEP:24:5Ybe/k5Yss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6Gs:505YsMw57XJh4CxUF/A6GTrtSUDwr
                                                    MD5:7E23FDE0E158E8ED2E7536EDE70D2588
                                                    SHA1:319052BE076DC79F130E807D68B11CCAA0636340
                                                    SHA-256:28082D20872B61D6098D31D1C40F12464A946A933CD9AF74475C5AF384210890
                                                    SHA-512:BE078ED12F05AB5CEE5D77212EB76A01A1BC52EEAA17E3B91D93B88D75E5281B6AF164E712A9AB0F57A21B3CDB20F6FCCADB73CAC4745B5D2E665D18F9F06B55
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rio_Branco) {.. {-9223372036854775808 -16272 0 LMT}.. {-1767209328 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {57120480
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):219
                                                    Entropy (8bit):4.801485647578614
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/290rI5290/M7:MByMY/M7p/M16t290r190/M7
                                                    MD5:90830F3B1F91FE48AC2944C7C92A3F6E
                                                    SHA1:777377AE4959DDD2B472EB6041A23A5B93D64BB6
                                                    SHA-256:0117D33D4F326AA536162D36A02439FBD5F2EB3B4F540B5BA91ED7747DDAC180
                                                    SHA-512:20A371E4550E402AFEB83EF19EFFF6B3C0D7A68DCAA06AD894D04DB63B7096560E701C45B455B23A98BB20FE3B590F920219152415CA506AEDA427BB1381B826
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Rosario) $TZData(:America/Argentina/Cordoba)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):194
                                                    Entropy (8bit):4.869058214823402
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7ekHAIgpeON/290tX2U490eBn:MByMYMpJt290c90m
                                                    MD5:F4E62378AA05771D348AA6DA516CD386
                                                    SHA1:07FCA813693F7944CBCBB128F2F2FE32929D37A2
                                                    SHA-256:3B4C2F3A5B9CD22A73F05187C032723D07BB53C9946D04D35E1BA1CB90CA0A62
                                                    SHA-512:E9F6CEB824D656CA25A72BF8EB4347A22E1A8E40410F01E0C2EDE19ACAF32D76540399796B3EBC7781C8B5D48C1A6B2C856CA06158AE37D95C95CF0567DFA2E5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Santa_Isabel) $TZData(:America/Tijuana)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1079
                                                    Entropy (8bit):3.8200568741699223
                                                    Encrypted:false
                                                    SSDEEP:24:5zeUdunSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/h:52SeSFESoSQSrSsCSeSPS1cSQSQlSsSU
                                                    MD5:7F2658032008F2C1308F121C2EBF2479
                                                    SHA1:B6F24E818B4424C0DEF818C103D1DA5359958932
                                                    SHA-256:4A397BD937DE1D7E6A941D18001B34D4CD195AEFD08951C30C7EE8E48656AA0E
                                                    SHA-512:F78853AA75F58A85555DD79E08A7487E5161854650DBF480189790D855738FEDCBDA936870067DE40FE000861008A9E9AAF61DF02B6B30B96038C61B5E1F1C1D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santarem) {.. {-9223372036854775808 -13128 0 LMT}.. {-1767212472 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8871
                                                    Entropy (8bit):3.5333393351633897
                                                    Encrypted:false
                                                    SSDEEP:192:5Gv/IxUQjzoMUBI0nuUoDK6lPlgiot7JC/k8NWse4r4g5xCEmMQUs8nCxvisEbzQ:5Aa9TzDCjg32+E
                                                    MD5:0659C7482FC6121AF4714DA6E2188069
                                                    SHA1:79D8B13C54AEDE9EDC191EB92F8CD6BE936490F4
                                                    SHA-256:B2D7FD4DB34800C9EF9BD73CDDB1105543CCED05F3E2AC99F3E5E2F6CF340AE2
                                                    SHA-512:C138C580648D7EAAB22828EA4318F6FAEEF618B994C2E05AF23ACF03A279506053C85BFDBC03B9E32B1CA5826713D7FFC249CE33B3F0EA734A2E4CE626AAB3A3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santiago) {.. {-9223372036854775808 -16966 0 LMT}.. {-2524504634 -16966 0 SMT}.. {-1892661434 -18000 0 -05}.. {-1688410800 -16966 0 SMT}.. {-1619205434 -14400 0 -04}.. {-1593806400 -16966 0 SMT}.. {-1335986234 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-740520000 -10800 1 -03}.. {-736376400 -14400 0 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):616
                                                    Entropy (8bit):4.330655351784895
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290/StmdHhvCvuCY/h/uFkS/5MVvMrW//MVvMrpx/m0XVvMr4UB/47VvMr/d:5+seQvuCY5/u/REfk+xxdbUBQpu652GO
                                                    MD5:FAD0621010889164ADC4472003C9391F
                                                    SHA1:C4EE0B8D6925338D17D5745DE9D45FA3C628DFC5
                                                    SHA-256:2217E72B11A90F2D679C175DE3CC0F2FED4C280C9FF9707CFFAF118BF9A06A4B
                                                    SHA-512:90E8E5A109CD72458C7796CF0324F63E543CCD63D13A09A3DD28EDC8B2793C964C18E79FDF0C5067C5A481B7FB03E8413139C32F59DA07E9D7893378ABBBD2B3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santo_Domingo) {.. {-9223372036854775808 -16776 0 LMT}.. {-2524504824 -16800 0 SDMT}.. {-1159773600 -18000 0 EST}.. {-100119600 -14400 1 EDT}.. {-89668800 -18000 0 EST}.. {-5770800 -16200 1 -0430}.. {4422600 -18000 0 EST}.. {25678800 -16200 1 -0430}.. {33193800 -18000 0 EST}.. {57733200 -16200 1 -0430}.. {64816200 -18000 0 EST}.. {89182800 -16200 1 -0430}.. {96438600 -18000 0 EST}.. {120632400 -16200 1 -0430}.. {127974600 -18000 0 EST}.. {152082000 -14400 0 AST}.. {975823200 -14400 0 AST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2900
                                                    Entropy (8bit):3.6548008349990755
                                                    Encrypted:false
                                                    SSDEEP:48:5uFChlvEwR9xSSx5H4a8tf3fku+da2XUd23t8VZDG8+w/ghBPWTRz908a9zRgwun:cFIlvEwZSSxdF8tfMu+da2kdCt8VZy8n
                                                    MD5:F6B732A862659EB131C2E6FEC00E9734
                                                    SHA1:49517DF63BC5B6FEC875CE9477BBF84F4072FA31
                                                    SHA-256:0E7BA1C5A3FA3DABDAA226BFE1E8D797A3835EA554828881AB5E365EDA09B92E
                                                    SHA-512:670A5B604B5EA0F5FA15083BC1EA115B7EFD449F9EAC4518E109493591893DD3627AFC6628E0EDD1953E932E2A7AD9B5A379526548677158EC445366E4ED7166
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sao_Paulo) {.. {-9223372036854775808 -11188 0 LMT}.. {-1767214412 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-195429600 -7200 1 -02}.. {-189381600 -7200 0 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6839
                                                    Entropy (8bit):3.565857684485945
                                                    Encrypted:false
                                                    SSDEEP:192:9OgtbdF7TI7nYUYXg9W/OAcv7vuShytWi0PnvLrqPoKR2XszXckXtogYN4Ezlk0X:PJr9Q7TMq+ML
                                                    MD5:D1BF579FE8123E8EE9248A51E794CC78
                                                    SHA1:BF9CB9BED143C7529719E0C1E2F88BE1AC9F8DD4
                                                    SHA-256:158BD9E4EB0B9DFF3F2D3E2DBA72F217B73423012DD33A688FD57852124E884A
                                                    SHA-512:78192AC38912021F848592D0B208CB122EFFC6DDB326540FFAADA4FD3322B7A442FD1116F408D64B8788520B46545DFAE571EA42046D62A282A97ECCD5663655
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Scoresbysund) {.. {-9223372036854775808 -5272 0 LMT}.. {-1686090728 -7200 0 -02}.. {323841600 -3600 0 -01}.. {338961600 -7200 0 -02}.. {354679200 0 0 +00}.. {370400400 -3600 0 -01}.. {386125200 0 1 +00}.. {401850000 -3600 0 -01}.. {417574800 0 1 +00}.. {433299600 -3600 0 -01}.. {449024400 0 1 +00}.. {465354000 -3600 0 -01}.. {481078800 0 1 +00}.. {496803600 -3600 0 -01}.. {512528400 0 1 +00}.. {528253200 -3600 0 -01}.. {543978000 0 1 +00}.. {559702800 -3600 0 -01}.. {575427600 0 1 +00}.. {591152400 -3600 0 -01}.. {606877200 0 1 +00}.. {622602000 -3600 0 -01}.. {638326800 0 1 +00}.. {654656400 -3600 0 -01}.. {670381200 0 1 +00}.. {686106000 -3600 0 -01}.. {701830800 0 1 +00}.. {717555600 -3600 0 -01}.. {733280400 0 1 +00}.. {749005200 -3600 0 -01}.. {764730000 0 1 +00}.. {780454800 -3600 0 -01}.. {796179600 0 1 +00}.. {8
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.888573146674231
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/2IAcGEtOFBx+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/290tO09Z
                                                    MD5:2FF74846ADF32AA3A9418376775B7F25
                                                    SHA1:130D7548DFFEBCE74969962E335B40299D7C5C54
                                                    SHA-256:BF4FAB3AE72CC7FA4F9E34CF0551A85C54A084CD826DF5D9CC684DE6188E84DB
                                                    SHA-512:9E52C017E595EEF1C68C8A1943416A9109D7DB4C32D25F83D05213C4200869A50E2E726894E39ECA364C558BB7F5566F6150CEA5D3CB14D1DEAE28C3D8C810E0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:America/Shiprock) $TZData(:America/Denver)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8651
                                                    Entropy (8bit):3.959337076866423
                                                    Encrypted:false
                                                    SSDEEP:96:IGCG0hPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:I5G0A9DiaJCUbPI+D/iMpCIBSuk
                                                    MD5:7CCB6902749079A0496F1E2E2137448E
                                                    SHA1:3D0ED7BF1C26659F6794E26AE3869F8AB925B6DF
                                                    SHA-256:ABB08435CAE80119068A85984BFFE9C1596F4FB90F07CC01124C907E5162C189
                                                    SHA-512:0B5B2DCECC70F357DB6D590AB63E600C572EA6B3F430565EFEB29777B1901AAC55CACC7495C668F739201076B180402141BC1B2ED2357E9B4DFBABF3B122AB44
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sitka) {.. {-9223372036854775808 53927 0 LMT}.. {-3225223727 -32473 0 LMT}.. {-2188954727 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {3099492
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):207
                                                    Entropy (8bit):4.932842207797733
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290txP90ppv:MByMYbpwt2907P90b
                                                    MD5:CBFA61DBF6F7459CF8D517402B29998E
                                                    SHA1:A562B29C9470DBD25480966B0462433124BA4164
                                                    SHA-256:353CDBD46BA8C7472A93E9E800A69105801F6784B22EC50A59294CDC3BE40E18
                                                    SHA-512:00B333EAA2C32EDDA8F06457AD0E10013A0147B20F504F4F1096656F731A7C1896D5ABD83E7EDBD5D4E7DA587EE9BFA796539EB1E9F4056D75D1FDF203251150
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Barthelemy) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11289
                                                    Entropy (8bit):3.8713946894934614
                                                    Encrypted:false
                                                    SSDEEP:192:PmxVjd1cO8f7/EjUhSicN6zvfwb+8YbTE0M0J:PmrcOI7/EjiskY01J
                                                    MD5:8F068899DA75663128320633E1881333
                                                    SHA1:E9161B45D7B11A2DD6E9679AC080E84EC51561E3
                                                    SHA-256:E2917204B0C843C32051BB371CF6D0AD272C02720B9C0D913AC072C8ABE1EC64
                                                    SHA-512:2200E9B9D816157330ADAEA7383635876E5A37329B1AF9613D38BCFBE8143835837A25132A94E44A61DB8058ED98B1A33F295EA64BC1F4CE30966D52BB0B673D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/St_Johns) {.. {-9223372036854775808 -12652 0 LMT}.. {-2713897748 -12652 0 NST}.. {-1664130548 -9052 1 NDT}.. {-1650137348 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1598650148 -9052 1 NDT}.. {-1590100148 -12652 0 NST}.. {-1567286948 -9052 1 NDT}.. {-1551565748 -12652 0 NST}.. {-1535837348 -9052 1 NDT}.. {-1520116148 -12652 0 NST}.. {-1503782948 -9052 1 NDT}.. {-1488666548 -12652 0 NST}.. {-1472333348 -9052 1 NDT}.. {-1457216948 -12652 0 NST}.. {-1440883748 -9052 1 NDT}.. {-1425767348 -12652 0 NST}.. {-1409434148 -9052 1 NDT}.. {-1394317748 -12652 0 NST}.. {-1377984548 -9052 1 NDT}.. {-1362263348 -12652 0 NST}.. {-1346534948 -9052 1 NDT}.. {-1330813748 -12652 0 NST}.. {-1314480548 -9052 1 NDT}.. {-1299364148 -12652 0 NST}.. {-1283030948 -9052 1 ND
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):202
                                                    Entropy (8bit):4.907031043022691
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tMp490ppv:MByMYbpwt290g490b
                                                    MD5:D521F2D9B28C5374FC3BD540C6B6F40D
                                                    SHA1:39A3D86CB71F742F33B02F50B316638815B3CD4E
                                                    SHA-256:EDB9457A7C64E47062BDC6458FD3BCFCD6C37820F1A2BC89DFE99ED77355011F
                                                    SHA-512:05C1BE92550A962904ED3BB7DECCAC16FCB54D258F24F2AEDF755FCC44E4FEF5F86AB663945809F5D7AFA64178E807BBDAE77048270ED516DFF2C7720A746D52
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Kitts) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):202
                                                    Entropy (8bit):4.9037013606484905
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tY90ppv:MByMYbpwt290a90b
                                                    MD5:9392E5A7BD198B0308F9271E4C7E59B2
                                                    SHA1:A902440920A0318BC930957C74804A9A51EF7818
                                                    SHA-256:6727A509BB937CB3446D41B57826DE70C7028E96F088AB5B7F803BEAA18279E8
                                                    SHA-512:6DA1EAC390E72905DF1A14D82362B499D20FAD6D85F3DF116AE01E566D5D19C6D16E56DA72C458BB6143345EF45F35A53B245488C641D80BFBA200B16A59719E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Lucia) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):203
                                                    Entropy (8bit):4.919272465019375
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tXIMFJ490ppv:MByMYbpwt290tJ490b
                                                    MD5:49D0C8DAFCA053C9967EDCC4C0A484B1
                                                    SHA1:7B4999D4B9AD93306BD411DF2946D741EC597770
                                                    SHA-256:974AEED3D79124B50265C83D84F23CBE4F0328D00C75F42DD3ABC5D4C0A78DE1
                                                    SHA-512:378E3657B26C5A039FF82ECCAC7797FF45CBC6479596629B3048164EE4E035F4ECFC557AA9EAF6848E78999B4FF8C63E53C7163BDF6F626ED6111004490D6F80
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Thomas) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.909053768717241
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tzb+Q90ppv:MByMYbpwt290xyQ90b
                                                    MD5:6CFB23E7164605CDE380FB7C4D88DF11
                                                    SHA1:CC513B29AD7B59E600DBCBC97927EB632558F657
                                                    SHA-256:6B19404D295964EF66F47802836BB728FCE8E6481115797C0B5F200C354D7C8A
                                                    SHA-512:728987D0925B6E12E8A220920BEDF94180880E78F3F08F6AC740E6304B22D446846068CEA499F61E7032ADB2E700CE31954921D478C9A8B6CB599E05A6292EA3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Vincent) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):874
                                                    Entropy (8bit):4.253846650171654
                                                    Encrypted:false
                                                    SSDEEP:12:MB86290hEbmdHLCvYX4Q19xRv0+RmwPj+uLkQOzL3+ORL4FXgenM7RSslKA1PyKp:5zeOvT4xuyqoYaAxt7l
                                                    MD5:C91F801CC5E9F78B966D1DF2259C38A8
                                                    SHA1:D29C970CBFC74684D46AAAD543B73B520775632C
                                                    SHA-256:939B25C9412B9E25D73F552E87826999FC8C929770E66491D1E4530046D3E758
                                                    SHA-512:093378E61DE9310F9C48170CBB0FDBD3C79E184DA1489F759B20BCE410006A9D5A793C82E79A46E0AFF0DAA47D9DBAFD605959E491BA9ED4E55D26F293642D32
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Swift_Current) {.. {-9223372036854775808 -25880 0 LMT}.. {-2030201320 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-747241200 -21600 0 MDT}.. {-732729600 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {-684342000 -21600 1 MDT}.. {-671040000 -25200 0 MST}.. {-652892400 -21600 1 MDT}.. {-639590400 -25200 0 MST}.. {-631126800 -25200 0 MST}.. {-400086000 -21600 1 MDT}.. {-384364800 -25200 0 MST}.. {-337186800 -21600 1 MDT}.. {-321465600 -25200 0 MST}.. {-305737200 -21600 1 MDT}.. {-292435200 -25200 0 MST}.. {-273682800 -21600 1 MDT}.. {-260985600 -25200 0 MST}.. {73472400 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):341
                                                    Entropy (8bit):4.638828647226646
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2903fDm2OHskeoHxbV1ULhgdrV/uF+IcmJ3/uF+ivi9/uF+SNv:MB862903LmdHsVCn1ULSB/uF+QV/uF+q
                                                    MD5:4C4034ABAB9E4804CCB23E51694044C9
                                                    SHA1:7DB24CE83AB2C07E6F6784D27C4E3AC0F149D080
                                                    SHA-256:1F0503579B0DDDBAF88814A278127D9CD7019EDD3C35F4CBFC0EF11C0EDAFE5B
                                                    SHA-512:0BC366CD3AB2E1388D11770DC8DEC1FC94C48FDC846ABB6C487828BF9FF15CD9A1C15B33E08F6E48B7F4A6F2AD1617FF12B359784CA4C32256D72422E6825105
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tegucigalpa) {.. {-9223372036854775808 -20932 0 LMT}.. {-1538503868 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}.. {1146981600 -18000 1 CDT}.. {1154926800 -21600 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6890
                                                    Entropy (8bit):3.8331465442823704
                                                    Encrypted:false
                                                    SSDEEP:192:mJInJuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/Bm6BTd69xK7KjhVbHyR3h1gOZM:miFCC
                                                    MD5:D93B62D5F7EEBC28AC047BED2307CAE8
                                                    SHA1:8B3E02240A01B5AA42D30E86005E880916432227
                                                    SHA-256:7FB0CBB101D3B6FBB6B9DAD5446BBF9E6AEC65EC38472739E604F68F6AA9AB7B
                                                    SHA-512:3648106F4DF84CFD94AAD4E9430F8D3BBCB38A9196DE9A59246DFBBC170FADBF106DD1FD08FE2E4F7319BFFB1C2607E4F5D563C222CED8267483D1A0C388CCE5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Thule) {.. {-9223372036854775808 -16508 0 LMT}.. {-1686079492 -14400 0 AST}.. {670399200 -10800 1 ADT}.. {686120400 -14400 0 AST}.. {701848800 -10800 1 ADT}.. {717570000 -14400 0 AST}.. {733903200 -10800 1 ADT}.. {752043600 -14400 0 AST}.. {765352800 -10800 1 ADT}.. {783493200 -14400 0 AST}.. {796802400 -10800 1 ADT}.. {814942800 -14400 0 AST}.. {828856800 -10800 1 ADT}.. {846392400 -14400 0 AST}.. {860306400 -10800 1 ADT}.. {877842000 -14400 0 AST}.. {891756000 -10800 1 ADT}.. {909291600 -14400 0 AST}.. {923205600 -10800 1 ADT}.. {941346000 -14400 0 AST}.. {954655200 -10800 1 ADT}.. {972795600 -14400 0 AST}.. {986104800 -10800 1 ADT}.. {1004245200 -14400 0 AST}.. {1018159200 -10800 1 ADT}.. {1035694800 -14400 0 AST}.. {1049608800 -10800 1 ADT}.. {1067144400 -14400 0 AST}.. {1081058400 -10800 1 ADT}.. {1099198800 -14400 0 AST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8330
                                                    Entropy (8bit):3.832494305415669
                                                    Encrypted:false
                                                    SSDEEP:96:tDbEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:tvEItON0HY2iUmUFLqU
                                                    MD5:8DD2E298AEB672F32AD8B44A0A84431A
                                                    SHA1:9687C478FC6803F4FFCA125D921DF821181B8E75
                                                    SHA-256:0F95CE0A36415B43E7B5E6CD790D3BD9EF6D53F4B7AA0235360C0847CBB3F0C1
                                                    SHA-512:9380327C04FC48A61423F161DFD4AC1C431278D5B392F585DCEB1D893CB8212C4093A92D5D089BC23DF0B5BB6F99595937999A6B1E843DAE1AF36D76B0858281
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Thunder_Bay) {.. {-9223372036854775808 -21420 0 LMT}.. {-2366733780 -21600 0 CST}.. {-1893434400 -18000 0 EST}.. {-883594800 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {18000 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {94712400 -18000 0 EST}.. {126248400 -18000 0 EST}.. {136364400 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {167814000 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {35711
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8755
                                                    Entropy (8bit):3.8517632099398114
                                                    Encrypted:false
                                                    SSDEEP:96:c4uS6mjvZk53mtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:J6jFOzN6IkWq/WHQt/RY4yP
                                                    MD5:8F912B1F7E3144EE787E4386B1AE2AF1
                                                    SHA1:60236FC9AB9C06F614C76357915B57B286721BC6
                                                    SHA-256:FE3681F580ED7F3F2FD21F510DFF1BEF81BD521737F5846FA15FD309E44E69BE
                                                    SHA-512:87EA33079EEFED848150884BC41131B2CC49B0AAA5FA10C0700818A8C292F1F3AD928E98C98EF34EFC48F0E3AFB3CBBBE3D09C483A2CDA545DFF7CB77D29CB3E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tijuana) {.. {-9223372036854775808 -28084 0 LMT}.. {-1514736000 -25200 0 MST}.. {-1451667600 -28800 0 PST}.. {-1343062800 -25200 0 MST}.. {-1234803600 -28800 0 PST}.. {-1222963200 -25200 1 PDT}.. {-1207242000 -28800 0 PST}.. {-873820800 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-761677200 -28800 0 PST}.. {-686073600 -25200 1 PDT}.. {-661539600 -28800 0 PST}.. {-504892800 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}.. {-355330800 -28800 0 PST}.. {-337186800 -25200 1 PDT}.. {-323881200 -28800 0 PST}.. {-305737200 -25200 1 PDT}.. {-292431600 -28800 0 PST}.. {-283968000 -28800 0 PST}.. {189331200 -28800 0 PST}.. {19
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11248
                                                    Entropy (8bit):3.8061065077303926
                                                    Encrypted:false
                                                    SSDEEP:96:lBew85RnK1a8phYBNXEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:lBq5RnK1a8phYTXEItON0HY2iUmUFLqU
                                                    MD5:0D906EC3F658730131A65C5A770D885F
                                                    SHA1:BFA72C43BCE0F37F795E974457FBE4A664687B38
                                                    SHA-256:5A98C6BEDDA4DF608051D702A8E037093A8068E1B85F8F55D42B4468F45662A5
                                                    SHA-512:CC634DAF4EEC7F57E3AB0C20D891380A7F96DE79602A7B57C6C2BF229DD76A69B399A689FA6D0675380B1432C2115B0C8577DC49C3C9E567A08CAD6FCC3599BC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Toronto) {.. {-9223372036854775808 -19052 0 LMT}.. {-2366736148 -18000 0 EST}.. {-1632070800 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1609441200 -18000 0 EST}.. {-1601753400 -14400 1 EDT}.. {-1583697600 -18000 0 EST}.. {-1567357200 -14400 1 EDT}.. {-1554667200 -18000 0 EST}.. {-1534698000 -14400 1 EDT}.. {-1524074400 -18000 0 EST}.. {-1503248400 -14400 1 EDT}.. {-1492365600 -18000 0 EST}.. {-1471798800 -14400 1 EDT}.. {-1460916000 -18000 0 EST}.. {-1440954000 -14400 1 EDT}.. {-1428861600 -18000 0 EST}.. {-1409504400 -14400 1 EDT}.. {-1397412000 -18000 0 EST}.. {-1378054800 -14400 1 EDT}.. {-1365962400 -18000 0 EST}.. {-1346605200 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-1238954400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.864308662322047
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RRKl290ppv:MByMYbpwt290V90b
                                                    MD5:21D152A2359A4EFDE6DCC304F16096F3
                                                    SHA1:961B3CFB351615604981114A115D396D1F2006A2
                                                    SHA-256:46A236EC38F3A122D414208328A462B2A937392ECC6C55F673FB7A402F118D96
                                                    SHA-512:04A2AD6DDC2E7B0D3F95DA1C731FF553F8CBC0DD6BDFC36FB2EDCE755612103E3B4EA6F3AB7FE63CA60976538EFABF40827539DFC35B7E83129BD48471FE514B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Tortola) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9815
                                                    Entropy (8bit):3.8481935495337356
                                                    Encrypted:false
                                                    SSDEEP:192:sOR864CjSAG5a9bFzN6IkWq/WHQt/RY4yP:sO664CjSAGYbGBt/M
                                                    MD5:9423BC81647BC4C37888860CE0518BBB
                                                    SHA1:37E6E6554576D1DD36C3494EAF0BD169003D870D
                                                    SHA-256:00B5FB8F37DFF43925C501AEAB039F39F058E002572C4203286317046CC1D700
                                                    SHA-512:1830CA2B62B7CA6EEB5A924D2148925DF7DD87A7B93B21F4F023E4678EF42DC20BFF57F702923E10F4382FE6757323D21414D094E99FEEB43316DE4A7E5A909E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Vancouver) {.. {-9223372036854775808 -29548 0 LMT}.. {-2713880852 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-747237600 -25200 1 PDT}.. {-733935600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-4
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):200
                                                    Entropy (8bit):4.914983069791254
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RXgr490ppv:MByMYbpwt290xg090b
                                                    MD5:9F7DA15BE387B8F7DEC5DFFE069F3505
                                                    SHA1:D298B963B0048E9ECA3BC7B85248506AB1388479
                                                    SHA-256:561D9D04B0CE0F96A9C351C7D5C30AA1D5A42A3D70066CD9AF0DA6CBC5388DBE
                                                    SHA-512:606C2A918633C74BD2954D39B00EFA2CD9DA852BC7034F129A04258A65DC74942FA0826E9BC6E4433926E7F1375612554B04845077E434D0CD3BD15832DC6B95
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Virgin) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2971
                                                    Entropy (8bit):3.9652694533791917
                                                    Encrypted:false
                                                    SSDEEP:24:5CeFvmpn4nRfngnSSXRwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZg7ywJP:5BmCKpj/AOZFCARCeQbvb5wxMN6Ix
                                                    MD5:2F2D39B5FB844E170FA7B6AF11B948CA
                                                    SHA1:3D89672134D979FCF65225A58249380D9C8A4A65
                                                    SHA-256:8E0BC71BD7146145DDE3C064AE205DF08124FE2402853A9655B0EB799E90F31F
                                                    SHA-512:6C046D1133C8CCF697C8FB553A1F539948F71FA80BA447B87AA8D1D1D7113B32A6B764C5C1734C615319A27961B6116FCA087EB571869119BE87656FCA351498
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Whitehorse) {.. {-9223372036854775808 -32412 0 LMT}.. {-2188997988 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -28800 0 PST}.. {576064800 -25200 1 PDT}.. {594205200 -28800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9695
                                                    Entropy (8bit):3.8209220355628766
                                                    Encrypted:false
                                                    SSDEEP:96:pOEhc8/rvNZONqXXyIjNA604qSScBgN+4ctDzIVQ/c/3hNxTh:pY8DvbO+A604qSBgI7DBch
                                                    MD5:E8DB00D2B99B308018F4F5E48AC47C3A
                                                    SHA1:8841467CB264DC9F87FABAADBE90EE2C8DACC80F
                                                    SHA-256:F3FC5F6D93D1D9EB0F3DED33873F33C47F841797D96439966F8E0A5A189941FA
                                                    SHA-512:5D684B07332ED53F9F8CB71FFF3B6D0F848426A5E4D9E7DA84E49E358C666F1C3BB9CF21352D939B35B558FC691839E24BC84656317F73C768B474AF5AC480EB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Winnipeg) {.. {-9223372036854775808 -23316 0 LMT}.. {-2602258284 -21600 0 CST}.. {-1694368800 -18000 1 CDT}.. {-1681671600 -21600 0 CST}.. {-1632067200 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1029686400 -18000 1 CDT}.. {-1018198800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-746035200 -18000 1 CDT}.. {-732733200 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620755200 -18000 1 CDT}.. {-607626000 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8683
                                                    Entropy (8bit):3.957710943557426
                                                    Encrypted:false
                                                    SSDEEP:96:po1acs6yyyxC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:p4acsW9DiaJCUbPI+D/iMpCIBSuk
                                                    MD5:18EC35FCEC15CE9304818E22222411EF
                                                    SHA1:F4A04B3E2B5F55C9582F578C3142E706C4EB6BD6
                                                    SHA-256:79B44F245D86A4EC299D1A9A2EDB2AB92D50AB5A7C1C03759D283AC4070F9005
                                                    SHA-512:40AC47AC278DF22C7ECFF568456E7C3767B38701B9A2E2639C2201DC53CDD794CF7521BCB773A8AF2A8D4A034D3BBD35BF9788FB5B4E4D51A7A139B3B3353479
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Yakutat) {.. {-9223372036854775808 52865 0 LMT}.. {-3225223727 -33535 0 LMT}.. {-2188953665 -32400 0 YST}.. {-883580400 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-757350000 -32400 0 YST}.. {-31503600 -32400 0 YST}.. {-21474000 -28800 1 YDT}.. {-5752800 -32400 0 YST}.. {9975600 -28800 1 YDT}.. {25696800 -32400 0 YST}.. {41425200 -28800 1 YDT}.. {57751200 -32400 0 YST}.. {73479600 -28800 1 YDT}.. {89200800 -32400 0 YST}.. {104929200 -28800 1 YDT}.. {120650400 -32400 0 YST}.. {126702000 -28800 1 YDT}.. {152100000 -32400 0 YST}.. {162385200 -28800 1 YDT}.. {183549600 -32400 0 YST}.. {199278000 -28800 1 YDT}.. {215604000 -32400 0 YST}.. {230727600 -28800 1 YDT}.. {247053600 -32400 0 YST}.. {262782000 -28800 1 YDT}.. {278503200 -32400 0 YST}.. {294231600 -28800 1 YDT}.. {30995
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7737
                                                    Entropy (8bit):3.8656193813344064
                                                    Encrypted:false
                                                    SSDEEP:96:42GaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:uPlLv/PCenJzS6cy
                                                    MD5:A7606AE597027C26BC90702B2BCC80E9
                                                    SHA1:7B2AB2E0A23B8D770D1305A171DBCCE2D471EF2F
                                                    SHA-256:B33838F12640C64BA4F10F50657EC4D8D5B30FD226DA4ACA21B169B53AD30576
                                                    SHA-512:B18711B4110D6DB0CC7A6EF66639E1B38323F0B61DA4F5287A51BC9EC8534133568C6D3E4F18F6328564DAD291E0CA707768DE4478DD502A40FFD189C08114A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Yellowknife) {.. {-9223372036854775808 0 0 -00}.. {-1104537600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-147891600 -18000 1 MDDT}.. {-131562000 -25200 0 MST}.. {315558000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):478
                                                    Entropy (8bit):4.205595904143294
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2L09xSDm2OHE5QMFUH+KNUoTVsBEE0ZZICxZbDtVby:MB862LcUmdHE5QMFi+KdTVPZIwXDy
                                                    MD5:7D8132A23238C14CCEDD520BBEB49F77
                                                    SHA1:A8BAE9269DAA2AC535B292E1AE8632B451A0BBA5
                                                    SHA-256:04247ACB2B4FA126D13F4573FF74D15A89CF42B2C5CD7E688D5BB1C1FD3972BF
                                                    SHA-512:74FCB14037B0AE11A95B036791D69037590F8EC7F09D90A866E6A6CAAD6D58E4EC3723A3BB356FBF0E25ED1239A5820A8513EBF6653578E4BFB8988D6D20EF13
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Casey) {.. {-9223372036854775808 0 0 -00}.. {-31536000 28800 0 +08}.. {1255802400 39600 0 +11}.. {1267714800 28800 0 +08}.. {1319738400 39600 0 +11}.. {1329843600 28800 0 +08}.. {1477065600 39600 0 +11}.. {1520701200 28800 0 +08}.. {1538856000 39600 0 +11}.. {1552752000 28800 0 +08}.. {1570129200 39600 0 +11}.. {1583596800 28800 0 +08}.. {1601740860 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):324
                                                    Entropy (8bit):4.360007144607037
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2L0mDm2OHEfwz0/MVSYyF/KZ7VoX/MVSYyF/VpVQVF9RXhNXSMVSYy6:MB862LVmdHEIjsF/KZOksF/Vp6v9RRFl
                                                    MD5:97AA556F7EF06786B76316133794F4E9
                                                    SHA1:B3CDA284DE80987B954E2CC9BFA3ED33462CDD4F
                                                    SHA-256:2F36D2E13D7E251322B7A7B30F39645393525CEB49A2B5C26F27797F2AAF4D7F
                                                    SHA-512:14C6F17252C2AC89D86FE00BD8A8934D627C85478B0AB08AB6237988922D18616B00878498FFFC0E1978308BC6D775E2DC3ADCEF827AB0A06B214BE4DDABAB52
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Davis) {.. {-9223372036854775808 0 0 -00}.. {-409190400 25200 0 +07}.. {-163062000 0 0 -00}.. {-28857600 25200 0 +07}.. {1255806000 18000 0 +05}.. {1268251200 25200 0 +07}.. {1319742000 18000 0 +05}.. {1329854400 25200 0 +07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):214
                                                    Entropy (8bit):4.938579775653117
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/2L0/3Zp5/4pv:MByMdNXiU5t2Lkwv
                                                    MD5:CC22302B9FAE52E36A2A35C0361E774B
                                                    SHA1:45CFD95A5821C4C4FDF2E1519F08029FF0BE664B
                                                    SHA-256:96F2AB9A9FFCD10598FDF105F68460CC4B4EBC1F18054D1BC8E39DF6AD24D1AC
                                                    SHA-512:FC9084D7B16EAA985681762F2658D32C77EE186D8D3C7225093CC5CB4A6AEB74A3D0A41A904EB6C8AEF7DB110A89497BAFAF811BBC26103F96E5E1D4D4E1002A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Antarctica/DumontDUrville) $TZData(:Pacific/Port_Moresby)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8447
                                                    Entropy (8bit):3.850137279218428
                                                    Encrypted:false
                                                    SSDEEP:96:s1qigkx6WsYyS391QiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:s1q05h1QiAmcOM6e0pj
                                                    MD5:81C612A1544910544173687C416841C6
                                                    SHA1:4A707B403F0B9556A3D3D50B08BE0F56660F3F0B
                                                    SHA-256:C4EA7F1C0B5A0FAE653419F1C6D058BDDD745A3CDBA11900005C157DF23DDC01
                                                    SHA-512:122E2DC3D8D61CCDB83E03C9487DD29AABE7AB3F71FE4F6315209AF0BBCFD01FBDC3A1E3F6D910FB0D690378DF852170A9819D8C1EF96BE6BC8C0811BFB453A9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Macquarie) {.. {-9223372036854775808 0 0 -00}.. {-2214259200 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1669892400 39600 0 AEDT}.. {-1665388800 36000 0 AEST}.. {-1601719200 0 0 -00}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {28932480
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.7511104559982
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEzyeyFNMXGm2OHvavFeVU/VPKVVFSTVF9svUX0VQr:SlSWB9eg/2L0zyfXDm2OHEVy/Ur9s/Vg
                                                    MD5:7A2AD9BD8F8DEE5C600CABF2D5E9D07B
                                                    SHA1:CF5D230A29946B7FA3ECD8EB99F1EF1BF0FA5B50
                                                    SHA-256:ACA533B8BC82296373EDEC82F6E0AA45A34D817C7C18FF5E8E94B81C0BD30259
                                                    SHA-512:95F8FA68735E88AB15C403191928FA4AA5D1628453BE64B87EE7E8DF9F35FB5DA74A3CED5F5289A13D84A8A12BBB86734E578059CA8B6405399CFF5E33C9384C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Mawson) {.. {-9223372036854775808 0 0 -00}.. {-501206400 21600 0 +06}.. {1255809600 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.880387042335617
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0z6/fy:MByMdTiYt2LrK
                                                    MD5:88EE32AE5C538AEBFDE2D1D944ED5B2B
                                                    SHA1:55E7234E6FFF298182A6C8889A9F506CDCE7C959
                                                    SHA-256:E9D99293C5B275D8E0D7B066084177EDF670D5B52B81E87608BAB02025F33155
                                                    SHA-512:45A3EA146CA719BA6F22E99EAA57AC1DED1C762E19BDFBA176E5FEAC36EC58586F771572DD16ACE09E660F97DEB91A701BA1B1F1AEF3BD8688F3451C0772420A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/McMurdo) $TZData(:Pacific/Auckland)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2613
                                                    Entropy (8bit):3.6082359166067905
                                                    Encrypted:false
                                                    SSDEEP:48:5fzJS6S4wRSenSOaf7HSKSkSqS7STslSmSMSCSxygSiXS/SrS+S9SfShS7SoSlSL:jdeRtnxaf7HlPlgiot7JC/Xk8NWse4rf
                                                    MD5:BDFA5908E735F866FEC16F6B481AD385
                                                    SHA1:524AEE21BB97D923A8812A5722AF2FEA43B4D971
                                                    SHA-256:1637381A20E9D5C6A530F110BDB08D9515E675C9206F000407D8511074948E61
                                                    SHA-512:3D65C7941BA15A698264848F9B6F43ED5B63D4CF86D495334E8E1DC381D63435E9424BBBC389229693D20044FDB8425A7CC805AB5EA055F59D3E0DD4C7AC2A28
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Palmer) {.. {-9223372036854775808 0 0 -00}.. {-157766400 -14400 0 -04}.. {-152654400 -14400 0 -04}.. {-132955200 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-101419200 -10800 1 -04}.. {-86821200 -14400 0 -04}.. {-71092800 -10800 1 -04}.. {-54766800 -14400 0 -04}.. {-39038400 -10800 1 -04}.. {-23317200 -14400 0 -04}.. {-7588800 -10800 0 -03}.. {128142000 -7200 1 -03}.. {136605600 -10800 0 -03}.. {389070000 -14400 0 -04}.. {403070400 -10800 1 -04}.. {416372400 -14400 0 -04}.. {434520000 -10800 1 -04}.. {447822000 -14400 0 -04}.. {466574400 -10800 1 -04}.. {479271600 -14400 0 -04}.. {498024000 -10800 1 -04}.. {510721200 -14400 0 -04}.. {529473600 -10800 1 -04}.. {545194800 -14400 0 -04}.. {560923200 -10800 1 -04}.. {574225200 -14400 0 -04}.. {592372800 -10800 1 -04}.. {605674800 -14400 0 -04}.. {624427200 -10800 1 -04}.. {63712
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):151
                                                    Entropy (8bit):4.829975802206526
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEsKRsMXGm2OHvavFN/H3VVFVGAvFv:SlSWB9eg/2L0rRsDm2OHEN/VVFAKV
                                                    MD5:C330982049AA053DA62B926627D2F2FA
                                                    SHA1:050CE68265F1A183F0173C825AC59EAE8B6AB9EB
                                                    SHA-256:943F10D8E836773F0B7ACD13ED8422C0B27813C7BBE0B09B57697D1D70D21ECE
                                                    SHA-512:DE9953D0E505D6B110C0CC4E756B5B0311646C9CA4703A33B92147D36CFB4C288D73851E6766CE1432F41AB51B5D0A1D58680BDB4E28F067E1D36F670B4A192E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Rothera) {.. {-9223372036854775808 0 0 -00}.. {218246400 -10800 0 -03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):198
                                                    Entropy (8bit):4.906125935761354
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0tlo+ply:MByMdTiYt2LMq+p8
                                                    MD5:8095A3749DBDE05377836D74A4EEFE33
                                                    SHA1:6987CA972B63AE26A65654961588D51D3EF2166C
                                                    SHA-256:88057832175BB642B23FC99F788A2F78A24005CF1F84A7B1B5E8C84FB8F4D4C1
                                                    SHA-512:9066104C9C16D2AB88523D651C74CE268468E093A497D128D0D12A986BD62DBC1388A56ED1737C2AFACF04185CF06FD0EE66797A3390B2F0E1EB08A4D92AAFAD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/South_Pole) $TZData(:Pacific/Auckland)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.871844665431957
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2L0GRHEtWlFBQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2L0tQB
                                                    MD5:CA52057130DCF506D11A7CC069F4FBA3
                                                    SHA1:2C38B7E7872BB41C3569DFCB539C3EC3AAE24FDD
                                                    SHA-256:2488805DE4FEA42305689F679F1AE2D80B1E934E657FEA329AD39A82DAC63022
                                                    SHA-512:B19D409870939C8F0834C6C028239E010EE5128DFA6E97D4903BECA229B04FE530EA376B936767D9BFE21709720C1791289D8E3622B17C18F2680B0670794A02
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Antarctica/Syowa) $TZData(:Asia/Riyadh)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5370
                                                    Entropy (8bit):3.5134546899897146
                                                    Encrypted:false
                                                    SSDEEP:96:YveRdmbxnKIJqU9XThVIsopb8BcrFgoZVlzeEG+PtJ:UeRdmNnKIIajfopb3FVVJ
                                                    MD5:442F495C36B31CA5D7A9BEFF12105AEF
                                                    SHA1:B3F6CA5B4A5756F9B2C09A27198F7A651CC6032D
                                                    SHA-256:6FD5AB8B7B308CDCEA4B747A81D8675988AE218813C91714FC4CA97919CEBEA5
                                                    SHA-512:C6EAECC26D67D218615EBB5602639DAB62A2578BD9683553D765DC1AC5580627D29B6F911388F5F1BFC284278EA4EBECE94630D3C6B95FF9EF93D3D61A3C2028
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Troll) {.. {-9223372036854775808 0 0 -00}.. {1108166400 0 0 +00}.. {1111885200 7200 1 +02}.. {1130634000 0 0 +00}.. {1143334800 7200 1 +02}.. {1162083600 0 0 +00}.. {1174784400 7200 1 +02}.. {1193533200 0 0 +00}.. {1206838800 7200 1 +02}.. {1224982800 0 0 +00}.. {1238288400 7200 1 +02}.. {1256432400 0 0 +00}.. {1269738000 7200 1 +02}.. {1288486800 0 0 +00}.. {1301187600 7200 1 +02}.. {1319936400 0 0 +00}.. {1332637200 7200 1 +02}.. {1351386000 0 0 +00}.. {1364691600 7200 1 +02}.. {1382835600 0 0 +00}.. {1396141200 7200 1 +02}.. {1414285200 0 0 +00}.. {1427590800 7200 1 +02}.. {1445734800 0 0 +00}.. {1459040400 7200 1 +02}.. {1477789200 0 0 +00}.. {1490490000 7200 1 +02}.. {1509238800 0 0 +00}.. {1521939600 7200 1 +02}.. {1540688400 0 0 +00}.. {1553994000 7200 1 +02}.. {1572138000 0 0 +00}.. {1585443600 7200 1 +02}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):150
                                                    Entropy (8bit):4.825276519494304
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEoKcMFPMXGm2OHvavFYd/bVFXKVVFSTVVn:SlSWB9eg/2L0XcMFPDm2OHEsVFXK/UX
                                                    MD5:EEF1A803C78FEDC2848A967F8F7C8C28
                                                    SHA1:AC0E8008EFE4EF1A393478C82724335EA30BF1CD
                                                    SHA-256:1EFDAE8A23BA4EE37E7992F3C9DCADA6C2E95AF82A955A4C6597E7295C950855
                                                    SHA-512:F19EA119EA4F354099402FDEEAAA551AA2C5FC1295E40B5A82E5896CB41F0C86AD8CAA86FDC4E7BD30AAF0ABAF2794FE7B177C4FE25A89F1C744C400A140AA88
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Vostok) {.. {-9223372036854775808 0 0 -00}.. {-380073600 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.968479138333469
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVyWJooeyXHAIgoqxWJz5RL/2XbeLo4cA4FH/h8Qas:SlSWB9vsM3ymSDSHAIgoXN/2XbUyAK8K
                                                    MD5:3FE28E22313BA8C8100254644DBFD164
                                                    SHA1:46F917F0E706CD072B89C06652DAA032CD67AD98
                                                    SHA-256:944A38702A5176A082755897F1E4B1C88D5721CB499245E2FE51D2CFD849A23F
                                                    SHA-512:BF6E42C039C780EB62CFD69B0375EFF9D459E6468CAFE2323A086D2EB2039B97F805BC361962C72F51F527E96B51973298F13774427E38A28E851A9D19664820
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Oslo)]} {.. LoadTimeZoneFile Europe/Oslo..}..set TZData(:Arctic/Longyearbyen) $TZData(:Europe/Oslo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):171
                                                    Entropy (8bit):4.829666491766117
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFK4h4WFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKs46
                                                    MD5:60D7F3194F19179E0CF0F561F9C40EE6
                                                    SHA1:B079EC49485CFBFFB7A5BE6149319B75684258E9
                                                    SHA-256:8FCDDB246932BAED880B70C0CA867057E7989AEA55EDDC174430E1055CD1058D
                                                    SHA-512:0BDC86B1D473D4875C6F7C092F955D0999E6C1F2EF83CFC7726A3C5BFEB0F5CB8E00B1F0CBC1F91F806EC635C472927504DF681A32DAC55EF372DA16FEA9EF40
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Aden) $TZData(:Asia/Riyadh)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1637
                                                    Entropy (8bit):3.732051305399264
                                                    Encrypted:false
                                                    SSDEEP:24:5qehddmvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10SvPFu+a+CK/Eu3CWuD0Vob1:5YvdJqxiF0rvK50Sv9fGSM
                                                    MD5:D6BCB21F65642F36A159AFD72EC93953
                                                    SHA1:D3E670E579924E6E4F04AB574D48334FF521D8B2
                                                    SHA-256:06DC608C0B8CDD69CCE66A6BF86F141C46DF39CB45312E684E46F19ED8CAFF15
                                                    SHA-512:9A633B629873E5EE5AF923A94865EBE5FD9ECA181B2C47B7368A0828468715E07AD3FD825D5E2312D2D0BA1FA5490E3817C36B6339824C8012A0B75538C4A0DC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Almaty) {.. {-9223372036854775808 18468 0 LMT}.. {-1441170468 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {695768400 21600 0 +06}.. {701812800 25200 1 +06}.. {717537600 21600 0 +06}.. {733262400 25200 1 +06}.. {748987200 21600 0 +06}.. {764712
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7301
                                                    Entropy (8bit):3.7085177447035047
                                                    Encrypted:false
                                                    SSDEEP:96:Fz0T52akyId7+xOXdkwqeIFcvQdaKkIQV9aOBmGILnNoRkEKnFj/XmJmoTSVI:FY85S0VqXFcvQMZUnNrK
                                                    MD5:C5521EB658601F0C03F3122A1529B7B9
                                                    SHA1:0B0F9BD69F3B49DF5D25A9F567471409D7467ED8
                                                    SHA-256:AA5E87C065E5AA4516F1AA50E1840EE22683D3B4C25A4E00CA92C53F96C6D062
                                                    SHA-512:B16039183DF4AF64768F4956075E9557988466E4FC327968712958186CB8F804C1F1B0ED80F5EC7900521CC5710E8AA0DD6716C3B58F7B31116E22CB5785C000
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Amman) {.. {-9223372036854775808 8624 0 LMT}.. {-1230776624 7200 0 EET}.. {108165600 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {215643600 7200 0 EET}.. {231285600 10800 1 EEST}.. {244501200 7200 0 EET}.. {262735200 10800 1 EEST}.. {275950800 7200 0 EET}.. {481154400 10800 1 EEST}.. {496962000 7200 0 EET}.. {512949600 10800 1 EEST}.. {528670800 7200 0 EET}.. {544399200 10800 1 EEST}.. {560120400 7200 0 EET}.. {575848800 10800 1 EEST}.. {592174800 7200 0 EET}.. {610581600 10800 1 EEST}.. {623624400 7200 0 EET}.. {641167200 10800 1 EEST}.. {655074000 7200 0 EET}.. {671839200 10800 1 EEST}.. {685918800 7200 0 EET}.. {702856800 10800 1 EEST}.. {717973200 7200 0 EET}.. {733701600 10800 1 EEST}.. {749422800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2086
                                                    Entropy (8bit):3.7698340044911616
                                                    Encrypted:false
                                                    SSDEEP:24:5DeEdVrEOeFt7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5ZejsFLrcZwvJt2F+doTr9Q3G80
                                                    MD5:6EFC35043BDCA4AB61D72E931DB954E6
                                                    SHA1:F0B4E76C154DC773073E41AA8E94030E972A986A
                                                    SHA-256:D9DF64FDA4638F7604624B0F68A885D5ABADB1DE12AF1AF5581C2AF7DD971562
                                                    SHA-512:16AE582B113D6960C73B64620A8AF20F9D436AA4B3EC8E881617AED3389EB4357931882103F162F19EE8202953A7E6FB4FDD6D7760FB7621F4DB9D229AD13F17
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Anadyr) {.. {-9223372036854775808 42596 0 LMT}.. {-1441194596 43200 0 +12}.. {-1247572800 46800 0 +14}.. {354884400 50400 1 +14}.. {370692000 46800 0 +13}.. {386420400 43200 0 +13}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1665
                                                    Entropy (8bit):3.7149890651919644
                                                    Encrypted:false
                                                    SSDEEP:48:5uvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIkhYwr:sFBNKs6b03zB0WJEuDa7sFZiKWaN6TiF
                                                    MD5:A72FB1FE01C93BD7E0A8136635C72639
                                                    SHA1:2383CF839F50784D4BF8B7EDDB324C80E2DDD0DC
                                                    SHA-256:96B510AF9B8C6BC1DFA84E9ED5E072F3FD484EEB66BBEBC7B6826ED859ED9027
                                                    SHA-512:061FECE3C750C0229638DD8AF38FB3E8E48E59E0DE1B13BCFE46483A7A170B71B9BCB0D6F110B6B2EF68510FA940F9066F14CBD59829E222D6644D3657CE1893
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtau) {.. {-9223372036854775808 12064 0 LMT}.. {-1441164064 14400 0 +04}.. {-1247544000 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {7647156
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1666
                                                    Entropy (8bit):3.721746335201775
                                                    Encrypted:false
                                                    SSDEEP:48:5FUvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQR:PwaBNKs6b03zB0WJEuDa7sFZiKWaN6Tt
                                                    MD5:E278B985BD2515DBCAED8CB741BE9208
                                                    SHA1:BC9F5E72C430661D7ED1AF04571CE5D0F73DD18D
                                                    SHA-256:991638FA2AB2A2F7A091A23D78D99306EE73A740F1A03FBAC448EDCAB55A0E38
                                                    SHA-512:9951DB729B837647CC4B3D2E605525DCCBAFFD39D76460331BF62235DCAE5E4470CDA578F940B1739AABFEC55D293FF60D79AE0EFDFE1EB64E84571881FDEA6A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtobe) {.. {-9223372036854775808 13720 0 LMT}.. {-1441165720 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):878
                                                    Entropy (8bit):3.937249024843323
                                                    Encrypted:false
                                                    SSDEEP:24:5ggeRMdIQvNcDvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKTob3CGcr:5gbkvNSvNhQQvmRKqv0fvzQIovWdvEGD
                                                    MD5:259179C7A1CA04F9F3A373B6C8FCB8C5
                                                    SHA1:D042DF8EFD8EC1473B45B1131BD5EB714F1B2C17
                                                    SHA-256:13745BFA25E6E2D8D0FABAE42CB7C37CF9F974CFB343D4FE84E4E2D64A25926B
                                                    SHA-512:703BEAD5A1E5B3816D98057A08A87C2139F418787F38561FE35175B84E2005365727F85D1B949CC5DF464B207A7D01BB65FB1A632E73DDA523E843B82D76FBBD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ashgabat) {.. {-9223372036854775808 14012 0 LMT}.. {-1441166012 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +05}.. {370720800 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.801820439218014
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8xEYM4DyXHAIgN/ZEYovFvWARL/2WFKUNSH+WFKYEQ:SlSWB9vsM3yR+HAIgH8VWAN/2wKUNSeq
                                                    MD5:5193EF7ADB646798801245BC50C8DDA6
                                                    SHA1:83ED851CBC60EFB330A8FC119E1BED5B4C0BA630
                                                    SHA-256:2C752F641B98E3C05B14AE31330D1F198DAA4A7E354BA9670C7754926BFB891A
                                                    SHA-512:E940E1BE67A9AC895F3D060B1CB34797A429147A9DC2AC0F1162D37D86661EF217EDABA720F0AE3796186FE801229210AC785BB4511CBBE5A41791D236101D8C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ashgabat)]} {.. LoadTimeZoneFile Asia/Ashgabat..}..set TZData(:Asia/Ashkhabad) $TZData(:Asia/Ashgabat)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1666
                                                    Entropy (8bit):3.7265766742957402
                                                    Encrypted:false
                                                    SSDEEP:48:55TvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQJ:XrFBNKs6b03zB0WJEuDa7sFZiKWaN6Tl
                                                    MD5:0236793F90ABC6F68718DDBB44AF5E2F
                                                    SHA1:A5EFAEEF9B9159E748A3FED231F8A978E400482E
                                                    SHA-256:4B7B118E6AE72D41740CF0CB2BD8E970700758DCBC0DD6F298199D841DF8408E
                                                    SHA-512:851C7A9C110790454312BB9C5B5D3C426365EEF4673191B9ABB2E4A32301894C5FB1ADCBE2A4C67BEE416AD63FB8BED85F94EF9BF42473DA4BFFA7824935A1D5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Atyrau) {.. {-9223372036854775808 12464 0 LMT}.. {-1441164464 10800 0 +03}.. {-1247540400 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764715
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1702
                                                    Entropy (8bit):3.7261419515679393
                                                    Encrypted:false
                                                    SSDEEP:24:5/eVvyGiHD6UC4UrUomFMmUZcjbUKNFcUEUvUOpU8MYUWCUlbf/U9bUiUUybUQUF:5m8G9mFdnNF1FfsTuvQXHCe
                                                    MD5:690013310A46BD1AE250A5E019353809
                                                    SHA1:0DF434C7EEB707DC071007FAB112F4DEB37E936F
                                                    SHA-256:D20B75D2604C3B742C1629C5EE02CFF6783E472249982B272B68F2A6DE9BDC38
                                                    SHA-512:FF8C33E55E4F006C38D3FD37A1AD3E1200718CA374ECBEAE8255C7635912F0BB23A59A600BF7130D5660A24C515F726E8440D0D908E560CB59F74059638E6AA2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baghdad) {.. {-9223372036854775808 10660 0 LMT}.. {-2524532260 10656 0 BMT}.. {-1641005856 10800 0 +03}.. {389048400 14400 0 +03}.. {402264000 10800 0 +03}.. {417906000 14400 1 +03}.. {433800000 10800 0 +03}.. {449614800 14400 1 +03}.. {465422400 10800 0 +03}.. {481150800 14400 1 +03}.. {496792800 10800 0 +03}.. {512517600 14400 1 +03}.. {528242400 10800 0 +03}.. {543967200 14400 1 +03}.. {559692000 10800 0 +03}.. {575416800 14400 1 +03}.. {591141600 10800 0 +03}.. {606866400 14400 1 +03}.. {622591200 10800 0 +03}.. {638316000 14400 1 +03}.. {654645600 10800 0 +03}.. {670464000 14400 1 +03}.. {686275200 10800 0 +03}.. {702086400 14400 1 +03}.. {717897600 10800 0 +03}.. {733622400 14400 1 +03}.. {749433600 10800 0 +03}.. {765158400 14400 1 +03}.. {780969600 10800 0 +03}.. {796694400 14400 1 +03}.. {812505600 10800 0 +03}.. {82831
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):171
                                                    Entropy (8bit):4.784355129067593
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8hkXHAIgNvZORL/2WFKENUKMFB/4WFKKB:SlSWB9vsM3yBkHAIgPON/2wKENUr/4wT
                                                    MD5:1B5E0D449DAEF469D586A853CB3073AD
                                                    SHA1:FD735B0472B31644E787767B82B737CC39EC4175
                                                    SHA-256:3D437037FBF2BBDF969C8E71967080947F24860D431B39F5D8F23151316ABCD5
                                                    SHA-512:2A2DC33D4258A5E1AE59172883F3B11723798ED35CF5AF1B8BA81A8807DC6F8222C8044D82B152EF6AF43E7350FEB2625D4406C6C7DD309CE65810EA3D3286B6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Qatar)]} {.. LoadTimeZoneFile Asia/Qatar..}..set TZData(:Asia/Bahrain) $TZData(:Asia/Qatar)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2149
                                                    Entropy (8bit):3.6155622322573713
                                                    Encrypted:false
                                                    SSDEEP:24:5/eFdqlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUTIEjvZJ+76:5RsUf8mFpNWFny1ZGMte3aivUKo
                                                    MD5:294DFC98F67AC00A188EC3D3B87C501C
                                                    SHA1:93C434CD9AA170E35AD676C88EE09986A94EC02A
                                                    SHA-256:873E8F08B87610D0DAFE239D32345248A4595C6B13D1DA83EC214D78E88FA12C
                                                    SHA-512:5346082CCA733724C0D2C36B768467E59BA9ED6452B6CF1BA923AF4F0D2BC05C67DB49E804CA81DAD449D30D0835026D708D9AB632D02FDA1EA1A0BF717111DE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baku) {.. {-9223372036854775808 11964 0 LMT}.. {-1441163964 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 14400 0 +04}.. {820440000 14400 0 +04}.. {828234000 18000 1 +05}.. {846378000 14400 0 +04}.. {852062400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.911309754748998
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKELYOiMXGm2OHB+keoHvZKmrROpDovFFsQ+8EXVeVSYe:SlSWB9eg/2wKELeDm2OHxeoHvZ3FO1og
                                                    MD5:9AC4947AC29C797055B7EBFA4F6AC710
                                                    SHA1:E7758A9A8BFA255F6B2D27F5366D9FE2A26DDF6C
                                                    SHA-256:6E72BA908F250FD45D554A12E3E7B3BD2F1C02A6C2431F806FD2A054F843AA90
                                                    SHA-512:F9D0F0CB7D3726C2AB3B5049429172D9DD4BA21353F6F98570CBA4EE969F7D97BD973CB165AECFF930AFFA8633E8052624D44EE7FB91763681ED3F78A61F4F98
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bangkok) {.. {-9223372036854775808 24124 0 LMT}.. {-2840164924 24124 0 BMT}.. {-1570084924 25200 0 +07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2117
                                                    Entropy (8bit):3.7025684250364725
                                                    Encrypted:false
                                                    SSDEEP:24:5VeTtXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEnsr:5n40yVRB7VfXucdKmtTTDOV
                                                    MD5:6CC13B6910412A3A3D16CA36ADF00352
                                                    SHA1:061CF4A8FEA8C139F50F96E6B6506B50ED3DD792
                                                    SHA-256:992F93A7975F8CD4E94D96B3BA1ECFB3585E52A53F4442A15993402D3F955F66
                                                    SHA-512:4E9750B1C3C0BA4F7922BCBC76276A3E74031D78A98E21DC59F66D6EA8E1B70865BBEB50A6B77EB0423421A18428B97B47412053CE15213128CEED669F4DD6E8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Barnaul) {.. {-9223372036854775808 20100 0 LMT}.. {-1579844100 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {76470
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8024
                                                    Entropy (8bit):3.7230911686481774
                                                    Encrypted:false
                                                    SSDEEP:96:4nBKPP8LFH0TDkywaZb1QSCK5VUjiO1PoBQpo7778CZicJZS80EGcLt4Mok1MgJl:4M38LCRZb+sAiO1PoBQpo1ikjD
                                                    MD5:1D99E2BBB01B1669403CFBAF7E03F733
                                                    SHA1:DBDD58C7FD195FC602C4541D6F416CC96094C121
                                                    SHA-256:17AF14646D562AFE17DCCFD1D2FBA95C122F3E0263906A36EB48BFF04ACF233E
                                                    SHA-512:98524E8DCD17C090058F17BDA1200D9801EB1B14EB5CEB8C31149A4A402A53BA4923A2AFF457E0A72DAA601D88095247806F945F704000F874FCBF73631DD135
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Beirut) {.. {-9223372036854775808 8520 0 LMT}.. {-2840149320 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1473645600 10800 1 EEST}.. {-1460948400 7200 0 EET}.. {-399866400 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336794400 10800 1 EEST}.. {-323578800 7200 0 EET}.. {-305172000 10800 1 EEST}.. {-291956400 7200 0 EET}.. {-273636000 10800 1 EEST}.. {-260420400 7200 0 EET}.. {78012000 10800 1 EEST}.. {86734800 7200 0 EET}.. {105055200 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {212965200 7200 0 EET}.. {231285600 10800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1669
                                                    Entropy (8bit):3.7443715330695735
                                                    Encrypted:false
                                                    SSDEEP:48:5qvdJqxiF0rvK5XvV4vUzvCjvT7voPvkPvJUbvn0vYpv99v3uvuWvKJhv3T:Ad1mzK5/VkULCbTjoHkHJUDnQYV9p3mO
                                                    MD5:1EE8FF3DF0D931A140ADBB021EB3BFEB
                                                    SHA1:F1F15EF70C4E9F456849AF89CAC97AD747D9E192
                                                    SHA-256:1D5E9A8F6A04273AF741F648EF10718B004A60D7884FE432DDF85A8F558BEA98
                                                    SHA-512:155539A5CF21A34FBFACBF1652D934BF32255F4E505E60B3B4D8B5F2F7FAE552E6CB4824D8608A9C56370F58E48702335995BBD16B7A296A86A72A615FBC8ABC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bishkek) {.. {-9223372036854775808 17904 0 LMT}.. {-1441169904 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {683586000 18000 0 +05}.. {703018800 21600 1 +05}.. {717530400 18000 0 +05}.. {734468400 21600 1 +05}.. {748980000 18000 0 +05}.. {765918000 21600 1 +05}.. {78042
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.843807524560784
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKXeAMMkSMXGm2OHCQdvVVoHsWUOVFW/FvOVSSFdaUMWO:SlSWB9eg/2wK0iDm2OHCIvVVoH3UuW/N
                                                    MD5:37B0C37CDDEE62E6002AF3D09B0B6225
                                                    SHA1:75F1329492C231587FE233175D9B71112DA09B08
                                                    SHA-256:A4216B59F2478DE7E88A99E2B11BBBD93070477D7E62BFD453D1CA430EBB4834
                                                    SHA-512:6FDC5C74F927970DA261A5842D9647E97163009A2902C8A8AB6DFAACF261485AB179495D2D72FAC513D1A27F662553F1F0EEC8687E009EA5753D5A9E6B0A0D34
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Brunei) {.. {-9223372036854775808 27580 0 LMT}.. {-1383464380 27000 0 +0730}.. {-1167636600 28800 0 +08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):178
                                                    Entropy (8bit):4.774027471796823
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq864DyXHAIgN1QvRL/2WFKh0s+WFKvovn:SlSWB9vsM3ya4DSHAIgcvN/2wKN+wKvy
                                                    MD5:8BB098AB77CB0469B1FA0E0B64C4A9E7
                                                    SHA1:88C73626985071DD0923E1CAB343ACCD854A7297
                                                    SHA-256:1BAEF7850111D2C33B2A766A8AE804534ABA1711BF80A4087A89656DDD8469D5
                                                    SHA-512:82216A7F787AF20A4C97C7AA754CD6BE979FEF24137CF9A8B18EECA5E8FBCF12834DD8A6FC9CD2357D807F1629806745B46B11DC0472E0284E18DCCC983897DE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kolkata)]} {.. LoadTimeZoneFile Asia/Kolkata..}..set TZData(:Asia/Calcutta) $TZData(:Asia/Kolkata)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2086
                                                    Entropy (8bit):3.6981807774781017
                                                    Encrypted:false
                                                    SSDEEP:48:5Bpr1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2M:95PhtjLiII2ZFlgd
                                                    MD5:69E03A5CEB689E19B60168C0F7EBAE8E
                                                    SHA1:95C6396EB753753B4FE4AE1B98D76332523E72A4
                                                    SHA-256:10B6F435B05D887176A4D90CA5AC957F327F62F36F15D6F6E4F81844662429B9
                                                    SHA-512:DFA72EDC54A11F0840ADBEE7F5AD8EA472AA52A1F196292F1341CD92A68FB2EC0A5BC7DE6C8E83C975420DB4B76CECD4393370FDB2C09F86EC11A50E540F6F02
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Chita) {.. {-9223372036854775808 27232 0 LMT}.. {-1579419232 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647012
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1619
                                                    Entropy (8bit):3.775783980828041
                                                    Encrypted:false
                                                    SSDEEP:48:5th5fSW2sp4Qh2rRSQnGw7GywvWbC25XrMYWG4AIQTUhp9pkTGdXguHaena44XY5:rh5kpmWG29QFUmD
                                                    MD5:540A7304A62ABB8D7F84454ABD6E2556
                                                    SHA1:52C37529929218A668D7A4AD6FD1B5FE0A727E16
                                                    SHA-256:94B2C14EF45C695EF6B19D94722E1BCBB629A595F2866DBA80F00A66721040B5
                                                    SHA-512:3B535D109DB369E301D6B412F21EC990976B997826F22B2E16ECEEEB048D60F064C7CA1A616393DC2F1B491BAC0548DC0965B9EA149A95280FFDBCAD6726EF0F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Choibalsan) {.. {-9223372036854775808 27480 0 LMT}.. {-2032933080 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 36000 0 +09}.. {433778400 32400 0 +09}.. {449593200 36000 1 +09}.. {465314400 32400 0 +09}.. {481042800 36000 1 +09}.. {496764000 32400 0 +09}.. {512492400 36000 1 +09}.. {528213600 32400 0 +09}.. {543942000 36000 1 +09}.. {559663200 32400 0 +09}.. {575391600 36000 1 +09}.. {591112800 32400 0 +09}.. {606841200 36000 1 +09}.. {622562400 32400 0 +09}.. {638290800 36000 1 +09}.. {654616800 32400 0 +09}.. {670345200 36000 1 +09}.. {686066400 32400 0 +09}.. {701794800 36000 1 +09}.. {717516000 32400 0 +09}.. {733244400 36000 1 +09}.. {748965600 32400 0 +09}.. {764694000 36000 1 +09}.. {780415200 32400 0 +09}.. {796143600 36000 1 +09}.. {811864800 32400 0 +09}.. {828198000 36000 1 +09}.. {843919200 32400 0 +09}.. {8596
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.865222436335267
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKh2V7/4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKho4wKU
                                                    MD5:C5DC40C6325391F7247251ADB2C07F78
                                                    SHA1:3DDB1BF94532FB1F1271095B9C8CAA779BC545EF
                                                    SHA-256:A87382DC5F3C3141547A65E3746AF1DAF94B51468B96DA6CEF30E95754C97D37
                                                    SHA-512:062FF8D5E5392E5372B0405EDF3C7CF997AC33F95EBFFAA9CC9AB82BBE27B60C80255FCCEE9E6F5E02CBFCB163F99984BB2103217FFD1F80BDEC5C684BF2F61A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chongqing) $TZData(:Asia/Shanghai)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.889115378893491
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFK7LeL9J4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wK7LUT4wj
                                                    MD5:C3676771EB813B346F58A7B574D0D7B5
                                                    SHA1:A473EF621309E019F29F3DEF95C38593775B8404
                                                    SHA-256:D6D2B4A761C547F1F853AE901AC71AB49FBE825037079C4E0C89DC940AE4A822
                                                    SHA-512:21C3A5D499E6E0427FBF585CA8CC5D99D193C586483AB107C4D8E9F9DC8412021E8E019A314757DAFE1225D2635F6D48E9C54A511709863F22A02449FA201E02
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chungking) $TZData(:Asia/Shanghai)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):369
                                                    Entropy (8bit):4.465596050904646
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKr+iDm2OHgoHvZv9tdvjSWV/FSQipPUrKkTD/k5QqRVVFSQOR/UIp:MB862zZmdHgCvZvJvj1Nj+Phkv/YtvjA
                                                    MD5:9541BB43E79AB0C6E8163945B5BFB1BF
                                                    SHA1:C4994420DB8313DECDE19B4B9F6C5DB0126A95A7
                                                    SHA-256:E5B5E6D607A15DA65CB00C92C35A63EAF25F547E64CB34BB419CB8CFC2714B1B
                                                    SHA-512:46F623B3F7CF8A50F97DD812521398EB9100C9CDFB967C18EF1BD112306AAEB3C9CB224424E48611CB8CC21D1DC3D820DD83032D12BC9DF19301CF07786FA664
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Colombo) {.. {-9223372036854775808 19164 0 LMT}.. {-2840159964 19172 0 MMT}.. {-2019705572 19800 0 +0530}.. {-883287000 21600 1 +06}.. {-862639200 23400 1 +0630}.. {-764051400 19800 0 +0530}.. {832962600 23400 0 +0630}.. {846266400 21600 0 +06}.. {1145039400 19800 0 +0530}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):169
                                                    Entropy (8bit):4.786111096226559
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ntyXHAIgN6KyFvRL/2WFK1S2WFKwBn:SlSWB9vsM3yHtSHAIgMKON/2wKM2wKwB
                                                    MD5:BA575D37459540907A644438071277F8
                                                    SHA1:14CF10D6AABBAF7BAE42B3B9641D8469C206567F
                                                    SHA-256:B3AD560F66EA330E54A147017E6E6AB64452A5255D097B962D540836D7B19EE7
                                                    SHA-512:9CA386EF4D812B00C2E63558B81B273F92BBCA98AF304C9FD6FC166210FC4E2F92B769E1D6FB96B670650DC76EFFAD2FC6E39AE12C24B47EAED4E50A2AFAC2D7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dhaka)]} {.. LoadTimeZoneFile Asia/Dhaka..}..set TZData(:Asia/Dacca) $TZData(:Asia/Dhaka)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8311
                                                    Entropy (8bit):3.719987853637512
                                                    Encrypted:false
                                                    SSDEEP:96:8YI5WpVAdVGlkBOLh8X0CkBheIFlPup7YI6z0Y3lV9Jitv5F6Ya7vEzg93kn/R:8dIpqdk6BrqhXFlPUsz57AbV
                                                    MD5:DCB84F498498C06953E7FC1A4FD9AF17
                                                    SHA1:5B5A115CDA727C9439667E3E95CA3333E49BA810
                                                    SHA-256:7D44F4C16E862752D399999B9F0B1E4E8ED5D80C1322A980094801DD8A4A03EB
                                                    SHA-512:DC143B6DB263377413D4BBC9575236D525F6ED898934CB9A2FC1E3B32E1235F2D86BD8E133B38463DFC143EC2F6E8AA9184048479A4E797C39D63A1AD364BB74
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Damascus) {.. {-9223372036854775808 8712 0 LMT}.. {-1577931912 7200 0 EET}.. {-1568592000 10800 1 EEST}.. {-1554080400 7200 0 EET}.. {-1537142400 10800 1 EEST}.. {-1522630800 7200 0 EET}.. {-1505692800 10800 1 EEST}.. {-1491181200 7200 0 EET}.. {-1474243200 10800 1 EEST}.. {-1459126800 7200 0 EET}.. {-242265600 10800 1 EEST}.. {-228877200 7200 0 EET}.. {-210556800 10800 1 EEST}.. {-197427600 7200 0 EET}.. {-178934400 10800 1 EEST}.. {-165718800 7200 0 EET}.. {-147398400 10800 1 EEST}.. {-134269200 7200 0 EET}.. {-116467200 10800 1 EEST}.. {-102646800 7200 0 EET}.. {-84326400 10800 1 EEST}.. {-71110800 7200 0 EET}.. {-52704000 10800 1 EEST}.. {-39488400 7200 0 EET}.. {-21168000 10800 1 EEST}.. {-7952400 7200 0 EET}.. {10368000 10800 1 EEST}.. {23583600 7200 0 EET}.. {41904000 10800 1 EEST}.. {55119600 7200 0 EET}.. {73526400 10800 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):364
                                                    Entropy (8bit):4.412125512631861
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKwiDm2OHEmVFnoHv9vX+Yl7UIFckVVFSQiL/FG/UIvy/Ur9i/Ur97:MB862Y2mdHzdCv9P+Y9vvjeQlP9/9VkK
                                                    MD5:B5496A038AC230B9D75AA22BB2BE6BDD
                                                    SHA1:ACFD9C78F803F344272E8E188C41ED969EBADA16
                                                    SHA-256:BFC4562055CC4355E79F9EFAA580A4C6A658285916159A5D390A0CDA96A97E98
                                                    SHA-512:AB05D0176DADC1ED03CC526C372B9827A5FA03459E4F4B4365C6CE4B6FBDA043514A9D3FE2DA747159C5A1BC0E07727E6578A101E42B4DB120AF9624368C5FEA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dhaka) {.. {-9223372036854775808 21700 0 LMT}.. {-2524543300 21200 0 HMT}.. {-891582800 23400 0 +0630}.. {-872058600 19800 0 +0530}.. {-862637400 23400 0 +0630}.. {-576138600 21600 0 +06}.. {1230746400 21600 0 +06}.. {1245430800 25200 1 +06}.. {1262278800 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):235
                                                    Entropy (8bit):4.597480383845617
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKCXeSDm2OHnBGeoH1mpvyvScHTU71avScr:MB862qXbmdHnBvC1SyHHq8Hr
                                                    MD5:316DDF860FA234621698EB473E558DB7
                                                    SHA1:35BF955F764555945CF8B314B8E881DAD6CF557B
                                                    SHA-256:8BC2E0D77AC35B6D63E11B820AC45EC23A4195ED773680C600C772FDF4B953F8
                                                    SHA-512:D1A8D5F1DAAB7827BDCBC14506AF8681FD1ED94C6101CC4A3C8CC2A76EA7D3649038069158C539A2007A1B0734FBD87DE120415E07A3F08F44417100C95459F5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dili) {.. {-9223372036854775808 30140 0 LMT}.. {-1830414140 28800 0 +08}.. {-879152400 32400 0 +09}.. {199897200 28800 0 +08}.. {969120000 32400 0 +09}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):148
                                                    Entropy (8bit):4.97292023820863
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKQUMXGm2OHvkdoHsQK23NVsRYovV:SlSWB9eg/2wKQUDm2OHvsoHxVNSN
                                                    MD5:861BA4A0A71E6C3F71B90074275FD57C
                                                    SHA1:BC6FC5233340BB19AE4BD0BA563875479AC0A2B9
                                                    SHA-256:3DB174F1568BC23BF467A3DC7BAF8A2A2952B70653D4DE54F4DB391EC50B6925
                                                    SHA-512:B187735E0783F299253D9F93E002AEFF131FCCA50FB3E04CF0545B334B051D5ED978108A47C6957B608F5F93ED4CC3D69751FE0F40413719EE1C0440CD49AC76
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dubai) {.. {-9223372036854775808 13272 0 LMT}.. {-1577936472 14400 0 +04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):820
                                                    Entropy (8bit):3.969189280047274
                                                    Encrypted:false
                                                    SSDEEP:24:5we3dJvOt81FCuLqecDngO6jPvTpYy5T4TiFGDr:5BvdJqxiF0uGr
                                                    MD5:9ABD0ECB5F3E738F49CDD1F81C9FF1A4
                                                    SHA1:46B68C7BBD1BE9791B00128A5129AA3668435C93
                                                    SHA-256:550DB44595F59D0F151BE4AF70D6FECE20580AB687EF45DE2A0A75FB2515AC80
                                                    SHA-512:67E2B0EF216D509C4B6DD367519E0A733E54A7CA767D5F7960715E8056E61B7B633C7516D568544F55C9277E90412C1443B822C6EED3341C01F1BD9AA9476FA1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dushanbe) {.. {-9223372036854775808 16512 0 LMT}.. {-1441168512 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 21600 1 +06}.. {684363600 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7597
                                                    Entropy (8bit):3.7170041442081203
                                                    Encrypted:false
                                                    SSDEEP:96:G3pv/7V6Aj8aZaNlK0UpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:G3v/AaaivBeRF+W35Syrwl9h5j
                                                    MD5:F8E4BA3E260452AE13CF234E60149A62
                                                    SHA1:8DDB08E2FDEEF6539EE0C0038B166908BFED16CD
                                                    SHA-256:8CFE85C48FC22033411432F8B75EE4C097A5D84897698CB1AFD5AB51C47FF5A3
                                                    SHA-512:487177411FB7E9F83AB9AAD84B685322B13A85784D4F90BB9C30F57BFAA6A9298E5C4F36C97444DE1117E51F85A62DC639D08B405460D071C2B29C898553E9A3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Famagusta) {.. {-9223372036854775808 8148 0 LMT}.. {-1518920148 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {622587
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8427
                                                    Entropy (8bit):3.7517631589916043
                                                    Encrypted:false
                                                    SSDEEP:96:NyHSd2XK1GbJFp3gP0nPVl8dcqU/8O8pc1FlvaiSjxHe5PTisXNlDN3uMeVunBjq:NyyIgGbJv3dPAD7c1Flvai+4j/NKJ
                                                    MD5:E539AE663A076DD9F1C6E927289DE5B1
                                                    SHA1:855BCE0790A7259B01181861BCC748FE5F2815EB
                                                    SHA-256:F030E2B3DBCA556C36602FBF234C7DB7D4F222D02CFAB192288E91E6A1BF3C90
                                                    SHA-512:83E87396576A36455DF22EE809D71CBD18CDEC7F574A7AABFF6D5A21A71D2BE865B84105E2D72FD89F3C9AB19B66B6893F82934925E2311A8E6EAA015D6227F9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Gaza) {.. {-9223372036854775808 8272 0 LMT}.. {-2185409872 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-16580
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.86422571961583
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKwHp4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKi4wKU
                                                    MD5:1BCCB3578FADE993EE8B2C11EAC06CD8
                                                    SHA1:CAEAB714E014CD5040C44E4603708B97BC0B03D4
                                                    SHA-256:12811A7944B892E3D1C0B4B09057CC1899F28081B3CD47FFD248BA49BA308AF0
                                                    SHA-512:1D791DC0E8F45359366DF33C2C337688D2E0E972A90F038733B840D28585505AEF542DDBAD014C9EA8C252048A588CD017DD67A84545A81EDB7C17E3B2E65092
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Harbin) $TZData(:Asia/Shanghai)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8402
                                                    Entropy (8bit):3.754379249421927
                                                    Encrypted:false
                                                    SSDEEP:96:fXSd2XK1GbJFp3gP0nPVl8dcqUZ8O8pc1FlvaiSjxHe5PTisXNlDN3uMeVunBj5w:fiIgGbJv3dPADPc1Flvai+4j/NKJ
                                                    MD5:02B58C89D64C423A47559B2386FDAD1F
                                                    SHA1:B01C4C83ACB44F454A593A510BCBB5A4068EC835
                                                    SHA-256:2C126BA5F78CF7A13FBDFE00F647BB29E2AC104B89AB51B39281047D9B2E45A7
                                                    SHA-512:BBF564FBBDF90091F4D97F3DCFA0F2AF1CE6EB6B0D24CE4F4133E098F7A637344A78BB27DD8160D8424148ECB46B7BF578959B15F9AA0AEAD5D080DCE7C9C176
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hebron) {.. {-9223372036854775808 8423 0 LMT}.. {-2185410023 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):395
                                                    Entropy (8bit):4.419283016412891
                                                    Encrypted:false
                                                    SSDEEP:12:MB862RLmdHqCv3tYC5sF/p+zHHviViksF/dMUYPsF/RQ9EsV:5debv3td5sFR+znv2vsFlM/PsFVsV
                                                    MD5:5154581E724080F43C9D68B983C5CF77
                                                    SHA1:1BC86A418AA654DA9EF73954DFD01ACF53D796E9
                                                    SHA-256:FE977368691F4FA43D068CD8D989F39D2AEC46D199D7D629B8DD3ECF7423A335
                                                    SHA-512:3708654E022919D5CDC2CA90D8623370CFFF248E3AF10ECCBB6F56BC7E8DD000E6119614C30678D6628BBE6A8CCA00746315108A04632B3F6DD2DE172BBF8956
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ho_Chi_Minh) {.. {-9223372036854775808 25600 0 LMT}.. {-2004073600 25590 0 PLMT}.. {-1851577590 25200 0 +07}.. {-852105600 28800 0 +08}.. {-782643600 32400 0 +09}.. {-767869200 25200 0 +07}.. {-718095600 28800 0 +08}.. {-457776000 25200 0 +07}.. {-315648000 28800 0 +08}.. {171820800 25200 0 +07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2226
                                                    Entropy (8bit):4.0055033036300145
                                                    Encrypted:false
                                                    SSDEEP:48:5Ze9l9Pm4yoHtTYJJIX1Zcp6GS0j1SPQpP6gPE8fTZIPNYQGm75st/nQdwi9:DyaoTcwQt6EsQTng
                                                    MD5:26BCBBA28AE34FE3CF7D17EF4C6B69C8
                                                    SHA1:5324DEA8E7965C66650E7B4769EFA1297B508486
                                                    SHA-256:EE9A6997BC1AAD4A8FA95DB312774C3F37FBB895549230C30FC66C02CC170EB6
                                                    SHA-512:54594CD18838B4A8947EBB5BDE2415727CC127CF79AEC98FC0F5D5A32F68EEAF4E079853239DE9F753CE90F18EFD55AE51FC43D64E313666CEA0EF8AC93BF065
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hong_Kong) {.. {-9223372036854775808 27402 0 LMT}.. {-2056690800 28800 0 HKT}.. {-900910800 32400 1 HKST}.. {-891579600 30600 1 HKWT}.. {-884248200 32400 0 JST}.. {-761209200 28800 0 HKT}.. {-747907200 32400 1 HKST}.. {-728541000 28800 0 HKT}.. {-717049800 32400 1 HKST}.. {-697091400 28800 0 HKT}.. {-683785800 32400 1 HKST}.. {-668061000 28800 0 HKT}.. {-654755400 32400 1 HKST}.. {-636611400 28800 0 HKT}.. {-623305800 32400 1 HKST}.. {-605161800 28800 0 HKT}.. {-591856200 32400 1 HKST}.. {-573712200 28800 0 HKT}.. {-559801800 32400 1 HKST}.. {-541657800 28800 0 HKT}.. {-528352200 32400 1 HKST}.. {-510211800 28800 0 HKT}.. {-498112200 32400 1 HKST}.. {-478762200 28800 0 HKT}.. {-466662600 32400 1 HKST}.. {-446707800 28800 0 HKT}.. {-435213000 32400 1 HKST}.. {-415258200 28800 0 HKT}.. {-403158600 32400 1 HKST}.. {-383808600 28800 0 HKT
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1583
                                                    Entropy (8bit):3.7521760184466206
                                                    Encrypted:false
                                                    SSDEEP:24:5x3LecCvgsFFFKOksF8FpsF71FQnsFNFxhsFlF6sFaFasFZFisF8GF5sFKLFAZsZ:5FqKVx8Cq9f/y2L
                                                    MD5:A77140A0D8C2D3E2993E4BA7CADFB4C6
                                                    SHA1:AE3586264A86D42F578D4B0F7A30C9BE6047EAB1
                                                    SHA-256:CA88A45E954A9854C680B399E69E4858BF5E861FABFADC19D62D97B734B25415
                                                    SHA-512:05EA9D903EEC755F799B7C2399ED933245A5AE3A594648FE37AF1CE7699AE499B4ED159F428D91259D80BC9AF5117F2DA055A506AED94E5281C38B7AFF69C6FE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hovd) {.. {-9223372036854775808 21996 0 LMT}.. {-2032927596 21600 0 +06}.. {252439200 25200 0 +07}.. {417978000 28800 1 +07}.. {433785600 25200 0 +07}.. {449600400 28800 1 +07}.. {465321600 25200 0 +07}.. {481050000 28800 1 +07}.. {496771200 25200 0 +07}.. {512499600 28800 1 +07}.. {528220800 25200 0 +07}.. {543949200 28800 1 +07}.. {559670400 25200 0 +07}.. {575398800 28800 1 +07}.. {591120000 25200 0 +07}.. {606848400 28800 1 +07}.. {622569600 25200 0 +07}.. {638298000 28800 1 +07}.. {654624000 25200 0 +07}.. {670352400 28800 1 +07}.. {686073600 25200 0 +07}.. {701802000 28800 1 +07}.. {717523200 25200 0 +07}.. {733251600 28800 1 +07}.. {748972800 25200 0 +07}.. {764701200 28800 1 +07}.. {780422400 25200 0 +07}.. {796150800 28800 1 +07}.. {811872000 25200 0 +07}.. {828205200 28800 1 +07}.. {843926400 25200 0 +07}.. {859654800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2089
                                                    Entropy (8bit):3.7296034934492694
                                                    Encrypted:false
                                                    SSDEEP:48:5PZy4DdOKStci4KjXoYjoSvfQJWE00dtT43kgiTskNrrBizhzRBqY3M:Py2/svfraBGfgP
                                                    MD5:C9F7AC464970567E5C38CB01ED2297AE
                                                    SHA1:453718BACCAE3FACD761AF22CA5875185478ADDD
                                                    SHA-256:61BAAAD6315FFBDAED6F266880165B06ECCAF72F660B7FB01C8B654F3952D68E
                                                    SHA-512:72044EFAE262CC12974F2DE2AAF06AC4C31BE73071ACD53DDC6B8D8BFC6FBDF937EC03DC881901F730659BDE662FBCFC76C57B2C086DAA97F160530464FBA7C6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Irkutsk) {.. {-9223372036854775808 25025 0 LMT}.. {-2840165825 25025 0 IMT}.. {-1575874625 25200 0 +07}.. {-1247554800 28800 0 +09}.. {354902400 32400 1 +09}.. {370710000 28800 0 +08}.. {386438400 32400 1 +09}.. {402246000 28800 0 +08}.. {417974400 32400 1 +09}.. {433782000 28800 0 +08}.. {449596800 32400 1 +09}.. {465328800 28800 0 +08}.. {481053600 32400 1 +09}.. {496778400 28800 0 +08}.. {512503200 32400 1 +09}.. {528228000 28800 0 +08}.. {543952800 32400 1 +09}.. {559677600 28800 0 +08}.. {575402400 32400 1 +09}.. {591127200 28800 0 +08}.. {606852000 32400 1 +09}.. {622576800 28800 0 +08}.. {638301600 32400 1 +09}.. {654631200 28800 0 +08}.. {670356000 25200 0 +08}.. {670359600 28800 1 +08}.. {686084400 25200 0 +07}.. {695761200 28800 0 +09}.. {701805600 32400 1 +09}.. {717530400 28800 0 +08}.. {733255200 32400 1 +09}.. {748
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.9013773460609
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/2WFK4HB/8QaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/2wK4HJa
                                                    MD5:8A92C690BE27A69D122BFF51479B7B56
                                                    SHA1:52DB64587A347F34153A51788BDE8C349D966575
                                                    SHA-256:1F77C4BD27574E1D2066885DEF01806A02D3E444424A219A8EC5C114F89665E5
                                                    SHA-512:FEDF57C4862B6792A789F339EB1027EC8A8472B01B7D1D0814C419850B9AC03A7B454FDB04D8BECE166E9A8BCAA58B0B461007A6C824B30B1080991A1DB49CCA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Asia/Istanbul) $TZData(:Europe/Istanbul)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):370
                                                    Entropy (8bit):4.4733192761103515
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKcrJfDm2OHATJeoHMaSYov/YSZkc5q/MVSSFFWSyvScH+dMVSSFL+:MB862EJLmdHjCEdOc5aMxaSyHHaMxF6P
                                                    MD5:C689A1AA9FFE535AEB3AD3D7EDE55172
                                                    SHA1:0520FC9A4619FB555A79C5DF2AE82422BF2C5EDA
                                                    SHA-256:2F39D9F93761B85C254F458317A7DE2B4184BE9459F2193A85C08662E801269A
                                                    SHA-512:C1034FB2FCFEF201C5362AF21B048B6637A824C5C93D75854CF3807892C772CD4376533E58BFF8D8726F531F43CB231365B8012EBD3C1BECED865D3CD2D6673D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jakarta) {.. {-9223372036854775808 25632 0 LMT}.. {-3231299232 25632 0 BMT}.. {-1451719200 26400 0 +0720}.. {-1172906400 27000 0 +0730}.. {-876641400 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 25200 0 WIB}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):213
                                                    Entropy (8bit):4.834345288972067
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKcaDm2OHG4YoH1kcfvScHVowkVcr2CV4zvhyov:MB862PmdHNYC6cfHHVop2NVkoov
                                                    MD5:2CB3A13FCC48F8C4457E001FC309918B
                                                    SHA1:83174176815CB93D216B5BC532C120EC8AC433CF
                                                    SHA-256:761C1E80FEBF46D6D6215CEBF211F121974156D9BCE2FB4258C1074C6ED2CE22
                                                    SHA-512:65009020AB9FEC2F8158A4851A78B71127F9B262DDD1472583942E19B7C086304F54BC8DAE5A40BD1448BCAEDA0FDBACCD19400E10FFA0357E324535F9036EF0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jayapura) {.. {-9223372036854775808 33768 0 LMT}.. {-1172913768 32400 0 +09}.. {-799491600 34200 0 +0930}.. {-189423000 32400 0 WIT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8135
                                                    Entropy (8bit):3.770028446231146
                                                    Encrypted:false
                                                    SSDEEP:96:GKfnxFAEX/nPVl8diAg9oEhH20AHz7LzdWhYbBJPXuVhKaM76Rmg4DLeEcNptv5C:7ffBvPAzF0AHzPzdD1+XBRF0
                                                    MD5:884227D48C92BA6C519BFE571D4F1037
                                                    SHA1:21F8977816C2B439686A50D353B836A6D132A946
                                                    SHA-256:0BDC2C693134199C2ECD374CC01468813DB29DF47422C706A3EA2BE5ECCA177A
                                                    SHA-512:8A09F1FE11DAD203501A16FE6A2CAEC969FE3553B456B8BD1997E55B3EE430B2BB4B54F7D87C5E99931FD96E7C769CAA618C777EBD23FBD1E1A0F57409422914
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jerusalem) {.. {-9223372036854775808 8454 0 LMT}.. {-2840149254 8440 0 JMT}.. {-1641003640 7200 0 IST}.. {-933638400 10800 1 IDT}.. {-923097600 7200 0 IST}.. {-919036800 10800 1 IDT}.. {-857347200 7200 0 IST}.. {-844300800 10800 1 IDT}.. {-825811200 7200 0 IST}.. {-812678400 10800 1 IDT}.. {-794188800 7200 0 IST}.. {-779846400 10800 1 IDT}.. {-762652800 7200 0 IST}.. {-748310400 10800 1 IDT}.. {-731116800 7200 0 IST}.. {-681955200 14400 1 IDDT}.. {-673228800 10800 1 IDT}.. {-667958400 7200 0 IST}.. {-652320000 10800 1 IDT}.. {-636422400 7200 0 IST}.. {-622080000 10800 1 IDT}.. {-608947200 7200 0 IST}.. {-591840000 10800 1 IDT}.. {-572486400 7200 0 IST}.. {-558576000 10800 1 IDT}.. {-542851200 7200 0 IST}.. {-527731200 10800 1 IDT}.. {-514425600 7200 0 IST}.. {-490838400 10800 1 IDT}.. {-482976000 7200 0 IST}.. {-459388800 10800 1 I
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.8546989169864085
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKTtNMXGm2OHodFxsYoHvgVHURRNVsRYovFFFkdj/cXHF:SlSWB9eg/2wKTPDm2OHoH+YoHvgVHURA
                                                    MD5:9BD9B21661C235C0794078EC98978D3B
                                                    SHA1:3D854780F49D0E5F5A190DC9367C7406127C5E4D
                                                    SHA-256:A59C95C038F2E945D685D96FA9B859CE82A643A1B7F56EB36B2C809DE91CD4BA
                                                    SHA-512:A76E99CF03DA8897F0A210A98DB79E4CD60070F2BE363D0D0960D9882919F9B49978FA55BB2500F1648ADD4080730CAD85BAFF61D885A9EAD394AC04C850F6BA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kabul) {.. {-9223372036854775808 16608 0 LMT}.. {-2524538208 14400 0 +04}.. {-788932800 16200 0 +0430}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2060
                                                    Entropy (8bit):3.788131608921229
                                                    Encrypted:false
                                                    SSDEEP:24:5+SeWI/2kkWk7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5i/2ZsFLrcZwvJt2F+doTr9Q3G80
                                                    MD5:390F39934F095F89358B73D056D90264
                                                    SHA1:6B57CE5346B50ED88BFBB6BC57F834FB3F564905
                                                    SHA-256:6E0278E389072437BC07A5032CD58E9E5B1B2BDB20918632C422EFA97BC43ABF
                                                    SHA-512:6C54D94E95D73030F2FFCF8D130494CBD79FB1CEB9B59ADE0743C10F02557C3DD59CC6274B262A7E29C2D4C35DDA4B6A9A0398C661F5BD40F3B92181192B9577
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kamchatka) {.. {-9223372036854775808 38076 0 LMT}.. {-1487759676 39600 0 +11}.. {-1247569200 43200 0 +13}.. {354888000 46800 1 +13}.. {370695600 43200 0 +12}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965600 43200 0 +12}.. {764
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):457
                                                    Entropy (8bit):4.396286144160272
                                                    Encrypted:false
                                                    SSDEEP:12:MB862dmdH35Cy6DvjeQXvjKEn6vNEhFc0bkTfb2iWToN1:5de3IjjeQ/jKE6vNNa8
                                                    MD5:DF604BCD42A3C1E6BABD0E4FF5764CA3
                                                    SHA1:984111F3A75EE7D8760AA2B839010545AF8EE359
                                                    SHA-256:4E7F7ACAE8B4018A835328744F680C8054771805BB0BB07678A09737963C090D
                                                    SHA-512:690AC3FC7CA3C66AA70F17E38C6B43FFACAB3F86040C3BA94FBFF80AC8C1AECF8192E503282109DABF3228F8DC73C732F1041C80455B8B26BDB25C4C32FA286A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Karachi) {.. {-9223372036854775808 16092 0 LMT}.. {-1988166492 19800 0 +0530}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 +0530}.. {-576135000 18000 0 +05}.. {38775600 18000 0 PKT}.. {1018119600 21600 1 PKST}.. {1033840800 18000 0 PKT}.. {1212260400 21600 1 PKST}.. {1225476000 18000 0 PKT}.. {1239735600 21600 1 PKST}.. {1257012000 18000 0 PKT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):174
                                                    Entropy (8bit):4.967143524972358
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8s4YkyXHAIgNrYOARL/2WFKu3e2WFKjov:SlSWB9vsM3yMGSHAIgvAN/2wKulwKjy
                                                    MD5:259662F35AA09A891C2DDF8FCFECD6F0
                                                    SHA1:DBB3A363A34C33F0B6B0D677E43C2985E2BAF976
                                                    SHA-256:7B2251F0A41CBADF45D69F24604834167B14D8D33B510E635719AB404CABBCE2
                                                    SHA-512:CD7E514555D58985C774535556B66542EFC5FB7CD5891F42FE21B591612CB7EBD4B41E96593E26E9283BA1B01EF3BE0FDFAE871F5EF6ADF2286AF1E479DCB44B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Urumqi)]} {.. LoadTimeZoneFile Asia/Urumqi..}..set TZData(:Asia/Kashgar) $TZData(:Asia/Urumqi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.896398105471451
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKXIi7hvXMXGm2OHF+VT5oHsQKwMTXvv6Q6zRk8P4VvW/:SlSWB9eg/2wKYghfDm2OH0T5oHxNMzv8
                                                    MD5:7AC6429D2A08372C71C61B4521246FEC
                                                    SHA1:6E50F5AD1018398491453D751F8B717B618EF46E
                                                    SHA-256:F0A0816E62036637F75081CBF17A1E6B8FBC2D86AEC3CD2E234BBBDD6EC9F109
                                                    SHA-512:A5389A318896ABCAFE419262F6B8CA86C917788F1E2AFBC8CB1C074A52870E7A92C9F6F7D79DDE4AB0D267D870D3CCD69B3FC5FD57520352EFE36C583B493FB9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kathmandu) {.. {-9223372036854775808 20476 0 LMT}.. {-1577943676 19800 0 +0530}.. {504901800 20700 0 +0545}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.8363583658476745
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8yIi7V5XHAIgN1AIilvWARL/2WFKSiZ1/2WFKXIi7y:SlSWB9vsM3y7gVJHAIg5QOAN/2wKSg15
                                                    MD5:4CCC96293A33113D9ADC4130DCD19CBA
                                                    SHA1:7BAB4B8DD6BB415A2FC86D9AB36BE2A893C03153
                                                    SHA-256:9ACC9586B6F8B53BFE8B242283A434A9A9633D60559EBFDEE263B4C8915D50CA
                                                    SHA-512:644E1777E01C15A728E30526F131462FCE50476A8FEDA9B99F41D95013BB8833A79437E75AA2025E2FD2E253B9AD40709DEF77E1F0C73DAAE7A9CF886A175A03
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kathmandu)]} {.. LoadTimeZoneFile Asia/Kathmandu..}..set TZData(:Asia/Katmandu) $TZData(:Asia/Kathmandu)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2119
                                                    Entropy (8bit):3.707911838150672
                                                    Encrypted:false
                                                    SSDEEP:48:5No6r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFYkRDhUBAc6l:r5PhtjLiII2JBC6c6l
                                                    MD5:D7B394A9662D60D01781005FE73CC9E8
                                                    SHA1:50B5EBD02596DC45D1F69358C5B69DD3058905FC
                                                    SHA-256:33203D7FB7F3D1F848640ECE0642A2305E1863B4D47413075E2E7E40BD7418E7
                                                    SHA-512:055EBA420F2F6049E803796ACCA263264B9E585E5312A86B8DF7B409C5F1CB1810F3AEDACD66CCF4605E55198947D263C240486C2A4D453D23C89802F0C66BBA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Khandyga) {.. {-9223372036854775808 32533 0 LMT}.. {-1579424533 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):336
                                                    Entropy (8bit):4.614218930153471
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKvhfDm2OHEX3gYoHrXdUvvYbQLpUFdvjSVVFJLNsR/QFckVVFJLLW:MB8623tmdHNYCDWXYbQtUTvjAJBs50vs
                                                    MD5:248F1B5A26455000C936CE8BC02C1A0B
                                                    SHA1:0C3F8CD4E038B113E5238AC52652809B6CA27999
                                                    SHA-256:6D464564ED2EFC9DADA1586D4FC99FE333726D2BE15A00E30C2391F588896463
                                                    SHA-512:AF36B0B3D410305ED504726C87265ACCAF5577A9B5DD7E7DAF135420E356C651287873197431B65B5317B4BA2009274288E4F101AC1274045A8D99E2414AB132
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kolkata) {.. {-9223372036854775808 21208 0 LMT}.. {-3645237208 21200 0 HMT}.. {-3155694800 19270 0 MMT}.. {-2019705670 19800 0 IST}.. {-891581400 23400 1 +0630}.. {-872058600 19800 0 IST}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 IST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2062
                                                    Entropy (8bit):3.7086418466382605
                                                    Encrypted:false
                                                    SSDEEP:24:5Ote2CoXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEw:5B40yVRB7VfXucydm46I/CTxwh
                                                    MD5:A59F7FFD0C3EBAD47EC5F2B89EBBD9FA
                                                    SHA1:ACB94E28E0CF7C6606086267CEA1F63A3E755F56
                                                    SHA-256:53B8D5E7FB1BD67FECE66A933D9BDBB773F14A8C04D316A2A1B00EC6DBC151DD
                                                    SHA-512:7B3886B9D0A793CCEEDB2B190523922CFEBE5C82A5201C9EFA30CA4C7F63FB75C998CC7E1BD48D5D489F16E36FC0C22BD954CB7D321B3C09B36B60629C4C9F7E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Krasnoyarsk) {.. {-9223372036854775808 22286 0 LMT}.. {-1577513486 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):375
                                                    Entropy (8bit):4.4690470842439005
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wK1NSDm2OHroHvmdXjvWOb/MVSYyF/3MesF5XJSx0dMVSSFF8kvScy:MB862PGmdHrCvovDTMsF/CFDMx/HHbMj
                                                    MD5:5CFF42C943FFC92D16DACEB2872590A8
                                                    SHA1:AEA8B1583764BE2AF7B055BC6AFAA0E486A2E35F
                                                    SHA-256:25A8328B309B68DA85C7A800086A1E4D3C62B96AD97FEF24FC429A14C50E762B
                                                    SHA-512:27800D0401E8D2028730B9664E9489B6A5182C394C2C05509E195D4471B4ABEFC26C82E9B818E94BD5578109728CD891FFE3C156248706A50D792D12A6CD8C96
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kuala_Lumpur) {.. {-9223372036854775808 24406 0 LMT}.. {-2177477206 24925 0 SMT}.. {-2038200925 25200 0 +07}.. {-1167634800 26400 1 +0720}.. {-1073028000 26400 0 +0720}.. {-894180000 27000 0 +0730}.. {-879665400 32400 0 +09}.. {-767005200 27000 0 +0730}.. {378664200 28800 0 +08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):669
                                                    Entropy (8bit):4.074079100812583
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKPLBDm2OHXoH3UTdMVSSFVM5qGeCiKaFzsBRcerUNwGvULhMXeiCs:MB862HL1mdHXC3UBMxJJo9rphTXUzHHF
                                                    MD5:489E706324960E86B6E174D913C72E02
                                                    SHA1:C7D77482C0D41F3426FC269B3B6C0575EF0E8C7E
                                                    SHA-256:6E35E560675B0B5322474900D4EC8326C504788C1F82E533B09785DEEFF092DF
                                                    SHA-512:5CEFD44656C041E59A16481E042EA914E7C003BDE6ADF5F49B57052E91F4F732A91A244BD8BC09EF5DC2640D3210DEE53882717C5C4CBD85CCE44A93B028E9C3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kuching) {.. {-9223372036854775808 26480 0 LMT}.. {-1383463280 27000 0 +0730}.. {-1167636600 28800 0 +08}.. {-1082448000 30000 1 +08}.. {-1074586800 28800 0 +08}.. {-1050825600 30000 1 +08}.. {-1042964400 28800 0 +08}.. {-1019289600 30000 1 +08}.. {-1011428400 28800 0 +08}.. {-987753600 30000 1 +08}.. {-979892400 28800 0 +08}.. {-956217600 30000 1 +08}.. {-948356400 28800 0 +08}.. {-924595200 30000 1 +08}.. {-916734000 28800 0 +08}.. {-893059200 30000 1 +08}.. {-885198000 28800 0 +08}.. {-879667200 32400 0 +09}.. {-767005200 28800 0 +08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):173
                                                    Entropy (8bit):4.877362838821003
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFKdQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKdQ6
                                                    MD5:EA1DB4B80CC74CBA024B9BF3734B31F2
                                                    SHA1:D8131C093BCA3B378BEC606CFEB56A40CB4E246F
                                                    SHA-256:8E0C60A9AA64FB8602EDC35311F7436B04853970A21C1F6C871494A09AAD5787
                                                    SHA-512:3B57C9CCC16AA4FE71D275D5EC6A7BC1838841023EE4408158362A7E13E7F1B345F7D95006BC8D2FC270158864E286A1A9364C792F679D5803BD82148399C199
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Kuwait) $TZData(:Asia/Riyadh)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):169
                                                    Entropy (8bit):4.781739054385376
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8PWXHAIgNz+NOARL/2WFKf+WFKkvn:SlSWB9vsM3yOHAIg1AN/2wKGwKmn
                                                    MD5:55DAE27AEAA74FE822338C20B6CDFF68
                                                    SHA1:F00EB827DC29EB2063B3A0EDBC39856637C55F33
                                                    SHA-256:4308D741C83B263C7C9FB8EC692A7B7B502135E407B265B12EA7EF92523455C0
                                                    SHA-512:398EE6015C58BDBBEAB49B74833B938FD84DE1AC6D3B8D095CE772ECA980D9E93F4EBFFFFCEAE7F91E287C8CE4F94B1A078D8E1460C352B7C2018F99915838FF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Macau)]} {.. LoadTimeZoneFile Asia/Macau..}..set TZData(:Asia/Macao) $TZData(:Asia/Macau)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2217
                                                    Entropy (8bit):3.9638741177777868
                                                    Encrypted:false
                                                    SSDEEP:24:5ReCX8Iv3nhPHCvzncCHg9PHjZzH+0HDHN1aHhHNaezHBjHeHsH65H18HDH983lY:5d8u3hfCTcaOrh6qn151Wf3Bogp+nlC
                                                    MD5:B184E7403CB7168607D2C9E158F86A3B
                                                    SHA1:48B003B8F822BE979FBCB08CBDBFFC617BCF99DB
                                                    SHA-256:FBCB92CECB1CB0BC284ADC30D70C5F57B3AFC992136A0D898ABC64490BB700FB
                                                    SHA-512:D8C5C67CAEB7C670B7BD1DACC1203C4DEE4DDB16A780F502C4440997CFCFF869E86842EF87C2CD0E0B942941C02A6BC3BDAB7CEAD78B026B68F4A031173400C8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Macau) {.. {-9223372036854775808 27250 0 LMT}.. {-2056692850 28800 0 CST}.. {-884509200 32400 0 +09}.. {-873280800 36000 1 +09}.. {-855918000 32400 0 +09}.. {-841744800 36000 1 +09}.. {-828529200 32400 0 +10}.. {-765363600 28800 0 CT}.. {-747046800 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716461200 32400 1 CDT}.. {-697021200 28800 0 CST}.. {-683715600 32400 1 CDT}.. {-667990800 28800 0 CST}.. {-654771600 32400 1 CDT}.. {-636627600 28800 0 CST}.. {-623322000 32400 1 CDT}.. {-605178000 28800 0 CST}.. {-591872400 32400 1 CDT}.. {-573642000 28800 0 CST}.. {-559818000 32400 1 CDT}.. {-541674000 28800 0 CST}.. {-528368400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-498128400 32400 1 CDT}.. {-478774800 28800 0 CST}.. {-466678800 32400 1 CDT}.. {-446720400 28800 0 CST}.. {-435229200 32400 1 CDT}.. {-415258200 28800 0 CST}.. {-403158600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2088
                                                    Entropy (8bit):3.7643610103361134
                                                    Encrypted:false
                                                    SSDEEP:24:5he9dbbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKx/y:5wv+0j6lua2Gg/3gO8UoOZU2Wc/pKo
                                                    MD5:F62A89F441C9C17EB99F64223C815651
                                                    SHA1:408C38A79E056FF9B03D0DA85114DC015CB66938
                                                    SHA-256:0C6EEEB7975A95C2B0678D137E6A735238D244A37FA11078050051511DE499FE
                                                    SHA-512:55DC72546BDC26450D5318E9D2819E32A91C27D06A7AF5432BD50F8722C69984BBAA8599055A824D2935D919F0C0AA357687DD9B47F49F213EEE21AF7458FE17
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Magadan) {.. {-9223372036854775808 36192 0 LMT}.. {-1441188192 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):243
                                                    Entropy (8bit):4.737440985553183
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wK5XDm2OHUVoHxYQTLQTvj1kc3gEpHkH8vScHr0:MB862hTmdHsCLTI6cQe7HHA
                                                    MD5:9116C0B70AB33EC49F933EAE0238FD4B
                                                    SHA1:BA390E8FBEAF5EA6E861AFC5A51CD4DF0B422461
                                                    SHA-256:30D8AB00E32ECE51442C0310E650D89D6989E0809600EE334CB10C506D84BF9D
                                                    SHA-512:499E60E8CBDA72226BCB4E241020E62B6F88E7D3E4329D260A6536EF87C02D7D61FD1BECC47D4FF308B4EB5D3E7FFBE2EC1C96FE2DEDC09DD1D973421C5FFE1E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Makassar) {.. {-9223372036854775808 28656 0 LMT}.. {-1577951856 28656 0 MMT}.. {-1172908656 28800 0 +08}.. {-880272000 32400 0 +09}.. {-766054800 28800 0 WITA}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):421
                                                    Entropy (8bit):4.48495488773916
                                                    Encrypted:false
                                                    SSDEEP:12:MB862GjmdHnCTZBCvEo6AwoucQzy4orjAbomAtoNv:5GjeCVwvB6AduXzylHAMmAa9
                                                    MD5:0FBF0ED252638DF31826C33EB3FFBFE2
                                                    SHA1:3496E4A5251A9BDF3AA4368297140780B6DBF66D
                                                    SHA-256:070D61A0E39643A700ABA89A8A4BE5733BA456958966098405E11ECDFA854D76
                                                    SHA-512:2A40E14964B357809E596DF88D8C4141ED78664BACA0A7724A7CA837EF427DC2B07C48D9DBE5787FAB0015673F5BDE002223D489334C5B91B74EEC5507A14B78
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Manila) {.. {-9223372036854775808 -57360 0 LMT}.. {-3944621040 29040 0 LMT}.. {-2229321840 28800 0 PST}.. {-1046678400 32400 1 PDT}.. {-1038733200 28800 0 PST}.. {-873273600 32400 0 JST}.. {-794221200 28800 0 PST}.. {-496224000 32400 1 PDT}.. {-489315600 28800 0 PST}.. {259344000 32400 1 PDT}.. {275151600 28800 0 PST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):170
                                                    Entropy (8bit):4.805992552335358
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8DeXHAIgN6S7ARL/2WFKvE+H+WFKQ3n:SlSWB9vsM3yj+HAIgMS7AN/2wKLewKQ3
                                                    MD5:8AEB5C3E81069F884A370714E8013F1F
                                                    SHA1:4E3DD4A84627E75E84726C0CBA72CA6801280C2B
                                                    SHA-256:011B7DE1C9F7EC241B224BC864D8AE66ACB433FBC8AD939E4DBEB12BE6390243
                                                    SHA-512:50B1DE2615AE9B4781505DC709F9D07F6221D4E6D7B61D7BDA682377EAD9807F47FF0E933B79823D0DFD9F3647A82CFC28FB41FBB2226ED1D08B76F86FEB45DC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dubai)]} {.. LoadTimeZoneFile Asia/Dubai..}..set TZData(:Asia/Muscat) $TZData(:Asia/Dubai)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7625
                                                    Entropy (8bit):3.7113086720696398
                                                    Encrypted:false
                                                    SSDEEP:96:R3pv/7V6Aj8aZaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:R3v/AauivBeRF+W35Syrwl9h5j
                                                    MD5:2ADD0DFC1F133E4D044727234251A3DC
                                                    SHA1:0D1502986258349E384017BA6CB8FA0AC424638C
                                                    SHA-256:3C3E4844C70D361893EF022D6C3C8E38B243E91D40C5A726C924355476816F25
                                                    SHA-512:70CDD53E7E44EDABF653A4F92EECBF5BB20A31DA95D65209D1CADE7DD9FC68946B8EC8829C28AE00BE5F42AAB545B9282CBBCFC5834437D6A94A179BF4FE0141
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Nicosia) {.. {-9223372036854775808 8008 0 LMT}.. {-1518920008 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {62258760
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2063
                                                    Entropy (8bit):3.718004112421892
                                                    Encrypted:false
                                                    SSDEEP:24:526enddzXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFf:5l40yVRB7VfXucydm46I/CTxwf
                                                    MD5:513B6A2AF76DAED9002C037BEC99862F
                                                    SHA1:82D1C47BDF46B8B901C35BACACE8595C093BF5F2
                                                    SHA-256:96A445D47D834C28480D1E2036ECA4962B35AFA494C219065D4879F71C1830DB
                                                    SHA-512:2FE5AF4FA9D6AAB4FBD8E354789B82D39FA1B52394D3A0ABFBC6A30A531E0B7429A3D9AC7835A2843A6E9859E0255565F151FDFC87004ACB4EBD1AAD40BDA8A4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novokuznetsk) {.. {-9223372036854775808 20928 0 LMT}.. {-1441259328 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2121
                                                    Entropy (8bit):3.714792994893581
                                                    Encrypted:false
                                                    SSDEEP:24:52sve20ruXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnF:5Hc40yVRB7VfXu0TKmtTTDOWQ
                                                    MD5:AC8C8D768503C8334A9FBAEF4C3A9CAB
                                                    SHA1:CA10BB99E2D7AB329229759BD4801068A3AEB6D5
                                                    SHA-256:EF799077291F6B3B19E0AEC88F224BB592FAAD09D30740F2376D3D20F2169639
                                                    SHA-512:34049B1AC4254F999C3E5AD8CB31ABF88AC2D972E20E19927F33CC59935354F92125A0342A413E64227E8AE29DDFC2FFE5F67AE538C89D8EBAD7FCA889321DFA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novosibirsk) {.. {-9223372036854775808 19900 0 LMT}.. {-1579476700 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {738090000 25200 0 +07}.. {7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2055
                                                    Entropy (8bit):3.6912374223526396
                                                    Encrypted:false
                                                    SSDEEP:24:5abexPvO1FMnFP1FCnFHnFKqenFdDnFQgOnFxjPnFITnFonFJynFAT4TBThSv0FP:5asvjdqxph01NSvPETKmtTTDO0
                                                    MD5:3E06B20B0B62AA09FA03082FAEE4FD62
                                                    SHA1:8886EC80528ECA13D3364138BFFE92F881768169
                                                    SHA-256:2605CD1E26E4AB48BCB4399BB5B17BAD115A47F87BA3DD54B55BB50C3FE82606
                                                    SHA-512:04C1B6A898D12C8EA1B0B2F6665C870434061C63CC8F7A067BFC708E9828BA2E60104B82E2025E42D51DA2F485890C4D34EC0341EF466A7942649BE64F5EEE17
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Omsk) {.. {-9223372036854775808 17610 0 LMT}.. {-1582088010 18000 0 +05}.. {-1247547600 21600 0 +07}.. {354909600 25200 1 +07}.. {370717200 21600 0 +06}.. {386445600 25200 1 +07}.. {402253200 21600 0 +06}.. {417981600 25200 1 +07}.. {433789200 21600 0 +06}.. {449604000 25200 1 +07}.. {465336000 21600 0 +06}.. {481060800 25200 1 +07}.. {496785600 21600 0 +06}.. {512510400 25200 1 +07}.. {528235200 21600 0 +06}.. {543960000 25200 1 +07}.. {559684800 21600 0 +06}.. {575409600 25200 1 +07}.. {591134400 21600 0 +06}.. {606859200 25200 1 +07}.. {622584000 21600 0 +06}.. {638308800 25200 1 +07}.. {654638400 21600 0 +06}.. {670363200 18000 0 +06}.. {670366800 21600 1 +06}.. {686091600 18000 0 +05}.. {695768400 21600 0 +07}.. {701812800 25200 1 +07}.. {717537600 21600 0 +06}.. {733262400 25200 1 +07}.. {748987200 21600 0 +06}.. {76471200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1664
                                                    Entropy (8bit):3.708603813141953
                                                    Encrypted:false
                                                    SSDEEP:48:53PvalvNhQQvmRKqv0fvzQIovWdvEGvDaDv7w9hYwr:JHaBNKs6b03zB0WJEuDa77w9hYA
                                                    MD5:A3BD0C15642AE4F001F98F8E060E8374
                                                    SHA1:366F3C7FD4000AC23B79AB0FF4429371ED323B81
                                                    SHA-256:933BBCD7AE0BF59A5B4A6E0EF74C237FEEDC42E6A3AEB2158131AA70FBA6FE47
                                                    SHA-512:16D8692D3EA96D3594E6220A6989BBFBB926A66EEBEB240C4DC68BE75C69C5206659D9D341D92AE6128928FD38A5F45B445621CBBBA4E4BA8C34C3AC52BF3C08
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Oral) {.. {-9223372036854775808 12324 0 LMT}.. {-1441164324 10800 0 +03}.. {-1247540400 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {701816400 14400 0 +04}.. {701820000 18000 1 +04}.. {717544800 14400 0 +04}.. {733269600 18000 1 +04}.. {74899440
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.958543249401788
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKeHKLNM0WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKTNg
                                                    MD5:EBF01E229CC41EB8B27650A3D668EDC1
                                                    SHA1:33E1B252C1B45EAE326FCF8CC7C80C78A46F7E8D
                                                    SHA-256:DCEE88876D00396918F43DECA421B6C9B02F84B5866A2CE16E641B814B390A9F
                                                    SHA-512:80840600F37A256B8FD9933760FBAE7C13DE1E24EFD970E47BE8DEC731DFABF6D6FB76999BEEC775FF8C8B8719E94788ED7EEB04376A34C827ACB443F720F7E3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Phnom_Penh) $TZData(:Asia/Bangkok)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):369
                                                    Entropy (8bit):4.492596995768464
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKT5PDm2OHUeoH99xV/1kc5k/MVSSFFCLkvScH+dMVSSFL1CnF4mMz:MB862L5bmdHFCRV/6c5kMxGLkHHaMxFn
                                                    MD5:9ADB1A9E41A143A06116E24EA0A53D90
                                                    SHA1:6E50B549E1A705C0090BD5EDE26F7DED78CDF71A
                                                    SHA-256:AC8370AEDF5FE3FE1E80710CE117DEE23815BE377D418E4B4F3259A1930E8DBF
                                                    SHA-512:92790B20B960AC518AB2E18F902C6E0BA887F268909F5571CAC1068F5E719CCF6943AE6902DA1B683E170658B5E7BE06C6A187C1C0A652DD052D5BD0B2A7B84D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pontianak) {.. {-9223372036854775808 26240 0 LMT}.. {-1946186240 26240 0 PMT}.. {-1172906240 27000 0 +0730}.. {-881220600 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 28800 0 WITA}.. {567964800 25200 0 WIB}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):273
                                                    Entropy (8bit):4.709411633376997
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wK8cE4SDm2OHnNoH9Aw8vmVuT0vjLtcjviov:MB8620cExmdHnNCGv2Ezv
                                                    MD5:727BBC1A1662B500F616F544A484F213
                                                    SHA1:93C1D902D9D4AA4197C7D16C61FB784AC01D0DE5
                                                    SHA-256:29BA17F756F5C0BBA30FEBF44E620504D04921C832BD1CB56E1B60EF288B57DF
                                                    SHA-512:C3C91E2F180109FF33E6491722F679A1B8DCE8CD31DE006D7FF2CBE270C008E927507C953641D28EE77D139BBEA54DEA1B7DBD6C30B208DDAB1B58756C32AC02
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pyongyang) {.. {-9223372036854775808 30180 0 LMT}.. {-1948782180 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-768646800 32400 0 KST}.. {1439564400 30600 0 KST}.. {1525446000 32400 0 KST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.851251407399968
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKK3ovXMXGm2OHPFV4YoHsQKb3VvVsRYovFFF3FRVGsWr:SlSWB9eg/2wKK3yXDm2OHoYoHxcvSNFS
                                                    MD5:CBA9635133F88AD3B27E23B95430C27C
                                                    SHA1:5E41232EC03BBC71B522F58CB2D05E6BFFFF1A75
                                                    SHA-256:18CCA69F933795CE3F7DB31506EFC063E6CE1DFDCAB32AA387C398456D7F7E1F
                                                    SHA-512:D7C43F1F9ADA54C914ADB3CB2C9063EB7044089CFC7755ACFD08828CDEBA3C116AE2BE916ABE5D561E63699B921BC52636DD0BBC2C4304F813616D320D7DDAAF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qatar) {.. {-9223372036854775808 12368 0 LMT}.. {-1577935568 14400 0 +04}.. {76190400 10800 0 +03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1668
                                                    Entropy (8bit):3.7299735983334195
                                                    Encrypted:false
                                                    SSDEEP:48:5DwvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQA:BMaBNKs6b03zB0WJEuDa7sFZiKWaN6TE
                                                    MD5:F5DBE4E72FA5AB0019CC98C8E21EC86E
                                                    SHA1:27ECB901AA07C18EA7F38235E8EFE0B1635FEFBC
                                                    SHA-256:4191629B874C988291E8FD13E675A3ED685D677F6541313975FC4610E47F1DCD
                                                    SHA-512:D5EFD4EFFFFE2E41909AEB7B67BD1FA6FAF4B8E9AC645518D5B33BD1B3C5084F59D47D4ED052E0D4B9F9989BDDBA3AECB3D1E67F5237914D24C01F9C95242396
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qostanay) {.. {-9223372036854775808 15268 0 LMT}.. {-1441167268 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {7489
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1670
                                                    Entropy (8bit):3.734572151642808
                                                    Encrypted:false
                                                    SSDEEP:48:5NvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWgvNSvTqvIQvyovklvqQX0:TaBNKs6b03zB0WJEuDa7sFZiKWcN6Tir
                                                    MD5:026EC6E479EC006C4398288362254680
                                                    SHA1:24AD03DD21DA394B3423D27211955BFD694F8E73
                                                    SHA-256:CD6B067AA3EF6935B4E89CA36E6A03FCB97F1E0EE61A7B5D46C06BF4DE140774
                                                    SHA-512:023AC55E118F13A31CE996C7BA155C90D47DEB6C223EEB3C0EE7B702871FF0CCA13CDF61D65FDDABE41B888CD7A74274AA5730059CC5688F8ED4DDBF8FE4ECA4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qyzylorda) {.. {-9223372036854775808 15712 0 LMT}.. {-1441167712 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {701812800 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):174
                                                    Entropy (8bit):4.812955128020714
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8nv3vXHAIgNnDA6RL/2WFK02KQMFfh4WFKsyn:SlSWB9vsM3yHvPHAIg15N/2wK0GEJ4wy
                                                    MD5:BD3F294F1EDDD21467E980C9F5A0E7DE
                                                    SHA1:11A3FC3E4489C18BDF9BFFB4C44615559D9DD99D
                                                    SHA-256:E4D2C38D8E7377A528291A88129CDAC40CA4D40A5F1CD8ADB98228527556906E
                                                    SHA-512:FA5FD600627793EABB83C1066BE246A47BCCE1FC57830596B9C0CDE8901B949AF178ABDE876C3B73CC3751312E8A4C03C390888B0B5A9669F511344143F83073
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Yangon)]} {.. LoadTimeZoneFile Asia/Yangon..}..set TZData(:Asia/Rangoon) $TZData(:Asia/Yangon)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):148
                                                    Entropy (8bit):4.973311159904374
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFK814PMXGm2OHFukeoHqUi9VssWYcv:SlSWB9eg/2wK81GDm2OHF7eoHvi9V1Wr
                                                    MD5:AD3236CFF141732831732357AB181EE3
                                                    SHA1:EAF51A63898A2048EA5FBE9BA4C001EEE37FFDB2
                                                    SHA-256:411E31D09FFA48E44169C42661AE2F7FC142460BCAA216837D8C4740983CA7BD
                                                    SHA-512:6CA2D89C02568580786BE98A863453ADCF4D21CAC52E5B44C4F7A05E76D29AEB3E28E353D6FB758BB553DBC8F35389462B388F61E94C68F5DB50A3E8C429336D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Riyadh) {.. {-9223372036854775808 11212 0 LMT}.. {-719636812 10800 0 +03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.946090704619887
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8I65eV5XHAIgN2h6560ARL/2WFKwJ6h4WFK365ey:SlSWB9vsM3yJAVJHAIgA4k0AN/2wKl4i
                                                    MD5:0766480A295525EE5D65F1ED32094858
                                                    SHA1:7A2D68E1009DDD809A4A700931456C617DCD343A
                                                    SHA-256:C695981A0DF691C3F4509999FBC52858ADC75024CCCBDEFBE1094FED17E809E4
                                                    SHA-512:A21536FB61A64E953E8D6414FF0AEF1BC7E68A33C5DCF7090517A91FC449B96A93A4FBDF2C00682540D1193FDB29603349F5BDB455FD90045FDBCA61247A9860
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ho_Chi_Minh)]} {.. LoadTimeZoneFile Asia/Ho_Chi_Minh..}..set TZData(:Asia/Saigon) $TZData(:Asia/Ho_Chi_Minh)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2117
                                                    Entropy (8bit):3.7276904131666577
                                                    Encrypted:false
                                                    SSDEEP:48:5q+3Vv+0j6lua2Gg/3gO8UoflcXRDhUBAc+:YxIa2GOT8tiXBC6c+
                                                    MD5:295D51B8FBBE890C97637687B8F32322
                                                    SHA1:7BB72B0EC783898DDF625D275E3BBB964D1693FB
                                                    SHA-256:D7D0EA5CEF908442AB0D777A4B097BED18540CD5280FF63F33DD989E27E72908
                                                    SHA-512:9B3E3BA01EAE38A00B0EE8A8FB17191CB4ED2EE9E46AE06403BA8C1193804764C86599840DC03E0C6A631456E1BE2BC560BDF6CF0450068EF78A6E494041326C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Sakhalin) {.. {-9223372036854775808 34248 0 LMT}.. {-2031039048 32400 0 +09}.. {-768560400 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):879
                                                    Entropy (8bit):3.9460497720710506
                                                    Encrypted:false
                                                    SSDEEP:24:5t8eZd7QvalvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKT10Sv6r:5MvalvNhQQvmRKqv0fvzQIovWdvEGvDO
                                                    MD5:10A758996B0DF756E520541BEA9B7D75
                                                    SHA1:137E5FD4E00CFA4B3939EF11868862B7F93D87CD
                                                    SHA-256:35E4B905723891281D9A6A0A1FD3760A3A48136E1419C686BE31ACE83BF7AA9D
                                                    SHA-512:7E32661731EAB2ED8C387533ACCB4853F5B6225BAC11E93247E7B06D7AA856E6A665F63718BFE395CFD00F80A4C16789D7097FFA8DAD88B1D707BF9C155C1D4C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Samarkand) {.. {-9223372036854775808 16073 0 LMT}.. {-1441168073 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):985
                                                    Entropy (8bit):4.121802167517286
                                                    Encrypted:false
                                                    SSDEEP:24:5AemgvHzF+zg2c+z3NGmJhIUfqII8yHg/zoD:5F/nfWUBISHg/G
                                                    MD5:A1DE6975DEA70D7241B5B3C43E1EA3AA
                                                    SHA1:35EE563A2BCA77C761F7E878997763EA8D258040
                                                    SHA-256:C4F82C94650572FE4D03BC1FE54CED8F4BF55DFBEE855D52DE3EA6378240AF93
                                                    SHA-512:1639B0609115DBEA6A381986A732A5CA1523952AEF84843B4D714D5B2FF40B16C4166D8D60D31D4FC2C2BA34DED1F6DB39474336195603562265BDBF71687696
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Seoul) {.. {-9223372036854775808 30472 0 LMT}.. {-1948782472 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-767350800 32400 0 KST}.. {-681210000 36000 1 KDT}.. {-672228000 32400 0 KST}.. {-654771600 36000 1 KDT}.. {-640864800 32400 0 KST}.. {-623408400 36000 1 KDT}.. {-609415200 32400 0 KST}.. {-588848400 36000 1 KDT}.. {-577965600 32400 0 KST}.. {-498128400 30600 0 KST}.. {-462702600 34200 1 KDT}.. {-451733400 30600 0 KST}.. {-429784200 34200 1 KDT}.. {-418296600 30600 0 KST}.. {-399544200 34200 1 KDT}.. {-387451800 30600 0 KST}.. {-368094600 34200 1 KDT}.. {-356002200 30600 0 KST}.. {-336645000 34200 1 KDT}.. {-324552600 30600 0 KST}.. {-305195400 34200 1 KDT}.. {-293103000 30600 0 KST}.. {-264933000 32400 0 KST}.. {547578000 36000 1 KDT}.. {560883600 32400 0 KST}.. {579027600 36000 1 KDT}.. {592333200 32400 0 KST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):981
                                                    Entropy (8bit):4.16042656890735
                                                    Encrypted:false
                                                    SSDEEP:24:5Te3vvZJzHjwH6kHp7FH32AzHjZBHNHlQHuHxmHUjH6zHj2HBHeC:5ovZZO7lLpT24
                                                    MD5:A266AA43A84FD5E4890BC77AA4E240D0
                                                    SHA1:CD88C5D451CD7D3F50C9B36FDD47C84D20377441
                                                    SHA-256:3AABB42D9EFE95D906B7F34640E7815919A1A20979EBB6EC1527FCAA3B09B22A
                                                    SHA-512:13AE48F58C9AF24002F0FE4F28BF96B10EE0ED293E0DE9D29BCEBAAE102B2EA818F42CA4069544A254C95444A48604EC57E6AB2BEBDA4B5E72C82B49E61AD0A0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Shanghai) {.. {-9223372036854775808 29143 0 LMT}.. {-2177481943 28800 0 CST}.. {-1600675200 32400 1 CDT}.. {-1585904400 28800 0 CST}.. {-933667200 32400 1 CDT}.. {-922093200 28800 0 CST}.. {-908870400 32400 1 CDT}.. {-888829200 28800 0 CST}.. {-881049600 32400 1 CDT}.. {-767869200 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-650016000 28800 0 CST}.. {515527200 32400 1 CDT}.. {527014800 28800 0 CST}.. {545162400 32400 1 CDT}.. {558464400 28800 0 CST}.. {577216800 32400 1 CDT}.. {589914000 28800 0 CST}.. {608666400 32400 1 CDT}.. {621968400 28800 0 CST}.. {640116000 32400 1 CDT}.. {653418000 28800 0 CST}.. {671565600 32400 1 CDT}.. {684867600 28800 0 CST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):372
                                                    Entropy (8bit):4.436676898144829
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKfbSDm2OHxdoHvm5vWOb/MVSYyF/3MesF5XJSx0dMVSSFF8kvScHS:MB862nbGmdHDCvsvDTMsF/CFDMx/HHbe
                                                    MD5:C3D13D921E4C6E475910E5080B761C32
                                                    SHA1:8C5AE73C4098D03908E5D567FD7C4D827601D718
                                                    SHA-256:05C76B58A4E356FD358E24FBC71FAE98DCB18C441C8D8CBB13A18D4F6E406062
                                                    SHA-512:3A620597469D31577ECAAA098C95C244F0C288ABACE9E8964D8641154C1893967EFBD7211A41751D0D4CC1B0B9A2286F11738EFB7D01F110A4826BBE1844A2EA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Singapore) {.. {-9223372036854775808 24925 0 LMT}.. {-2177477725 24925 0 SMT}.. {-2038200925 25200 0 +07}.. {-1167634800 26400 1 +0720}.. {-1073028000 26400 0 +0720}.. {-894180000 27000 0 +0730}.. {-879665400 32400 0 +09}.. {-767005200 27000 0 +0730}.. {378664200 28800 0 +08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2064
                                                    Entropy (8bit):3.7913177223006698
                                                    Encrypted:false
                                                    SSDEEP:24:5HJeidmbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxwy:5HSv+0j6lua2Gg/3gO8UoOZU2Wc/pKf
                                                    MD5:B4FA38E884A85F6BD47C8BB02BB0500C
                                                    SHA1:1DD135B79CC0D81C048D7B2C6BE0CF71171DD19E
                                                    SHA-256:705D6D8360C2DCD51E909E39E1910FE876145220D151031612DA36B247207395
                                                    SHA-512:2D32AAAF1BCC865B5F2810BFE0FB82BE98140BB5F2ECA1DA7FD148A3074DA127B81242F17B8BA9C9E259B61CBB123FD1513CCE6A85C8D7679ADFC0D689B552BB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Srednekolymsk) {.. {-9223372036854775808 36892 0 LMT}.. {-1441188892 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1344
                                                    Entropy (8bit):4.062084847879695
                                                    Encrypted:false
                                                    SSDEEP:24:5X2eIvZPzGzHjZBHNHlQHKn3HnHNd9HiHkHBHaHLHMtyH9Qm+zHFOzHZ32HZvHiR:5Xi1ypBvt1mwO3Kq46T
                                                    MD5:AECA800C8F2A679D0B19E5BB90AFD858
                                                    SHA1:2C7DCEB709F9A4312C511971FE1E6A9DC1FBD0E8
                                                    SHA-256:389C9D3EE2970665D0D8C5CB61B8B790C5FBDDC0DF0BF2B9753046F5953A477F
                                                    SHA-512:C2D6BB4FEB5848D0704647D26F94C0BD8CD7E834AA2187EC9C877E80157E9CC225BBA3BECEE0148894C8639105D292AB50EE95830992BF357C632ACF001E020F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Taipei) {.. {-9223372036854775808 29160 0 LMT}.. {-2335248360 28800 0 CST}.. {-1017820800 32400 0 JST}.. {-766224000 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-639133200 28800 0 CST}.. {-620812800 32400 1 CDT}.. {-607597200 28800 0 CST}.. {-589276800 32400 1 CDT}.. {-576061200 28800 0 CST}.. {-562924800 32400 1 CDT}.. {-541760400 28800 0 CST}.. {-528710400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-497174400 32400 1 CDT}.. {-478688400 28800 0 CST}.. {-465638400 32400 1 CDT}.. {-449830800 28800 0 CST}.. {-434016000 32400 1 CDT}.. {-418208400 28800 0 CST}.. {-402480000 32400 1 CDT}.. {-386672400 28800 0 CST}.. {-370944000 32400 1 CDT}.. {-355136400 28800 0 CST}.. {-3394080
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):878
                                                    Entropy (8bit):3.9280321712564845
                                                    Encrypted:false
                                                    SSDEEP:24:5geQqdNRvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10Sv6r:5+EvdJqxiF0rvK50Sv6r
                                                    MD5:DB59DB8E401E12917B7367D5604D3DE6
                                                    SHA1:7CC7C5C1DB551BD381B833C81746201D36BC59A9
                                                    SHA-256:4445F3F892C7267A6867009CC1A3F0B0548D0240408375A9D15360B28993C2A9
                                                    SHA-512:2C7AE63C408A9F06F973AAC16845E1DBE92D15A421BBBE420914F21155AD5E57CD058D7E4427E43185E023D2FF475EBF9D74003ECEF004FF4E5F9D5681ADFB80
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tashkent) {.. {-9223372036854775808 16631 0 LMT}.. {-1441168631 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1729
                                                    Entropy (8bit):3.6815162494646034
                                                    Encrypted:false
                                                    SSDEEP:24:5yBeqvIdZlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPqUsx9Ul4N:5MmsUf8mFpNWFnytO6VnYK
                                                    MD5:C376C9ED66F6CC011E063D3E8E0DCED1
                                                    SHA1:13C6345F8CB0EC79FE7C78B156C5737BCB66E49E
                                                    SHA-256:B637BB0E49144C717E99E93540CB2C4D3695D63B91FE42547F2F0AA006498693
                                                    SHA-512:FD60192CBEDC91C5D6B3B5E6F19DEDCAE14DCF48DCAE6D4865A8F0BBDC01CBF8DAAE92C4C46C353AF5B3EEE36CCC87B23F193DDF221132F5404C42507B708364
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tbilisi) {.. {-9223372036854775808 10751 0 LMT}.. {-2840151551 10751 0 TBMT}.. {-1441162751 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {694213200 10800 0 +03}.. {701816400 14400 1 +03}.. {717537600 10800 0 +03}.. {733266000 14400 1 +03}.. {748
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7250
                                                    Entropy (8bit):3.5278500339429972
                                                    Encrypted:false
                                                    SSDEEP:96:z73zxgC3kvOR0xV1oLp9ZUj8nZjcJ5NIOFVp7ufbIL74f6IQTExJQtcAL:vryO2H1oLp9aQZyDmIVEPW
                                                    MD5:359B270670A5FF61BBCE3D07F1BAA5AB
                                                    SHA1:5B6D01C931D31D92299EE4455F76E69EB0C25A96
                                                    SHA-256:A78655218A749F4ABCA436BE818E84D3277220FF3E69BE20A786AADF8AC744F9
                                                    SHA-512:DFB0C7452AF6124A3742042CD97E7B9C0A84A4E338E00AF6DD66C971BC4D1324D3947A3A8601778F026E50367D942C10513FA1D73742E7006E91BF35E90260BF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tehran) {.. {-9223372036854775808 12344 0 LMT}.. {-1704165944 12344 0 TMT}.. {-757394744 12600 0 +0330}.. {247177800 14400 0 +04}.. {259272000 18000 1 +04}.. {277758000 14400 0 +04}.. {283982400 12600 0 +0330}.. {290809800 16200 1 +0330}.. {306531000 12600 0 +0330}.. {322432200 16200 1 +0330}.. {338499000 12600 0 +0330}.. {673216200 16200 1 +0330}.. {685481400 12600 0 +0330}.. {701209800 16200 1 +0330}.. {717103800 12600 0 +0330}.. {732745800 16200 1 +0330}.. {748639800 12600 0 +0330}.. {764281800 16200 1 +0330}.. {780175800 12600 0 +0330}.. {795817800 16200 1 +0330}.. {811711800 12600 0 +0330}.. {827353800 16200 1 +0330}.. {843247800 12600 0 +0330}.. {858976200 16200 1 +0330}.. {874870200 12600 0 +0330}.. {890512200 16200 1 +0330}.. {906406200 12600 0 +0330}.. {922048200 16200 1 +0330}.. {937942200 12600 0 +0330}.. {953584200 16200 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.876713308636272
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/2WFK+TT52WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/2wKsswKR
                                                    MD5:40B15013485EE2138A3DCB915F9121E7
                                                    SHA1:3ADBE38686C7CA1FDE3DDD12BE908F39BFD1E228
                                                    SHA-256:07537A30E6236D9E334DAFD5C4D352D25FDEF95D6DC7496F5D93EFAB74D9EBB1
                                                    SHA-512:DA3B7B44B3BEF07CA8AA5253BF684A838181D8A15D7CCF0447A6B5F5BAE28D155CF65BCFB6286EB36C0B9F4FDD1FE862A3297ADB6FC33532B9F766334283D725
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Asia/Tel_Aviv) $TZData(:Asia/Jerusalem)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.906503135441824
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8kNZ4WXHAIgNqFNKARL/2WFK9Z752WFKvNZovn:SlSWB9vsM3ykZ42HAIgc3KAN/2wKf126
                                                    MD5:081862B6FB33389BEC9B0E6B500AA342
                                                    SHA1:AF9467BB87C4C28921DF62A87B81223052F9FF4A
                                                    SHA-256:37459C17B59639DF62B3F3943751902CE6AAF1F11B7630069DB45052EBEFB5B9
                                                    SHA-512:CAF6F1C928528C4471229A2EF2944623545626532986628E6CE38884535286A0B38BA88C1A295E8B11322475D6BFAC61BF89786A76330C1A0C729339A3532BAF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Thimphu)]} {.. LoadTimeZoneFile Asia/Thimphu..}..set TZData(:Asia/Thimbu) $TZData(:Asia/Thimphu)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.887493603495978
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKvNZJMXGm2OHEQUTFnoHqVaJKuc/v6Q61V9gmZVFSTVV:SlSWB9eg/2wKVZJDm2OHEfnoHDKuc/SC
                                                    MD5:F239452984CCA9F23E97A880652C39E6
                                                    SHA1:52D25282D03B79960F152D21E7492EE26DAEBBAA
                                                    SHA-256:B797C74E3840298C3CD8149FC8AA4BCE839EFE79E7C3310986FF23C965607929
                                                    SHA-512:1044BEDAE04FCA7BD62937AFCE70F6C447583A90DD1596C3029A64A8251E3F73C106F4D940548DD38E895D67FEFDCD196B257E11437DEB399085EE80C345AA50
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Thimphu) {.. {-9223372036854775808 21516 0 LMT}.. {-706341516 19800 0 +0530}.. {560025000 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):388
                                                    Entropy (8bit):4.470556147950505
                                                    Encrypted:false
                                                    SSDEEP:12:MB862ymdHOx5CvAoK3zoiIxtoFDIe+zT0agbov:5yeOCvARzzCOVa/gby
                                                    MD5:3CCC15B63A882DB1B7459A51CD1C8165
                                                    SHA1:77A3EFE6E4EE524B9EC6F51593DD7521FD7B8DAD
                                                    SHA-256:3DA522FA88541A375D53F30A0B62DC4A305FA0315FEE534B7998C9E0A239450A
                                                    SHA-512:15238E96DABAB5D2B9FFD25B3F50417ED32205FA69239D6F6B28DA97A378D669FD409164964D0DD2A5B1D795C8F60E8D4EB15924046348C3D6010646A536E07C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tokyo) {.. {-9223372036854775808 33539 0 LMT}.. {-2587712400 32400 0 JST}.. {-683802000 36000 1 JDT}.. {-672310800 32400 0 JST}.. {-654771600 36000 1 JDT}.. {-640861200 32400 0 JST}.. {-620298000 36000 1 JDT}.. {-609411600 32400 0 JST}.. {-588848400 36000 1 JDT}.. {-577962000 32400 0 JST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2116
                                                    Entropy (8bit):3.695316005718174
                                                    Encrypted:false
                                                    SSDEEP:24:5CeLz/XJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEno:5H040yVRB7VfXucydm4IqtTTDOS
                                                    MD5:E95DE93CBCE72C5E02D7ECFE94C96308
                                                    SHA1:59A49EBFE544D97545BADFEFE716BB5659C64C20
                                                    SHA-256:6B64A01D0F0B5EC7A1410C3BD6883BA7CC133E9F073D40E8BFECE037E3A3FA24
                                                    SHA-512:9E33DC9C1C6D60F3226263C484AF46A14AAB31F838516A0D69BA08F8F416EF10D09697E8D7ABAC1CE1F5BCE8AB0C2635D99FBE70C89ECC268DED0DCE89E67466
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tomsk) {.. {-9223372036854775808 20391 0 LMT}.. {-1578807591 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7647084
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.897140749162557
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8pYFfXHAIgNzGRRL/2WFKPQOrFJ4WFKov:SlSWB9vsM3yWFPHAIg0RN/2wKPQOrFJD
                                                    MD5:F6AE33D706C36FDD8A21F44AD59F5607
                                                    SHA1:94D6EC7A437249AEBE2FA4AF8AFB029A620368C0
                                                    SHA-256:732751845ACEDBFFD3C6170F4B94CB20B25BFDCFCC5EEA19F4BE439F5C5B573A
                                                    SHA-512:2314AB2B154887842211C9A570BC1323D9B4375FF60C96296835DB001E8A277CA62D40B8562BC34EDDF281D96D5325640B79F7907558C6E0319C7D2A76BE239C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Makassar)]} {.. LoadTimeZoneFile Asia/Makassar..}..set TZData(:Asia/Ujung_Pandang) $TZData(:Asia/Makassar)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1590
                                                    Entropy (8bit):3.7728141273024374
                                                    Encrypted:false
                                                    SSDEEP:24:5IerIvusF7cCGK6zoCjZte3kzMjsBw0oZzlL98oysHqGzJvqE+ksabzdX+YjL:5VujmUCei46oljFC67
                                                    MD5:A4647294401D2B54ABAA8E509BF05A6F
                                                    SHA1:BF804CC38996D7715E3BA9BAD715D7ADBED781B9
                                                    SHA-256:A56A26981163A717CF388A423CFE7A2BAD1BE8652BE2E338670CBC0C0A70E5E9
                                                    SHA-512:B43157FABDE016FA6636CAB7B06CC1DEA53526B42FB46BB41DC4B7E48188D191C325BEF0D170B125E885F321C4316746A8D478D798828E2DC4A51C71DA4A610C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ulaanbaatar) {.. {-9223372036854775808 25652 0 LMT}.. {-2032931252 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 32400 1 +08}.. {433782000 28800 0 +08}.. {449596800 32400 1 +08}.. {465318000 28800 0 +08}.. {481046400 32400 1 +08}.. {496767600 28800 0 +08}.. {512496000 32400 1 +08}.. {528217200 28800 0 +08}.. {543945600 32400 1 +08}.. {559666800 28800 0 +08}.. {575395200 32400 1 +08}.. {591116400 28800 0 +08}.. {606844800 32400 1 +08}.. {622566000 28800 0 +08}.. {638294400 32400 1 +08}.. {654620400 28800 0 +08}.. {670348800 32400 1 +08}.. {686070000 28800 0 +08}.. {701798400 32400 1 +08}.. {717519600 28800 0 +08}.. {733248000 32400 1 +08}.. {748969200 28800 0 +08}.. {764697600 32400 1 +08}.. {780418800 28800 0 +08}.. {796147200 32400 1 +08}.. {811868400 28800 0 +08}.. {828201600 32400 1 +08}.. {843922800 28800 0 +08}.. {859
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.728285544456033
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8TcXkXHAIgNrfcXORL/2WFKhrMEBQWFKucXB:SlSWB9vsM3yXHAIgTN/2wKhrMEewKX
                                                    MD5:D2EAEA6182FB332CAA707B523F6C8A9D
                                                    SHA1:3BFC654E2B3BCF902AF41AEEC46772C84FFF3890
                                                    SHA-256:D17FDAF17B3DAC3A1310E2332F61585598185E64CED799ABD68249EB5B698591
                                                    SHA-512:E16BEE28BFE3AFFFE6F0025C09D0D65001F38D5045AAB1B554E4D3A66A88273F985B7BAA11F8D26E76E5ABC9F559E3E4B794CC939AAD5FF012A5A47924D08CB3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ulaanbaatar)]} {.. LoadTimeZoneFile Asia/Ulaanbaatar..}..set TZData(:Asia/Ulan_Bator) $TZData(:Asia/Ulaanbaatar)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):149
                                                    Entropy (8bit):5.006390440264841
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2WFKjhfMXGm2OHEVPoHsWA0GVFSTVVn:SlSWB9eg/2wKjJDm2OHEVPoH3A0CUX
                                                    MD5:D6245CAAEC9BA2579F4CEFFF196A9369
                                                    SHA1:4D182953F2CEEFF3583265F977B14F40C1A2FB43
                                                    SHA-256:C445B8030DEDDDED0AFF5CC692CC323B63BE8C14BBD42DC3FDE90AD4F9D14785
                                                    SHA-512:A32C477B6FAA79247907D1C4E2DF400B05AF4B529277C4CE12B33097872311E3F579115DC8CBA93DAC936928FD574414F3473A9CB7C8E85AB57CCA57489B60F8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Urumqi) {.. {-9223372036854775808 21020 0 LMT}.. {-1325483420 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2058
                                                    Entropy (8bit):3.773734429231407
                                                    Encrypted:false
                                                    SSDEEP:24:5petrlfgLv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxKG:5Ysv+0j6lua2Gg/3gO8UoOZU2Wc/pKF
                                                    MD5:5ADD78E4AFCBA913D078A8790861A2DE
                                                    SHA1:BB63A762D5D76C0FD3CB9AB2BCDE95718E1C99EB
                                                    SHA-256:9D639C0FC69B3BEEBC96969092F9590EB48E7946E901B225BF245E165973B9A8
                                                    SHA-512:7C2418FD1F96F101B83E2ABDF2551405C6E429DBBF30A2FA7CD2477E2CE1CEEBB790C51B28AEFF043BA7A7A914CEF3C812668058D69225B9FE9475C56508453D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ust-Nera) {.. {-9223372036854775808 34374 0 LMT}.. {-1579426374 28800 0 +08}.. {354898800 43200 0 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {764694000 43200 1 +12}.. {780418
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.858039387006872
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKgTjEHp4WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKgsX
                                                    MD5:D23A09C84A5368FBB47174BC0A460D14
                                                    SHA1:045A72FEA79C75E5F0029BD110E33A022C57DFAB
                                                    SHA-256:18F5E4FE8247F676278AC5F1912AC401DC48DF5B756D22E76FF1CFA702F88DA7
                                                    SHA-512:404EABC2FC162E18C678CED063249C7FF4C28653880EA1903CE846FD191CD1C5B61E0610736F250B79BBAC768B1AFD6B9A8824D56D74591A95D7301B47D48387
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Vientiane) $TZData(:Asia/Bangkok)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2062
                                                    Entropy (8bit):3.7094518963173035
                                                    Encrypted:false
                                                    SSDEEP:24:56beOUYQ7FyDy3le3i96VwAmnuBNuTw6vl9O8nfipRkwhUZDAcD:56cYQBIy343dVNUIukElcXRDhUBAcD
                                                    MD5:5C0C094B088D0212182E7B944197D4FE
                                                    SHA1:CF43A511FE9CD295207DF350704462E09D4D5278
                                                    SHA-256:2558C96E25359C72F168DAC6FB3C16C54F8FD7D0724EEB1671156D4A1F42AC6C
                                                    SHA-512:5D659EBDC8C2B06C964B083ECC78B4370A4658590D83F020CD23910C44E2D8DAFE69F61E8EB569E1905E89F38CD03ABE6B92F6CE36CF0B1EE0732A7645AFA65D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Vladivostok) {.. {-9223372036854775808 31651 0 LMT}.. {-1487321251 32400 0 +09}.. {-1247562000 36000 0 +11}.. {354895200 39600 1 +11}.. {370702800 36000 0 +10}.. {386431200 39600 1 +11}.. {402238800 36000 0 +10}.. {417967200 39600 1 +11}.. {433774800 36000 0 +10}.. {449589600 39600 1 +11}.. {465321600 36000 0 +10}.. {481046400 39600 1 +11}.. {496771200 36000 0 +10}.. {512496000 39600 1 +11}.. {528220800 36000 0 +10}.. {543945600 39600 1 +11}.. {559670400 36000 0 +10}.. {575395200 39600 1 +11}.. {591120000 36000 0 +10}.. {606844800 39600 1 +11}.. {622569600 36000 0 +10}.. {638294400 39600 1 +11}.. {654624000 36000 0 +10}.. {670348800 32400 0 +10}.. {670352400 36000 1 +10}.. {686077200 32400 0 +09}.. {695754000 36000 0 +11}.. {701798400 39600 1 +11}.. {717523200 36000 0 +10}.. {733248000 39600 1 +11}.. {748972800 36000 0 +10}.. {7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2058
                                                    Entropy (8bit):3.7081033128260934
                                                    Encrypted:false
                                                    SSDEEP:48:5h+r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2j:K5PhtjLiII2ZFlgm
                                                    MD5:E43E5F0EA7C4575525BAB130984DCDCC
                                                    SHA1:2D715749469FEA51A8E25D1F4F8DC4FF9178817D
                                                    SHA-256:3BEF13638C46F16435D326C675907E61BB68C8173153CED3359E983BE0E413E5
                                                    SHA-512:27954FEC865031BC363CFDE94E97B3B19836A6F777646EA4AAB12ECCAEE6D60A0C690711EA192B917AC717F94A01D1EF64BAE97DF968069CC12415971B070498
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yakutsk) {.. {-9223372036854775808 31138 0 LMT}.. {-1579423138 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {76470
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):244
                                                    Entropy (8bit):4.692243303623333
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2wKs5XDm2OHGVQoHvZN6FCDx+UIFDVkvScHbY/s5UIAy:MB862KTmdHGuCvZNNkkHH3Sy
                                                    MD5:D45766D30074719C9A88ACE8BB53204B
                                                    SHA1:69B333DFCCCCEB66DD0F7DC28B272BB10769B6B0
                                                    SHA-256:2526557810747E78E713AE09BC305621A80FAEECF8D441632E7825738D4C79CB
                                                    SHA-512:5255DEED72D7D13862A4D6BED7E0458C099D2EF5A1B41536CAA7C0E65A61DE8B8D1AD62AD44559F970B6613ADFB3862778D1CC99B9A05CB5BBCA7F0202B5A5B2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yangon) {.. {-9223372036854775808 23087 0 LMT}.. {-2840163887 23087 0 RMT}.. {-1577946287 23400 0 +0630}.. {-873268200 32400 0 +09}.. {-778410000 23400 0 +0630}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2095
                                                    Entropy (8bit):3.704641905144701
                                                    Encrypted:false
                                                    SSDEEP:48:5ievNhYvm1qv7vXIovPvSvlDvtvuovKKvKcNvHvAvivBvqvvEyv8vlvEv+v4v+v+:/Nupj40H6l75FKCKcZP8qdyEaoBAWkW+
                                                    MD5:D4DABA407BB8A10E4961D1DE5D9781D1
                                                    SHA1:6933DE65336331BD90E2BEC6AEA0609B16DAEDC9
                                                    SHA-256:2C78699EFC60758B8F8D0D1DEEDFDED5E65C65EBF3082B23E60BDEA8BF8FBCFE
                                                    SHA-512:459E2187FAA66414F5CE934C335F563DFD2FA5316B86A54D1A29123A0460AFD65B7CE46629BD6A070A14CB6873A28A2F2803DE5FF4F29EA610712EB07FAD303F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yekaterinburg) {.. {-9223372036854775808 14553 0 LMT}.. {-1688270553 13505 0 PMT}.. {-1592610305 14400 0 +04}.. {-1247544000 18000 0 +06}.. {354913200 21600 1 +06}.. {370720800 18000 0 +05}.. {386449200 21600 1 +06}.. {402256800 18000 0 +05}.. {417985200 21600 1 +06}.. {433792800 18000 0 +05}.. {449607600 21600 1 +06}.. {465339600 18000 0 +05}.. {481064400 21600 1 +06}.. {496789200 18000 0 +05}.. {512514000 21600 1 +06}.. {528238800 18000 0 +05}.. {543963600 21600 1 +06}.. {559688400 18000 0 +05}.. {575413200 21600 1 +06}.. {591138000 18000 0 +05}.. {606862800 21600 1 +06}.. {622587600 18000 0 +05}.. {638312400 21600 1 +06}.. {654642000 18000 0 +05}.. {670366800 14400 0 +05}.. {670370400 18000 1 +05}.. {686095200 14400 0 +04}.. {695772000 18000 0 +06}.. {701816400 21600 1 +06}.. {717541200 18000 0 +05}.. {733266000 21600 1 +06}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2029
                                                    Entropy (8bit):3.6487650030366106
                                                    Encrypted:false
                                                    SSDEEP:24:5O4GeuadYlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUUUl2ue/:5xKdsUf8mFpNWFnyLCPYmPJSi3sh4
                                                    MD5:2CFA7C55D0731D24679CA5D5DC716381
                                                    SHA1:2BB66783D75C71E76409365757980FBC15F53231
                                                    SHA-256:20871FA6AA959DDFB73D846271B4A568627B564CFC08A11BDD84B98C2F2019A3
                                                    SHA-512:CAB10A48859B2C0B2CC7C56E0AA530AE7E506A4986BADC5ED974D124BD46DB328B50C423F83FCFD52D31962A249EEFC10351798B86D51EDA500F412C8D42E6BC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yerevan) {.. {-9223372036854775808 10680 0 LMT}.. {-1441162680 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 10800 0 +03}.. {733273200 14400 1 +03}.. {748998000 10800 0 +03}.. {764722800 14400 1 +03}.. {780447
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9879
                                                    Entropy (8bit):3.557602151081988
                                                    Encrypted:false
                                                    SSDEEP:192:K35nZPOUYySoluItljncxelTMwtrayE6x5sETNek/CyNzybxYKmX6SXL/XbEcygI:K940pb6cL/b3Ldr9Q7TMq+ML
                                                    MD5:E7F2A3EE0362E9ED3ECBAD24168AD098
                                                    SHA1:98832274F6D9B641B809123D1272A1C04EEAA177
                                                    SHA-256:6B3609BE4E93D21A2AB492594EDD387931E2C787E8471C9F2D3A677F34002D8F
                                                    SHA-512:C48A76F8251AE455C759CB98802E40B3BEF716FD8E7441B6DE0242942C913367E3572B7C871082E97CA9BE67EC7DC37F8D01C438965217AC0EC36AD508DCE0D4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Azores) {.. {-9223372036854775808 -6160 0 LMT}.. {-2713904240 -6872 0 HMT}.. {-1830376800 -7200 0 -02}.. {-1689548400 -3600 1 -01}.. {-1677794400 -7200 0 -02}.. {-1667430000 -3600 1 -01}.. {-1647730800 -7200 0 -02}.. {-1635807600 -3600 1 -01}.. {-1616194800 -7200 0 -02}.. {-1604358000 -3600 1 -01}.. {-1584658800 -7200 0 -02}.. {-1572735600 -3600 1 -01}.. {-1553036400 -7200 0 -02}.. {-1541199600 -3600 1 -01}.. {-1521500400 -7200 0 -02}.. {-1442444400 -3600 1 -01}.. {-1426806000 -7200 0 -02}.. {-1379286000 -3600 1 -01}.. {-1364770800 -7200 0 -02}.. {-1348441200 -3600 1 -01}.. {-1333321200 -7200 0 -02}.. {-1316386800 -3600 1 -01}.. {-1301266800 -7200 0 -02}.. {-1284332400 -3600 1 -01}.. {-1269817200 -7200 0 -02}.. {-1221433200 -3600 1 -01}.. {-1206918000 -7200 0 -02}.. {-1191193200 -3600 1 -01}.. {-1175468400 -7200 0 -02}.. {-1127689
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8784
                                                    Entropy (8bit):3.833553120942514
                                                    Encrypted:false
                                                    SSDEEP:192:ZRBHksL3zq6bCvyjvspNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/+:ft0CC
                                                    MD5:B04E22B9B42722013941169B5D04DEA2
                                                    SHA1:32B96A7D9504D5022A6C4E2D310E95B5F062947F
                                                    SHA-256:099C3BEFBA3B4C00AE19BC53D475A52B32FAC9B36EC823C8EAEFC7D00F78F388
                                                    SHA-512:8B93BCA1E923B7A43F2EB0889216E8FF991D13CB8D25BD300310ED7CD8537DBD858E8F422C9B52AE2F52F7C1CB450EF0B7C5C1B3AE547C9C1E18E2A851569DD5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Bermuda) {.. {-9223372036854775808 -15558 0 LMT}.. {-2524506042 -15558 0 BMT}.. {-1664307642 -11958 1 BMT}.. {-1648932042 -15558 0 BMT}.. {-1632080442 -11958 1 BMT}.. {-1618692042 -15558 0 BST}.. {-1262281242 -14400 0 AT}.. {-882727200 -10800 1 ADT}.. {-858538800 -14400 0 AST}.. {-845229600 -10800 1 ADT}.. {-825879600 -14400 0 AST}.. {-814384800 -10800 1 ADT}.. {-793825200 -14400 0 AST}.. {-782935200 -10800 1 ADT}.. {-762375600 -14400 0 AST}.. {-713988000 -10800 1 ADT}.. {-703710000 -14400 0 AST}.. {-681933600 -10800 1 ADT}.. {-672865200 -14400 0 AST}.. {-650484000 -10800 1 ADT}.. {-641415600 -14400 0 AST}.. {-618429600 -10800 1 ADT}.. {-609966000 -14400 0 AST}.. {-586980000 -10800 1 ADT}.. {-578516400 -14400 0 AST}.. {-555530400 -10800 1 ADT}.. {-546462000 -14400 0 AST}.. {-429127200 -10800 1 ADT}.. {-415825200 -14400 0 AST}.. {1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6856
                                                    Entropy (8bit):3.8064107143060752
                                                    Encrypted:false
                                                    SSDEEP:96:KXVuHfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:KXVQbkIaFF1w0us4qE3+sSGjT
                                                    MD5:8ABD279386C50705C074EEE18BF5AE59
                                                    SHA1:C392231DBE744F5942DA4BFAC8AD0ABEBAEA0BF3
                                                    SHA-256:2026944DCDEBC52F64405E35119F4CF97EA9AA1E769498730880B03F29A2B885
                                                    SHA-512:3095759D01AC7EEA25E427CA38E8A0395BEFA7250E7A0C1327BF9D61F07F4570CDF7313FBE6695973EB0DD66D201C6C63591CC0DA8A1E0029926DC7056F4C95B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Canary) {.. {-9223372036854775808 -3696 0 LMT}.. {-1509663504 -3600 0 -01}.. {-733874400 0 0 WET}.. {323827200 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):246
                                                    Entropy (8bit):4.637993677747699
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/2RQ7RfDm2OHDoH1JlvQV/FFrR3FcykVvQV/FFf+nmwV:MB86267RLmdHDC1w/FH3FcyL/FomwV
                                                    MD5:1581C6470850E0C9DB204975488B1AF8
                                                    SHA1:6933ED13F18AD785CEDF0837F86EFAC671297A85
                                                    SHA-256:2EA59ACDB5BBDD3C6ABCEEA456838A5CA57371A3D2BB93604B37F998ED8B9D4D
                                                    SHA-512:9FFFA013D82CEFF6F447521C19270ECDD71152F23670164423E6013FEC46253C62D2CB79B42630BD786BD113F27369E746CA981DD17E789F7571F473B47247C1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Cape_Verde) {.. {-9223372036854775808 -5644 0 LMT}.. {-1830376800 -7200 0 -02}.. {-862610400 -3600 1 -01}.. {-764118000 -7200 0 -02}.. {186120000 -3600 0 -01}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.709193799640151
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqLG4E23vXHAIgvMG4EeRRL/2RQqG4EZrB/4RQqG4E1n:SlSWB9vsM3yCPHAIgvoRN/2RQ1rB/4Ri
                                                    MD5:601EB889A87F9CAD6F1DF4D1AB009FAE
                                                    SHA1:EB43C253A48755442A67A2408D7E3295549F831C
                                                    SHA-256:64FB8CAD17CD36666C7027AAD01344FEF659B13699EEF1942365842F8ED2170E
                                                    SHA-512:9CFC4A446ED6A3BEF6C26AE57324F10A970EE2ADD6933130447FAD6A3DB538841F2490DD461AF5776FACD9BD2CDC4A83247DFA6B34802AE844DDC6D4C37B28EA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Atlantic/Faroe)]} {.. LoadTimeZoneFile Atlantic/Faroe..}..set TZData(:Atlantic/Faeroe) $TZData(:Atlantic/Faroe)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6796
                                                    Entropy (8bit):3.804838552487436
                                                    Encrypted:false
                                                    SSDEEP:96:96ufXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:/bkIaFF1w0us4qE3+sSGjT
                                                    MD5:F97CC7EB9C52D00177BFF4715832FCD5
                                                    SHA1:CD9DCBB5E6ADD6EA91C8F142957EC229FC7F6DA3
                                                    SHA-256:795F438E7F01342D5F25ECCDD09FCE65C03C5D2D561B9B5191301D57EC16B850
                                                    SHA-512:9586289FEB6C597160011A47432F0AC40000483FA2E579BD89046EFD33E98DDAD652B792FD80CEDEB4CD87B6439A7B473F25F1B7375BC75353CBAF9F77E1084E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Faroe) {.. {-9223372036854775808 -1624 0 LMT}.. {-1955748776 0 0 WET}.. {347155200 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600 3600 1 WEST}.. {811904400 0 0 WET}.. {828234000 3600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.975859213900122
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVyWJooeyXHAIgoqxWJz5RL/2RQqG0EHEcAg/h8Qas:SlSWB9vsM3ymSDSHAIgoXN/2RQaK8Avn
                                                    MD5:6EB1E51CDB90E841DC151004E98E80CF
                                                    SHA1:CDB1FFF4FDBC7837E10E3725F09626345A82716E
                                                    SHA-256:9152D10450CEBCE4AAEA3F3C8A50E4077A881E0B06B193A5886F06A453803112
                                                    SHA-512:252648AA76AC0F08ED9BA3CB82E930101B1D2CE37EA979670671909CA8E2C7D838C35A449B0C7C2EF7BBF08C746475EC83403651CFB203E2F56C395CE2640933
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Oslo)]} {.. LoadTimeZoneFile Europe/Oslo..}..set TZData(:Atlantic/Jan_Mayen) $TZData(:Europe/Oslo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9709
                                                    Entropy (8bit):3.80455694200614
                                                    Encrypted:false
                                                    SSDEEP:192:hZUiLbMsf/ss0qKd+aKyUXtOZHY1SCOcesoQivoKbFVCdm1rXWNXyCXTOuUbkIaq:hZZDQX1rWJysukysLE3+sSGjT
                                                    MD5:AC6647F9B53B5958214EC3F3B78A4D85
                                                    SHA1:7355622AF99296F069F73899D5C70941C207F676
                                                    SHA-256:B2A0D0DDC26806A05B2BE806CA3F938DB12A3FA40110B8B21FD3F04EFED3A531
                                                    SHA-512:07569CA4D5DC6D57D91D6FDC370671A7546B73BA653D094E1B501D33570F7700727AD7FF2A083BC79E9EDE807C47E7A5604BEF5803F290B2F277C51DEF10FA6B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Madeira) {.. {-9223372036854775808 -4056 0 LMT}.. {-2713906344 -4056 0 FMT}.. {-1830380400 -3600 0 -01}.. {-1689552000 0 1 +00}.. {-1677798000 -3600 0 -01}.. {-1667433600 0 1 +00}.. {-1647734400 -3600 0 -01}.. {-1635811200 0 1 +00}.. {-1616198400 -3600 0 -01}.. {-1604361600 0 1 +00}.. {-1584662400 -3600 0 -01}.. {-1572739200 0 1 +00}.. {-1553040000 -3600 0 -01}.. {-1541203200 0 1 +00}.. {-1521504000 -3600 0 -01}.. {-1442448000 0 1 +00}.. {-1426809600 -3600 0 -01}.. {-1379289600 0 1 +00}.. {-1364774400 -3600 0 -01}.. {-1348444800 0 1 +00}.. {-1333324800 -3600 0 -01}.. {-1316390400 0 1 +00}.. {-1301270400 -3600 0 -01}.. {-1284336000 0 1 +00}.. {-1269820800 -3600 0 -01}.. {-1221436800 0 1 +00}.. {-1206921600 -3600 0 -01}.. {-1191196800 0 1 +00}.. {-1175472000 -3600 0 -01}.. {-1127692800 0 1 +00}.. {-1111968000 -3600 0 -01}.. {-
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2035
                                                    Entropy (8bit):3.716074665066009
                                                    Encrypted:false
                                                    SSDEEP:48:5Fhytu1phYdTclBoLB+Q1utqZu97fKnt91ItLjxkRq2fE4/JQjJuj4csf5J1R8yO:jhytu1phYdTclBoLB+Q1utqZuZfKt91x
                                                    MD5:FE3467015B8B226CB9D8077CB1ABF81B
                                                    SHA1:665083E753C6860755D669F30DF55333F2740127
                                                    SHA-256:E77B9D50AF6C2550CA0517B4A6DE64A8A159AD0C77F1294C4212B6E20221B099
                                                    SHA-512:661CA9C1DEDB9CE459215C48AE1409787B39EA025DA897FE8DA5532966FEC28BF86DF4B2794F7DDACFC01064CB9A11737592018C9B5C05045934D237FB1C428B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Reykjavik) {.. {-9223372036854775808 -5280 0 LMT}.. {-1956609120 -3600 0 -01}.. {-1668211200 0 1 -01}.. {-1647212400 -3600 0 -01}.. {-1636675200 0 1 -01}.. {-1613430000 -3600 0 -01}.. {-1605139200 0 1 -01}.. {-1581894000 -3600 0 -01}.. {-1539561600 0 1 -01}.. {-1531350000 -3600 0 -01}.. {-968025600 0 1 -01}.. {-952293600 -3600 0 -01}.. {-942008400 0 1 -01}.. {-920239200 -3600 0 -01}.. {-909957600 0 1 -01}.. {-888789600 -3600 0 -01}.. {-877903200 0 1 -01}.. {-857944800 -3600 0 -01}.. {-846453600 0 1 -01}.. {-826495200 -3600 0 -01}.. {-815004000 0 1 -01}.. {-795045600 -3600 0 -01}.. {-783554400 0 1 -01}.. {-762991200 -3600 0 -01}.. {-752104800 0 1 -01}.. {-731541600 -3600 0 -01}.. {-717631200 0 1 -01}.. {-700092000 -3600 0 -01}.. {-686181600 0 1 -01}.. {-668642400 -3600 0 -01}.. {-654732000 0 1 -01}.. {-636588000 -3600 0 -01}.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):160
                                                    Entropy (8bit):5.011466665416709
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/2RQqGtlN62/EiMXGm2OHXT14YoHvhFvdQVIyV:SlSWB9eg/2RQrlo2MiDm2OHXqYoHvTFS
                                                    MD5:3B310BB8C90CA716DC1AC5A697ACA9CD
                                                    SHA1:CD583F49478DCDAD91EF78539502C6FC62945C1E
                                                    SHA-256:51BFABCB3388107753A3C1A8CF31118E6627132BAA09B9878D9E7CEDBEBB4886
                                                    SHA-512:F593B7A1FAF0EA6B42D5EE86C20C9A8F5CD7ACD9B30EF7755E45ECAFEA8752C32E4CF4BEDF531F494E59D9F0C49CCC6FCA077292E20794AA265DFC0A56DFE579
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/South_Georgia) {.. {-9223372036854775808 -8768 0 LMT}.. {-2524512832 -7200 0 -02}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.880390141563645
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2RQqGt4r+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2RQr4rV
                                                    MD5:2C73A963F515376A46762CE153AAF5C5
                                                    SHA1:996C3C93DFAD89EA80AC5DFA1DFBD7CECD9ED28D
                                                    SHA-256:1C9CA8966FC8BD0BE70F4A187E17E56FB99139BC88C392E82BA2E23E23111C54
                                                    SHA-512:35A9ADC047DB058D71C21FC4ECB57CD14B0D9BA4416506763D1800D72CE6C9E81636F332AAD3533616F05C86F90A60416BD4065C5F832A51AA3DC186218BDCAE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Atlantic/St_Helena) $TZData(:Africa/Abidjan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2256
                                                    Entropy (8bit):3.662522763865322
                                                    Encrypted:false
                                                    SSDEEP:48:506KSBSdSs2SbSwGSyPU3lSsS5SGScSo/SkSuShSceS3SBSc7XSiSgSwSd/SJkS6:JKU+Ew0FU1TuhrR//tOIoOjXZfDWSkPR
                                                    MD5:77C7ECE4FCBE150069B611C75E8DAA0E
                                                    SHA1:22F4E5F15BCA92D8456B70BB36230F2605CA5E1C
                                                    SHA-256:F0E99EF01F140CD5AAFE16803A657922207E6F7F6AF10B0AE795790916C302C4
                                                    SHA-512:6FB57E8499A587292AFAFA9BD003721572393D5268CAF956230DA76983A112B27D6731BE561A22CCEF84935F43AC988B667C2DC404C157EA8D0E7830FC1A2AB8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Stanley) {.. {-9223372036854775808 -13884 0 LMT}.. {-2524507716 -13884 0 SMT}.. {-1824235716 -14400 0 -04}.. {-1018209600 -10800 1 -04}.. {-1003093200 -14400 0 -04}.. {-986760000 -10800 1 -04}.. {-971643600 -14400 0 -04}.. {-954705600 -10800 1 -04}.. {-939589200 -14400 0 -04}.. {-923256000 -10800 1 -04}.. {-908139600 -14400 0 -04}.. {-891806400 -10800 1 -04}.. {-876690000 -14400 0 -04}.. {-860356800 -10800 1 -04}.. {420606000 -7200 0 -03}.. {433303200 -7200 1 -03}.. {452052000 -10800 0 -03}.. {464151600 -7200 1 -03}.. {483501600 -10800 0 -03}.. {495597600 -14400 0 -04}.. {495604800 -10800 1 -04}.. {514350000 -14400 0 -04}.. {527054400 -10800 1 -04}.. {545799600 -14400 0 -04}.. {558504000 -10800 1 -04}.. {577249200 -14400 0 -04}.. {589953600 -10800 1 -04}.. {608698800 -14400 0 -04}.. {621403200 -10800 1 -04}.. {640753200 -14400 0 -
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.862270414049974
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjpMFBx/h4QWCCj1:SlSWB9vsM3yI9kHAIgmON/2DCeMFB/4d
                                                    MD5:2EF41863430897F45E0CBB51E6A44069
                                                    SHA1:8E9561060E9509FAF235E5E033FC9C2918E438DB
                                                    SHA-256:DF7CBDDCBB2F5926A07D19A35739E5B8DCD9733C037F7D1FF95753C28D574674
                                                    SHA-512:9D3A37D64DCCCA28093C30FAB595690D021FACEC15F351A77CA33A779D645D305A2FA031869F0DE3B0404C498C2C321D3D02E4DC592D3C632F6700F5DCB54900
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/ACT) $TZData(:Australia/Sydney)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8372
                                                    Entropy (8bit):3.894755849491153
                                                    Encrypted:false
                                                    SSDEEP:96:j8SY62BXovlCyRL8pJXa4NyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:j8X3Xzgl3PaN8asiQ/Uv9UnvtCaRs
                                                    MD5:94E1A0C4326D09AF103107E64625CC6C
                                                    SHA1:C026565F020EB158309549D98313632BAA79205F
                                                    SHA-256:5C43D3152982BCFD5B9F51D0E909CF3A558BED1C270FEFFE030531D38D6F91B7
                                                    SHA-512:CA08A8BC0EB740D59650FE0A9E56D9E169348AD0994F2BFFD6CCFBF9CC42E82F892FB719E80C4E2084B5702E9725C651359EE3066BD71BB19397EA83B6A68430
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Adelaide) {.. {-9223372036854775808 33260 0 LMT}.. {-2364110060 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1 ACDT}.. {320776200 34200 0 ACST}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):674
                                                    Entropy (8bit):4.32071371733564
                                                    Encrypted:false
                                                    SSDEEP:12:MB862ELmdHLOYCvSi0xT0ryRIvUr0obZv:5ELe6dvSi6L
                                                    MD5:900B39F1D4AB93A445F37B6C0A8DE3D9
                                                    SHA1:DE82800779DCB8094C395B5024BD01FFA3C3BB8C
                                                    SHA-256:0D3C39EDAB34A8DB31A658A1549772F7D69EB57565E40AA87B707953A2D854A4
                                                    SHA-512:8D115D1D14FE6FF21A4AE77E3AAC075E6A877214E568956B9A4FD2E75A46E458CAA5AE26B483F128B4C62960D73BD7543BC32F22B760059423B3D9ABCBA24B6A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Brisbane) {.. {-9223372036854775808 36728 0 LMT}.. {-2366791928 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8437
                                                    Entropy (8bit):3.902306256303896
                                                    Encrypted:false
                                                    SSDEEP:96:QZSSY62BXovldRL8q75aANyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:QZSX3X2QfPaN8asiQ/Uv9UnvtCaRs
                                                    MD5:1553DAAB804A6C9BB15D711554980D3B
                                                    SHA1:5E3161B1FBB4C246DCB5E11ABD94095121CE38ED
                                                    SHA-256:734F295BD0B558BDF6178DE62151B8913699D08AB2B1D101C55B8DEBC410074C
                                                    SHA-512:06B21886070E39E390ECBD18841B7FDBFCA2C7C8573495D2BAA2B92EB113CD1C73C18D73C49DE3C49572CBCBCBED2FAD3248BC651BEB825A1E089B1DEDEFCBFA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Broken_Hill) {.. {-9223372036854775808 33948 0 LMT}.. {-2364110748 36000 0 AEST}.. {-2314951200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.851279484907769
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjnSV1+QWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DCcq+DCyB
                                                    MD5:8944D3DF8FBECC03A8FB18C3B2DA3B53
                                                    SHA1:6B17B38D6560592CA49840C47DB9BDA7E79F9F76
                                                    SHA-256:5FE3CED97293FE0573D5ECE0CEF59CE5DDB4C57BC568AE7199E77B01D3ADE17C
                                                    SHA-512:907D8BB7EA840E0B3AC683884F2F709A2C06D67CE9258BE46400A0DA63581A9B1403A44FA43E1059BE8F5C7E06F9FA05C176309AD6295317BF14F0E9FA5741E4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/Canberra) $TZData(:Australia/Sydney)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):193
                                                    Entropy (8bit):4.79231670095588
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DCkx+4DCVDy:MByMjUQVv8At2s4Ky
                                                    MD5:0C1DFC0877CE8EB08007B7C2B7AF2D87
                                                    SHA1:02F835BE2DA4FCA79DC2A6959BB4EB6ACC8DF708
                                                    SHA-256:1DD4EC4ED4F854E2EF6162B2F28C89208710F8EC5AABB95FFA9425D3FBBCAB13
                                                    SHA-512:358347045915B7D10940DB15E49528D0C636BEC1BE70129847D0B9D034F9E96E847394D88358E87D98A9E581605A3C2AB917B85FDE1296F290B4194BB7E3FA46
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Currie) $TZData(:Australia/Hobart)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):437
                                                    Entropy (8bit):4.508468081487136
                                                    Encrypted:false
                                                    SSDEEP:12:MB862pmdHPCvZUjMWpXgda/gd026Xgdvgd+v:5peKvZqMSX+4+56X+v+Q
                                                    MD5:A81864B2C0BD7BF81F4FA21F17800059
                                                    SHA1:518AC9E040A17083ED3962F4FBB47D1D83764FF7
                                                    SHA-256:AC004FD4B3C536406991EC13EBB3E64E0EC0C7B264BC18C0700C8FA545868155
                                                    SHA-512:3C24F4C2CC3072B3E820FCC1C68A747DCCBB9481FE743C1555783CC932DCBA44FE4851A732D24EABF62E845474D4E1278F120A04DB7549A18C7C49C31FB8D425
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Darwin) {.. {-9223372036854775808 31400 0 LMT}.. {-2364108200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):759
                                                    Entropy (8bit):4.110997549215461
                                                    Encrypted:false
                                                    SSDEEP:12:MB862EmdHvOYCvV2mV22wF2nUV2CF2+V2pCwF21UF2biV2cHVKF25V2VF2cV2tFq:5Eemdvg2wQCKZ4j5c0LVmtH1iknohwQT
                                                    MD5:1BC8DBD2E24606EFA49F933034FC0EEF
                                                    SHA1:A511695A1B87A689C6BFF65257C11D3962FDDA3D
                                                    SHA-256:79D0C770A304360DB33F3D1EF7B3935F1E4E8125893E0DCE683AC35A51302CFB
                                                    SHA-512:A839D390D70F22FC833322029B732F3AE68FF48793B07005041BD12322DD6E5D5E5FF31787AA004A507A57F8FC245133891F266C4EF19D49F085E6B412E5B04C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Eucla) {.. {-9223372036854775808 30928 0 LMT}.. {-2337928528 31500 0 +0945}.. {-1672555500 35100 1 +0945}.. {-1665384300 31500 0 +0945}.. {-883637100 35100 1 +0945}.. {-876120300 31500 0 +0945}.. {-860395500 35100 1 +0945}.. {-844670700 31500 0 +0945}.. {-836473500 35100 0 +0945}.. {152039700 35100 1 +0945}.. {162926100 31500 0 +0945}.. {436295700 35100 1 +0945}.. {447182100 31500 0 +0945}.. {690311700 35100 1 +0945}.. {699383700 31500 0 +0945}.. {1165079700 35100 1 +0945}.. {1174756500 31500 0 +0945}.. {1193505300 35100 1 +0945}.. {1206810900 31500 0 +0945}.. {1224954900 35100 1 +0945}.. {1238260500 31500 0 +0945}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8734
                                                    Entropy (8bit):3.8515786470328823
                                                    Encrypted:false
                                                    SSDEEP:96:aOqigkx6WsYyS39nQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:aOq05hnQiAmcOM6e0pj
                                                    MD5:5E04BF8E1DEBFCC4130FDD1BBD67B2DF
                                                    SHA1:796AADCE7BB2FAF5E6FC916C941A4E3DCAFACC9E
                                                    SHA-256:D813F6A97BEFC22CA4F24C59EB755D269B9C68A449CC7CF0D2C61F911860EBE7
                                                    SHA-512:3A69CF1D1F57D6BD39E5F4DAF76BBB06A749D42BEB29452A0A5BDAA68F5DACC0DF176EDDA7A083F5B5B84FC651926C09D46CAAD2F6C4F1595AB9CCA1A958D653
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Hobart) {.. {-9223372036854775808 35356 0 LMT}.. {-2345795356 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-1646640000 39600 1 AEDT}.. {-1635753600 36000 0 AEST}.. {-1615190400 39600 1 AEDT}.. {-1604304000 36000 0 AEST}.. {-1583920800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AES
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):199
                                                    Entropy (8bit):4.912882643701746
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yIoGEoPHAIgjGg6N/2DCkx/2DCPGUv:MByMjeXV6t2a8v
                                                    MD5:425DC7B1E31F4AA41DAD74E3C9AE3562
                                                    SHA1:D92A3269F7BF5EC00F082C64CEF6E20C43017180
                                                    SHA-256:4D84E4040FBC529C9E0366BB74D0CFADEEEEDA0DFCC6C2C9204DED6C6455CAC3
                                                    SHA-512:F3031F16C0D00D9F8A38CD378F599EB3E63F4FF85F120DB38E3013E93F08E6F512D969F164BBC88CD625910FB3E086F3352E5B8FFC1373C3CC98F363FB3FD3F7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Lord_Howe)]} {.. LoadTimeZoneFile Australia/Lord_Howe..}..set TZData(:Australia/LHI) $TZData(:Australia/Lord_Howe)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):824
                                                    Entropy (8bit):4.249672335529665
                                                    Encrypted:false
                                                    SSDEEP:12:MB862gtmdHVCvCi0xT0ryRIvUr0obbty/ywtUj3yv:5gteMvCi6Xlt8
                                                    MD5:504A422280E0459A2126E7CB02F527E6
                                                    SHA1:EF61B98EFB1E44EE59020E99A69EA67D6B8ACFC2
                                                    SHA-256:01B278309353849CC2FDF62A30E2FF483833D5713CF5E329252738BE6F2C0A84
                                                    SHA-512:BFDAAD56D817CD3AAB17DFD0A33EFDD422645BC542ABE269C0F8520E33796DF4F19EAB2E40BFC6C4AF93EF654239B8F2E285639B4662040D865B9C340A23CFAD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lindeman) {.. {-9223372036854775808 35756 0 LMT}.. {-2366790956 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}.. {709912800 36000 0 AEST}.. {719942400 39600 1 AEDT}.. {731433600 36000 0 AEST}.. {751996800 39600 1 AEDT}.. {762883200 36000 0 AEST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7764
                                                    Entropy (8bit):3.5615258807990537
                                                    Encrypted:false
                                                    SSDEEP:96:pmz39IyKxb/JbcD9gKniAF23QbNS1fEGXALNbbT2JFJ/FaKaTQ9ZJhRVK:p+cpVKniAF2AbkFKL
                                                    MD5:10F983F4683CDE13A1228AC0B04D8513
                                                    SHA1:45378BA5949BE53D698108F50FECFF50C9E3D296
                                                    SHA-256:76D1F1ED67B8F8D6903789C2FDDF79590A83677972D416F5F3C9687614EC6238
                                                    SHA-512:D60D802EF215A33750E4F859657BA12A67084B1E9FCF1B4A7CEEE7B9D816BC2C6670775D93C88EC8380CDD7790AD574133D6F90F0828F848313C26583B2F196A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lord_Howe) {.. {-9223372036854775808 38180 0 LMT}.. {-2364114980 36000 0 AEST}.. {352216800 37800 0 +1030}.. {372785400 41400 1 +1030}.. {384273000 37800 0 +1030}.. {404839800 41400 1 +1030}.. {415722600 37800 0 +1030}.. {436289400 41400 1 +1030}.. {447172200 37800 0 +1030}.. {467739000 41400 1 +1030}.. {478621800 37800 0 +1030}.. {488984400 37800 0 +1030}.. {499188600 39600 1 +1030}.. {511282800 37800 0 +1030}.. {530033400 39600 1 +1030}.. {542732400 37800 0 +1030}.. {562087800 39600 1 +1030}.. {574786800 37800 0 +1030}.. {594142200 39600 1 +1030}.. {606236400 37800 0 +1030}.. {625591800 39600 1 +1030}.. {636476400 37800 0 +1030}.. {657041400 39600 1 +1030}.. {667926000 37800 0 +1030}.. {688491000 39600 1 +1030}.. {699375600 37800 0 +1030}.. {719940600 39600 1 +1030}.. {731430000 37800 0 +1030}.. {751995000 39600 1 +1030}.. {762
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8341
                                                    Entropy (8bit):3.8532171550973526
                                                    Encrypted:false
                                                    SSDEEP:96:Yyigkp2EUyn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:Yy3VnQiAmcOM6e0pj
                                                    MD5:40D06B80A4A0DB415270EFD9698B97BF
                                                    SHA1:1999F0E8C7EBAA11BD21D64D9E07FA911F13C64C
                                                    SHA-256:F21B9EA51C0D41BAD0420FE0601E5A4B491FB895856F4BDDF6541D704469D92F
                                                    SHA-512:E47D597CC85D177CF2804C44C216EB4C5B74472457F15F697704311A847BF8A051DCAFD26FA61DD689555F35640151E26F25D5DC5319EFEFEA62AD86657A4A95
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Melbourne) {.. {-9223372036854775808 34792 0 LMT}.. {-2364111592 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.893713405897538
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjREeQWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DC5eDCyB
                                                    MD5:80B7CDD1EA5A5308CE84C038180005F2
                                                    SHA1:B7CA15B58ADA8CA3EB74B7971073022D57D8EE70
                                                    SHA-256:73D7C9E207E61ACF8DF7242BDCD84488189033E22A84873A953B65DE02FA1B0B
                                                    SHA-512:F627F5FF335600AC9158D6A0D3694AB7E70180177449C17B5605BBF7B1B7F8FB447A9C207F4E1BCB627074DB47B8A66F5D78E03C6DB8FA17F8BDD6AABB331665
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/NSW) $TZData(:Australia/Sydney)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.830368875485429
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjbvvXHAIgoXjbBvRL/2QWCCjsrQWCCjbi:SlSWB9vsM3yIFHAIg2N/2DCZrDCl
                                                    MD5:14CB7EA1C028F457345EBEB8ADDC9237
                                                    SHA1:208BF676F56533BA271D1B98363A766DF17CF6F2
                                                    SHA-256:A983C9CAD7E542CAED43B083E68CD2B782959A4B54015F374C29250D3ACF9B8D
                                                    SHA-512:099F65E5FA705FD7257CF7B8E103905EE313C6D082844F69CCD3F318E3E7F4098B29F952FA0AA28655E1FE290A0FB2E809911088315889DE7CAAF0E04698C2FC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Darwin)]} {.. LoadTimeZoneFile Australia/Darwin..}..set TZData(:Australia/North) $TZData(:Australia/Darwin)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):739
                                                    Entropy (8bit):4.31793586514766
                                                    Encrypted:false
                                                    SSDEEP:12:MB8623mdHCBdCvmlXz6zezzOz4iaLYvzkzi4zm5fVcBhg8mfev:53eCB0v4+e3Oz4iaLYbkzi4zxhfqw
                                                    MD5:01B1A88867472AD60B8F5C0E1648E3ED
                                                    SHA1:9975EA750458E8061DD8A83585675CB7E4910CA6
                                                    SHA-256:FC1B54CA261074E47A8A486FEAC12DD04D46166D1D2B44163BD8791BEC32D275
                                                    SHA-512:20BDFBCD1A5038C81552EBD955F3921DE3447A1F30E64935937768B2B98735AE53049601DCDD2D519646C78E6D03289EB465CFF4F2DADEA7D89A329504C6C475
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Perth) {.. {-9223372036854775808 27804 0 LMT}.. {-2337925404 28800 0 AWST}.. {-1672552800 32400 1 AWDT}.. {-1665381600 28800 0 AWST}.. {-883634400 32400 1 AWDT}.. {-876117600 28800 0 AWST}.. {-860392800 32400 1 AWDT}.. {-844668000 28800 0 AWST}.. {-836470800 32400 0 AWST}.. {152042400 32400 1 AWDT}.. {162928800 28800 0 AWST}.. {436298400 32400 1 AWDT}.. {447184800 28800 0 AWST}.. {690314400 32400 1 AWDT}.. {699386400 28800 0 AWST}.. {1165082400 32400 1 AWDT}.. {1174759200 28800 0 AWST}.. {1193508000 32400 1 AWDT}.. {1206813600 28800 0 AWST}.. {1224957600 32400 1 AWDT}.. {1238263200 28800 0 AWST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):203
                                                    Entropy (8bit):4.803539644461131
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yIaWhSHAIgPWAvN/2DCoRWJvFBx+DC7WN:MByMjL9t2rOvFel
                                                    MD5:401B6B2E30EF17BE20212645287EB94B
                                                    SHA1:67D15A45C61122CE680B829FE0FA3A1C501A8C8F
                                                    SHA-256:DDA669B9BFB3E08FC23CE67030148B9E4740824ADD8DE02580D6AFD31CE05BAB
                                                    SHA-512:F4348F8F4FF261C47854725AEE4E14E7E334B3C31496E5C46B0E0041551CB6861380E684E8888AFE9DA7E8E97236AC322B9CE2738EF245E9D46C9681665F83A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Brisbane)]} {.. LoadTimeZoneFile Australia/Brisbane..}..set TZData(:Australia/Queensland) $TZData(:Australia/Brisbane)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):198
                                                    Entropy (8bit):4.752918480727309
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yIDRpGSHAIgSRrN/2DCa7QDCuRpyn:MByMjdpQYrt23QHpy
                                                    MD5:D226A0718185854DFE549E00856AA8D5
                                                    SHA1:94EE96FAE259D90C2FDF169DD95BD82B3171FFAE
                                                    SHA-256:D9DCFDC377901EC0C0FEB9CEA743C2C1425273F69A1BAA7BF3B74FEC5885B267
                                                    SHA-512:7EE29A7235CAAEF4889246B7A2241CA9A0D5D2B2E1D56B20141247C93B8736F17280F0D46004AC4588E137D1E76F661C779C906BBFC2B5F8FA73C19F7657F952
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Adelaide)]} {.. LoadTimeZoneFile Australia/Adelaide..}..set TZData(:Australia/South) $TZData(:Australia/Adelaide)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8338
                                                    Entropy (8bit):3.847525715050911
                                                    Encrypted:false
                                                    SSDEEP:96:AZJigk42/yn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:AZJuVnQiAmcOM6e0pj
                                                    MD5:C0F1776E011C4C86B7709A592E7CA1EB
                                                    SHA1:1CA528D529BF4995E145D6E0D87A8752A3577E7F
                                                    SHA-256:FC453486325ADE1D31F14087B76D4936F3A6D551ABD1DB6FCAC129BDB043951C
                                                    SHA-512:F872182962C2615A35F012ECAB30C88F07C6BEF0261207AD52706DB22D8CDD0DA65723CD801FDA7C548C5EB0ECFC39DD66CC17503BAA3BBB77BFA35D20650E4F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Sydney) {.. {-9223372036854775808 36292 0 LMT}.. {-2364113092 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.777331394201868
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DC3neDCVDy:MByMjUQVv8At2+eKy
                                                    MD5:9C58D9EFBB03472BBDA76CE2FFAD4BB4
                                                    SHA1:30959E3681B64AE26F7FA3957887896C26AF7F19
                                                    SHA-256:C94FA7A7640CD00963EE8FF1A3D9DCDA2075408739D998EDBF7CFC998DB764FD
                                                    SHA-512:2D6B778217726691F2CB4A4995A8B1AB08DDB7FE4570A3FD04EF54F718F455EF3CBD4EEF1A1BCC99A2088C82A6E89DB455BAF1327CECD6BF608837E50F14A6C1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Tasmania) $TZData(:Australia/Hobart)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.818875198673406
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yIvFfkSHAIgoFNNvN/2DCzyQDCMF4:MByMj9fKaNNvt2xQz4
                                                    MD5:0B144A2E47C81354BC510BC741DE5150
                                                    SHA1:A7396F1741F02C6C208FD1286362E4E0720198B8
                                                    SHA-256:DBEF9C5BDD290FEC5FA740D697143332D3CA1FC373CF1DF736F1883AC9BA3298
                                                    SHA-512:562B029591F9ADB8C324BA56E849B2B524E91B26D3DB441510194882A8E1E63E6948D041874A00A0A76F29925A1CEAC53DD2AE5D7F23123B6FE919346CBFD8CC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Melbourne)]} {.. LoadTimeZoneFile Australia/Melbourne..}..set TZData(:Australia/Victoria) $TZData(:Australia/Melbourne)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.831654343064909
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjXFeyXHAIgoXjrWARL/2QWCCjH0QWCCjQ:SlSWB9vsM3yInHAIgOWAN/2DC00DCt
                                                    MD5:5F5916CB038876BE27AA5E2AD74EE085
                                                    SHA1:18AC21B638188B542455BA3DA91F958DF1724E68
                                                    SHA-256:75ABB7F20C4A0B618138AA190AF33CEAF2A6D2C707DA6C1314E4BFF2F9904F58
                                                    SHA-512:ADFD83E292AC1BB5E19255A9B2DA0E3BB9323A5F9B92D458DE34C291D7F9B6CFBBF62AA3351FB320E54F34305DD485ADC72134D21AFA6A27B2B8B7D93DCA2113
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Perth)]} {.. LoadTimeZoneFile Australia/Perth..}..set TZData(:Australia/West) $TZData(:Australia/Perth)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):212
                                                    Entropy (8bit):4.918079927018121
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yIcKlHAIgJK3N/2DCkuM0DC9KM:MByMjcKeJK3t2kVSKM
                                                    MD5:BEDEA56FCE4B2F0A3F3E9319856A5560
                                                    SHA1:9FD0FE998A003C6B4CCCD00A977153347DE07F55
                                                    SHA-256:55A9264D0414644A1BE342106AE86086A6659596DC9322A74FC4D1DDB41F7C60
                                                    SHA-512:7C438B72262B99EDEEB31AC95E0135BB722A3B0B049278B6DE67DB5FB501837FB9C03785233B538E83F4B56104F6EA3B3DA0F7C2275E0F78F232161840AA4C63
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Broken_Hill)]} {.. LoadTimeZoneFile Australia/Broken_Hill..}..set TZData(:Australia/Yancowinna) $TZData(:Australia/Broken_Hill)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):194
                                                    Entropy (8bit):4.888429541699473
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/xWh490th4:MByMYdIp7tQ490I
                                                    MD5:A8A7A10DA4321819ED71F891480770F8
                                                    SHA1:930674EF7711542D7F471A59C1870D4576E027FD
                                                    SHA-256:2F594239A434052D36053A2B3EAB134EADBAD06EB6737E67CF72166DAB157537
                                                    SHA-512:C6AD1869A713DDE0E4DE53F7894E5CE0B7AEFDDD7C5C3D83BB5B92FB7D8E20B373A6694045053E1AE8EA98A7B7D0C052EF2C21310E47DC650A7A399A5F73D586
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:Brazil/Acre) $TZData(:America/Rio_Branco)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.875339623736144
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wKy4oeyXHAIg20wKARL/1bIAJl0IAcGEwKyovn:SlSWB9vsM3y7/rDSHAIgp/AN/xIAE90j
                                                    MD5:E0D0EFBEC37E27532B49FF6DD9893DA0
                                                    SHA1:9C00993A885AF448E48201A46E17629A7A602FC6
                                                    SHA-256:A676562A90FF8587A775F6F0E3BE05D870456A56D25B5330816BF9043C8D475B
                                                    SHA-512:AB0E6907F9C0002CA5C050A0069AF013B14BADA08CA4553C96B302C078DF7629D5D7EDE4A19A53DEC6E7B9E6D9857F14EC7A1DB9BC11F2EEC9FFBAC70E129EEE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Noronha)]} {.. LoadTimeZoneFile America/Noronha..}..set TZData(:Brazil/DeNoronha) $TZData(:America/Noronha)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):191
                                                    Entropy (8bit):4.948480276987682
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0tQJXveyXHAIg20tQJE6RL/1bJHIAcGEtQJXy:SlSWB9vsM3y7tIGSHAIgpt36N/xR90tF
                                                    MD5:FCCB5F44903E1B988A058E5BBF5E163B
                                                    SHA1:E1CC03DD4A804C7305D8B0C12D8451D08AE262EA
                                                    SHA-256:961FB3AB99A63B1E9704B737EAB2D588B5A39D253A213E175CC678BEDFFD498D
                                                    SHA-512:F31C80E4AD6EBE6CB8A3382E0052DC47601D073E8F81375D50241105675AA3AB45433FFD0534524D9992ABE1086C6671D85FF7C72B0D6766EB9984426F608B77
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Sao_Paulo)]} {.. LoadTimeZoneFile America/Sao_Paulo..}..set TZData(:Brazil/East) $TZData(:America/Sao_Paulo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.902113962502196
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0znQZF3vXHAIg20znQv5RL/1bbAWVIAcGEznQe:SlSWB9vsM3y7zn+PHAIgpznSN/xn90zN
                                                    MD5:9F4B43F4F27D0B7EAC0C5401A1A794B4
                                                    SHA1:2A8543B994E93E54BD50EAA78463905E6A8EBE74
                                                    SHA-256:0500C9A248C8CE9030EA30D0AF9DD95DC465480BAF60646C0B7C511FA23C6D1F
                                                    SHA-512:0ADAF708ACFBD80F4704951EEBC24AD144FD5856997A429279E804F3A7F7F9A8FED41DCEE85BFB1ECDBF1E05137E87E7430186474BCF5DE42067FFC74746F048
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Manaus)]} {.. LoadTimeZoneFile America/Manaus..}..set TZData(:Brazil/West) $TZData(:America/Manaus)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7736
                                                    Entropy (8bit):3.7984816540097843
                                                    Encrypted:false
                                                    SSDEEP:96:09+xKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt7:9Ss41sFpM5vwA6Efv03TBZLl
                                                    MD5:6DB983AD72FB2A88FC557BE5E873336F
                                                    SHA1:C64E988010087ED559A990B3D95078949C9B4D72
                                                    SHA-256:E2AEA7CFD428A43D9DB938BCC476623ADC1250BD8057013A7FFF5F89D7FF8EFC
                                                    SHA-512:C0A646F80FB2FD42D9146A4FD36CF5A7F62016684F8D5AF80453EC190F4AEA65EDADC5BCF071AE746ABFB43B29C27B2743F2152B6986D41BFDE1617CA774A7C5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CET) {.. {-9223372036854775808 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766623600 3600 0 CET}.. {228877200 7200 1 CEST}.. {243997200 3600 0 CET}.. {260326800 7200 1 CEST}.. {276051600 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8505
                                                    Entropy (8bit):3.8095769056779916
                                                    Encrypted:false
                                                    SSDEEP:96:e3HgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:eQaUqtfA604qSBgI7DBch
                                                    MD5:A6F88C55E8613A27DE3E6C25B0672910
                                                    SHA1:3B593CC17BF153A6209FC5AACE7B88DA9603BD44
                                                    SHA-256:73A9841F233AA657AFB6CED8A86A37D55FE5582DD996B9B28975D218BCCC078F
                                                    SHA-512:526A922B1594A2800B03F363F7BFEC29203D4A4F2B49C5F2618469F59176CE4F8AFBA0616B226AC39D308DB05DE7147714D9B6CDBB2EA7373A041A4D47F50E2E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CST6CDT) {.. {-9223372036854775808 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-84384000 -18000 1 CDT}.. {-68662800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.804821796604604
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/0nalGe2IAcGE2NEOyn:SlSWB9vsM3y7UEOXHAIgpUEqA6N/0af9
                                                    MD5:33A04963E70EBF29339204348E0DF874
                                                    SHA1:456C0DB88ECE4D180EEE5AE5AEF5FBEB6E977D00
                                                    SHA-256:6DC6354D761CBE7820C9186568CAB87AD48CA925507F6A740357195B60E16D87
                                                    SHA-512:DF8F46827760BD7EC922C6837E0B6649B4FBD220B79E6F1B67FE3DD8CB3D2D035ECDAF4CF6CE5BDE6DC79C6F7B6EE2B9787AF08A97845CD0D647720A2E78D7EF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:Canada/Atlantic) $TZData(:America/Halifax)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):191
                                                    Entropy (8bit):4.863241040396457
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0po/vXHAIg20puFvHRL/0nPQox/h4IAcGEpoyn:SlSWB9vsM3y7pYHAIgppuRN/0d490pl
                                                    MD5:97E50CE9FBA3F1A6DFCF333F9E6D592C
                                                    SHA1:EE472C411079E788DBF32FAC9C5B7EE121960DC2
                                                    SHA-256:DB32E83949D62478D229E9FB57BB1624D21B3A9CCEE4CD55335F8262C01D820A
                                                    SHA-512:D547E3DC03848A677BE67F7CF4124E067F76EE09BB724A5B10F028BEA72C1526B17678A035B2C53F69498E9ECAACD3C5445D42B7FE58DF706DD2C5F2ADA05A73
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Winnipeg)]} {.. LoadTimeZoneFile America/Winnipeg..}..set TZData(:Canada/Central) $TZData(:America/Winnipeg)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.90775999333305
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7hzi2HAIgphznN/0L5d490hzyv:MByMYhiXphntyQ90hyv
                                                    MD5:E4114CC94C5C1DDF98535BF2B25BF109
                                                    SHA1:212BE0FEF7039C0CDB8AF509927F4C03D8F72D22
                                                    SHA-256:27CCEB515F9B2AB2D441F7C1533064AD13C89A6A009C3F2F14842B217075E231
                                                    SHA-512:06C946DC79190F1C0FAF7F1F41BBEE4EE2A40910913896DE5AA94BC848DAB60F4F40A999CA4218FE1AA499854CCDD9379C937A9DEF273B2C7A352D8CAB8A5FE2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:Canada/East-Saskatchewan) $TZData(:America/Regina)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.758562813220951
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/0nbHboxp4IAcGEqM:SlSWB9vsM3y7RQtHAIgpRQPN/0Dboxpp
                                                    MD5:4365BEFA3D50EEE20843EF97A095E512
                                                    SHA1:7756049B4CD6459742686925E9516E64A9727306
                                                    SHA-256:22844994AE893F3236A091B050E932E84A5218EC0D01F72595E17CCC471FA564
                                                    SHA-512:CB265E79DF926026BEBF7158590369ABE5353C759540F509ABBA2A7ADBE59A705BC2AB936F400614BE610EDB761DE9A2B1E179A0A8B0A87E595392362C2516AA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:Canada/Eastern) $TZData(:America/Toronto)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.8181126338833655
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx07nKL50vXHAIg207nKLyRRL/0nNYLo/4IAcGE7nK1:SlSWB9vsM3y77G2HAIgp7bN/0W8/4908
                                                    MD5:FA0D0024AD72CCE4EC7229FA897FB1B7
                                                    SHA1:4373A07F2674FE974189CC801987652AA97F0204
                                                    SHA-256:D7A203E60FF19DCDEAAD14121720DE51DA73392D25B40FFA301C1935CDF89517
                                                    SHA-512:82EF7F429604A69734B04D298B4C9C9AC3BE57B9DD8C4CECF59C7AB3470BDFBA0505886C4E6AA3864F5EC7FBB4C69C54CF153A6417376828234833013C29A0C1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Edmonton)]} {.. LoadTimeZoneFile America/Edmonton..}..set TZData(:Canada/Mountain) $TZData(:America/Edmonton)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):196
                                                    Entropy (8bit):4.998628928230972
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7tgYJHAIgptVN/0xdBx+90twv:MByMYnKpTt590g
                                                    MD5:A2DCCB8BFC65DD4E7C3BB7F10DCEFF11
                                                    SHA1:6FD2F4FAE06C5D4D3F189A167A98AA76497569DD
                                                    SHA-256:87F42F45FD7D059CA47650D445420DE8320F3A7C1CBC7671FBFA8A8881274433
                                                    SHA-512:F42E32C5BD785BA914E5054784BF67DDF951460A708290D1899621CEEDC63475B584FC052A86A3B6D45BF3C651D42427FB6F9CE2A2A33764DFFF731053BECC16
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/St_Johns)]} {.. LoadTimeZoneFile America/St_Johns..}..set TZData(:Canada/Newfoundland) $TZData(:America/St_Johns)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):194
                                                    Entropy (8bit):4.887587766811186
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7ZLgXPHAIgpZLgFN/0N290ZLgK:MByMY13p1stx901/
                                                    MD5:68900CE38FE0E40578323BBD3D75184E
                                                    SHA1:9D5EAB5CBCD495DD46974207FBE354A81DD2070F
                                                    SHA-256:5C4FD46054B190A6D4B92585B4DAE4E3A8233EE2996D14472835DDD264911DC6
                                                    SHA-512:3EF53F0FCD8D88A1B977886BDFAA03D7B84EF021AC6BEDF7C571BFBF2242BFC3F3EB6A6B6A9C2F6852AF412A96DFBC30F3BB25A6619CBCD8736F3DF5B64DE1BF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Vancouver)]} {.. LoadTimeZoneFile America/Vancouver..}..set TZData(:Canada/Pacific) $TZData(:America/Vancouver)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.887593462838566
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/0nogS64IAcGEsAzEB:SlSWB9vsM3y7hzi2HAIgphznN/0Hd499
                                                    MD5:A4237BDCAF68B0EFECA97178F3DEE724
                                                    SHA1:A9CBC02B5545A63A0C9B38C8FA7FA2DE6D483188
                                                    SHA-256:46BA00AE3A07A4DC83D6CB517D87C9CBBA491B3421FE9AD6C74CAC5695EB73F7
                                                    SHA-512:832BF256BE8CB2DD205DDE50017448D5830B46FF4DCA77BDB852067EE0C9DF9977014F2A3E3DD6944336158D8EA377CFBBE519EE5B56FB26EB64325B45476B9D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:Canada/Saskatchewan) $TZData(:America/Regina)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.889486451014262
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7peR2fkSHAIgppeR2rN/0CF/490peR24:MByMYkGk7pkOtBQ90kB
                                                    MD5:490D99BD5465CBF5A8FE28F33180B8A6
                                                    SHA1:4783295C31A804BE98145270ED28956A0783E655
                                                    SHA-256:A1B1AF37DC89C6BA663E4E967A18409AE4E0FA9EF1B908D0461368DA31001C09
                                                    SHA-512:9F6B4F204A21B69E1DFCB766C0671D3736414C73269DCEDCDB4FC3DBA869BBA1511DF6B5061F8964F0AF9C3816133D04E5DFB8A6AD07CA06E7712787A8FECC5A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Whitehorse)]} {.. LoadTimeZoneFile America/Whitehorse..}..set TZData(:Canada/Yukon) $TZData(:America/Whitehorse)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):194
                                                    Entropy (8bit):4.812019117774239
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7tfEJkHAIgptfEJo5N/0rHM490tfEJB:MByMYE9pEOt4X90EB
                                                    MD5:6EF54792279C249B16877100682F1806
                                                    SHA1:A62629EA055207D917740E3AEF4F0B005EA49CC4
                                                    SHA-256:5B40167DD0C0B5C293861070C4AC249F78DDF8BAD798DD0165E3AE894C9B9570
                                                    SHA-512:3CF93003C3EA2B4386660F0C87074F9AE2BAC4EE72D88451DCB1EA8B79502D2187B1608B6D5CE8D7EDC00AED99CF9DB7B006EB6ED2A2B5009F2C0E757D282D74
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Santiago)]} {.. LoadTimeZoneFile America/Santiago..}..set TZData(:Chile/Continental) $TZData(:America/Santiago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.808907056781067
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG7ZAJWXHAIgObT7ZAiFvRL/0bxOdBx/nUDH7ZAZv:SlSWB9vsM3ycJAUHAIgObJAiRN/04dBn
                                                    MD5:2EC4FDD1EFBAF1D9F9DBAC8B1B5EDD09
                                                    SHA1:FECED8EBC7B666628B7B45C9694FCB3A0B20A42A
                                                    SHA-256:1E2DA1862E0E0F131B7C6EB12FAC5F920852C61C162993A30BC843A464A5AAD4
                                                    SHA-512:74D61141505BAF1ABAD61FB91941C63C169EFE3C85829FEBB4D29A72EA54D1A07EC84E2E9B48E963E65CBF7663245459FAD288D620B1BEFFE682A2D1C243794D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Easter)]} {.. LoadTimeZoneFile Pacific/Easter..}..set TZData(:Chile/EasterIsland) $TZData(:Pacific/Easter)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):175
                                                    Entropy (8bit):4.857134440822812
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02TEMVFfXHAIg202TEyRRL/0lIAcGE2TEMy:SlSWB9vsM3y76EkHAIgp6EyRN/0l9068
                                                    MD5:3FB16EA4A9B0529220133C4A7B05215B
                                                    SHA1:BD56B6E76A92A5925140CB5CC3D940E1DE90993F
                                                    SHA-256:6F4F2D7F5BCA4E5183460C0153D2B98F5239A99F149DE6638B311C73CEDB1329
                                                    SHA-512:690EC1BCE7FA979BD55725B8ED6DF042BB331CAD332827B2C64B31F107539934AA5A30268B1F03D52697528E68A1BA72E4D56B5199A68B1ED897B75FAFB33A8A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Havana)]} {.. LoadTimeZoneFile America/Havana..}..set TZData(:Cuba) $TZData(:America/Havana)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7440
                                                    Entropy (8bit):3.695300167191082
                                                    Encrypted:false
                                                    SSDEEP:96:CgDIMcVbf+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlt:KlfyDjivBeRF+W35Syrwl9h5j
                                                    MD5:34339D40AC889DCB5A09D10F123175AD
                                                    SHA1:57E1F70FA8999106FA3874A9CE1E75A7ACBC81E9
                                                    SHA-256:64E284F9F7A36CC0A352809141D76E73A99344A9F30CFFEA254CBB9D2C589ADA
                                                    SHA-512:2DCF16D9D7593FC3E5844E18FD689AADA157866490CFD37A38A47F747DDA189822055F6DD470CA2D77040D2C5A2527512880C22ED8EC16D9424EDF3DC228AFED
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EET) {.. {-9223372036854775808 7200 0 EET}.. {228877200 10800 1 EEST}.. {243997200 7200 0 EET}.. {260326800 10800 1 EEST}.. {276051600 7200 0 EET}.. {291776400 10800 1 EEST}.. {307501200 7200 0 EET}.. {323830800 10800 1 EEST}.. {338950800 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 E
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):111
                                                    Entropy (8bit):4.924838898127838
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yLbNMXGm2OHLVva0v:SlSWB9eg/ylDm2OHLVi0v
                                                    MD5:B221E7141FFC9DEA317F64F81C7BB4E0
                                                    SHA1:B13BBDE790B169D8B9075275523F319D5173E2C7
                                                    SHA-256:6344BE02529C1CC5F7B5FE14B7E9BBCED4DDE68A24B824601EEBCAE207ABFDF2
                                                    SHA-512:FFFA733476D6C7DCF49C0B88C9F5E381DE2B69BAEDF6C7B1D91C6F45CE2D36E06D40F25B6BB65D4B5D650471BB52CD2EC3F68703DAB4BD5414F8D3F831D92BD2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST) {.. {-9223372036854775808 -18000 0 EST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8505
                                                    Entropy (8bit):3.8091719283634853
                                                    Encrypted:false
                                                    SSDEEP:96:R+kNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:RXoSItON0HY2iUmUFLqU
                                                    MD5:4578FE48781599B55F4BCF5560019789
                                                    SHA1:4EAA7134621DFDEBFD1405F5CC58227FA7E80C3A
                                                    SHA-256:0BE6161403BC5A96BFAB174F2C3FCBA8A677D4349699B408E9872B9DD0FE15CE
                                                    SHA-512:9ACC2EF396F635D22E3DF6B785831AD74B510049F1BE85F996467A5BBC0DF49A28B2FC3E4CA0CA9DC8FC2C29EA50D909F0B153265B107445D3052E81D9A4D50A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST5EDT) {.. {-9223372036854775808 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-84387600 -14400 1 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):170
                                                    Entropy (8bit):4.862365884559795
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsPHV5XHAIgNGE7TRRL/yCh0DcPHy:SlSWB9vsM3y7fHAIgNTRN/yg0DH
                                                    MD5:ACD69F34396296BA553243267D06CEE0
                                                    SHA1:9575FFE5E7833B9532F17AC5413EA9DB23F07ECA
                                                    SHA-256:936B6484469351DEF8FAFE8EC180862729F5E43BDE4E53E2E9636E221B54C3C2
                                                    SHA-512:149D23FF35747127E9A2F4056D09472E8E689970BC795D5411C5BF621D949ADDEBDA68674D375A248A63106ABDFF6C54A8AFE5385C45BE2916CAED0C30F7C4A1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Cairo)]} {.. LoadTimeZoneFile Africa/Cairo..}..set TZData(:Egypt) $TZData(:Africa/Cairo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):172
                                                    Entropy (8bit):4.901791318009318
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV5QH+o3vXHAIgoq6QHFRRL/yMQs/h8QanQHuv:SlSWB9vsM3ymnQeoPHAIgonQzN/yM/hm
                                                    MD5:E9C2C97EB65526F1D4BE1AD7385336FA
                                                    SHA1:09E4000CE320F779E2DFCA2FFD6B9258FFBA6CE4
                                                    SHA-256:B78A833337EFEC8B5F64622F1BFDA21FCB79CF290E9CF32A54B206EB20C6FDE9
                                                    SHA-512:EAEC097B58BF466CC7D6C0C6297628AF910CC308AC822565FD6CDABF96CD4EC57D4CC724FE782B6C1B606DFF9424013F6A890A871339577F7CB68BBB3C425E65
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Dublin)]} {.. LoadTimeZoneFile Europe/Dublin..}..set TZData(:Eire) $TZData(:Europe/Dublin)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):110
                                                    Entropy (8bit):4.928744204623185
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDMbNMXGm2OHvDwy:SlSWB9eg/yRQJDm2OHsy
                                                    MD5:9C08898081382F52CE681B592B8E2C8D
                                                    SHA1:165944424740B1FA9B4B3B8E622198ABD0BDA0F8
                                                    SHA-256:66B0DF8888883BFF44B18728B48CDF24AAED0BB745D601F3422C4F2D4063E0AC
                                                    SHA-512:86EA639F999169F2FBA2457BE5042463A1938031268CCA71FDD03CCBC6194932937BA58B49FBED461E055E9AA668FF6EBF391AA7EC603C0A425416DF2E6CC84D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT) {.. {-9223372036854775808 0 0 GMT}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):159
                                                    Entropy (8bit):4.910789466104329
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDOm7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRSw8RQy
                                                    MD5:333F2BFA92742A49BB88F11C7CD896A9
                                                    SHA1:BB5BEC010C36427AEEBDDA2FB72083E22A3F5073
                                                    SHA-256:64466EA3759301E88C29AD1A833CDCBBC495EB4A5A3AC45E7B2987FECD6702BD
                                                    SHA-512:E2270F4B57C5F1C849726259B886E8644DCF497FA0D034AD48885146BEDC70DC8899900DA9AC01F2609A2DA881E10F9042CCBF75A3F5DA7344D7E92F1B070806
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT+0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.980500771169276
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOveyXMXGm2OH1VOwVn:SlSWB9eg/yRSvPDm2OH1VOwV
                                                    MD5:A7C3FD06D1E06F125813C9687C42067C
                                                    SHA1:515622C0B63E977AFBFC78AD8466053C4A4A71A6
                                                    SHA-256:3BE1EC71D2CC88FA9A3DB7DC0476475F33FE5BCBE6BC35C0F083859766466C32
                                                    SHA-512:548DA608CFCA5B8539652F94CA2040D624602D2DF64B2C8CCDB8B219B9B384E01386CDF95F3BF77409DF0584FA12A3B73D56D13107D98BEB4C2555F458B3F374
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+1) {.. {-9223372036854775808 -3600 0 -01}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):118
                                                    Entropy (8bit):4.965033464829338
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOPFNMXGm2OH1VYU7vV:SlSWB9eg/yRSPXDm2OH1VYW9
                                                    MD5:FF71149E56D4CB553D0ED949B5F4C122
                                                    SHA1:3459B47E0EEC80D7A29512CA4F3F236C89E86573
                                                    SHA-256:E61E826E6FBC2396EF152640698098F4477D4FFDFE5F791F62250C3EC5865304
                                                    SHA-512:43B0CC8BD7F1EFC80C3F14F115D651EADD5743B17B854C2FB7AC25995138D3DF8792915C2952B80F35784A7115F8FB335ACE171479B24C668190AC175523DB21
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+10) {.. {-9223372036854775808 -36000 0 -10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):118
                                                    Entropy (8bit):5.002239901486653
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOeJMXGm2OHaBByVn:SlSWB9eg/yRSsDm2OHa7yV
                                                    MD5:08AABA917A8D6B3BB3D0DD1637F5ABFC
                                                    SHA1:D1D704F0250D4CBD450922A02D021E0000FBF5CF
                                                    SHA-256:143528946275DDC8B894218D3F1BE56C950F740828CEC13166C3D7E8E1B6BB7E
                                                    SHA-512:F37AE54864A613C830308CB94AB7CEA9534A86A53B52B4A2C28CEEFE6F5BC0518143AAFD77A6DA5EC55D392F5BD34FCD4B5BE51794B1A386ED783B9BA89C10C3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+11) {.. {-9223372036854775808 -39600 0 -11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):118
                                                    Entropy (8bit):4.97889339723103
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDONdNMXGm2OH3FNyUFFv:SlSWB9eg/yRSNDm2OH3XyMv
                                                    MD5:7374B66D6E883D7581E9561C3815EB92
                                                    SHA1:235E96A7420DF6733F3CA368D4A2D57766656043
                                                    SHA-256:A93EAFAC2C1089C608C8536127D0E8B53D8C7CFD13AE7DD69339E12A89F803C6
                                                    SHA-512:9BA59B17F20D65DFF1A5A2D557B535F69B04C172AECB15F88CA3484D74CC7D53894985C08653CF13D868BCBD5E7E5041E0CB2F457B5B603F3851198E552E33A7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+12) {.. {-9223372036854775808 -43200 0 -12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.922268982357521
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOcF3vFNMXGm2OHnFQVIyV:SlSWB9eg/yRS0fXDm2OHnFQVb
                                                    MD5:FDDC663E40F8FFFE27959E94625725DF
                                                    SHA1:EE3FBC1F6C8BBCF1BDC9E5DB4D2EA1A57E2E9BB3
                                                    SHA-256:AD5833153446960BDE0653A22AE2111BF80CFD61C3010993CE87B81D40C75C72
                                                    SHA-512:A1B2A153834FEAD7DC27C0918E1B1CB905671F82850C1CAAEBD89F5535703FB259F02F699EA7F82F3044E37668EE93DFA4D4EB862CD437AFF0DABA84867B1963
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+2) {.. {-9223372036854775808 -7200 0 -02}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.949132511023475
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOFfMXGm2OHBFVGAvFv:SlSWB9eg/yRSlDm2OHBFAKV
                                                    MD5:5C6F16F2CFD46030688066F9BFBE675D
                                                    SHA1:1DB5F36584822EB92E75B9AC9F440FD671BD90AE
                                                    SHA-256:C7BEE4C71905EDDB40BAF42C0CD0DC70BB9F298EAAB8B9367D484B8431DD084A
                                                    SHA-512:FFB2C4CD8EA7DE165C3D989454898FF2023D1A1E3B2B34EC23B1B71EFA7BF2538488DA0069E59F1152B8933D2263B762D2D7C56ADBED826C33FC0BA6672E34DB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+3) {.. {-9223372036854775808 -10800 0 -03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.971627677226461
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOqJMXGm2OHBvGQy:SlSWB9eg/yRSQDm2OHBON
                                                    MD5:E35244C1A6084C7BC1D79E437677C55C
                                                    SHA1:898619DA4B8B9AC72E69C7BD30DEA2ADEF9440FE
                                                    SHA-256:26D1EF512CC5797FC63BA2B83C7D6271025F4D4F5C904D9FA8E97F053393D9A7
                                                    SHA-512:0687758558C4C5FF7802F3A57212694A1515761A8337D4B75FFE81434D2AD8A221B005DEC36BF013F2FC3DE1E46DFBED36352811EB7C5A5AE3A167A2E314F57C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+4) {.. {-9223372036854775808 -14400 0 -04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.956438091983076
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOJNMXGm2OHLVvyV6Aov:SlSWB9eg/yRSDDm2OHLVKVg
                                                    MD5:7C560A0F3C42E399AC1247CB6C516DC6
                                                    SHA1:C314B09D4E369C69C23A8DC1FB066FD0CFDC7211
                                                    SHA-256:054910BDDFC44D9B806BBD3008C30547FA57ECD3C043418C406A725158144688
                                                    SHA-512:FCE8431B759BD5359847734FD98D9D91394916235B2AF587FC927D5F3196FB283E241A6A9200EA852F9265ECEF81402FF6ACD0FA3A4AAEF6DF9DB1B056B3A9EF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+5) {.. {-9223372036854775808 -18000 0 -05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.974743300958087
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOAkSMXGm2OHvTmULyn:SlSWB9eg/yRSbSDm2OHviX
                                                    MD5:EEB1A3E0FD3339E332587D19C116D4EF
                                                    SHA1:5DBF046031CD354B1EF88E46D3FED74706D21AC6
                                                    SHA-256:D53BB247E0E429A6243AB9A9BDCAE1EE1CF5F271D79748A843631906AB63A988
                                                    SHA-512:07BDF9056DC335C773684E634B1D389FBD139464D4597DE862B7EAC096676A093934682BF911F4E68F299789931218C0E431F0CC6BEBD7275B5FC8015EDD0942
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+6) {.. {-9223372036854775808 -21600 0 -06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.930134062078826
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDONeyFNMXGm2OHrXVYVny:SlSWB9eg/yRSNPDm2OHriVy
                                                    MD5:F92B31548D6BF8CCFA326C0CA6E205A0
                                                    SHA1:3FFC6C214EDBCBE9C2509306CE73B429113E1C8A
                                                    SHA-256:6BA5779E35D581B409F53B14B6E28ECC16F536FFEDD45DDBC8DAE4B8C28F66E7
                                                    SHA-512:317872E986099D02AF083397AE936854043D54CEBF45A70672F02DDC9E2F3B27BC3FA80902F9675131C51A09BBD3C2BD1CD437330935CEA113C643769E0DF20C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+7) {.. {-9223372036854775808 -25200 0 -07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.915798027862021
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDOOF3vXMXGm2OHmFvGpn:SlSWB9eg/yRSqfXDm2OHaOp
                                                    MD5:B31B15E6006F8DF0D7627D6C90FF39AF
                                                    SHA1:7C4137BE11DA84771DF6DC5EBC32D5E5E87E060F
                                                    SHA-256:CA87559B154B165E83482AEE3D753BA8E38ABCA347A005E8504C566433CF4CB3
                                                    SHA-512:220F7E7379EABBC8ACD7ADBB7A4AC8E93E4B268F8F1C0965B7E6A09735EE86E293EF1C492990331EEB4176B8301A91EC20579756B962AE45C858A96C09349CCD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+8) {.. {-9223372036854775808 -28800 0 -08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.95764928386407
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDO3fMXGm2OHNms:SlSWB9eg/yRSPDm2OHNms
                                                    MD5:5B10173EB7119F1219250763504A3526
                                                    SHA1:A845021437C4638079040EF27AEF163C865FF8F8
                                                    SHA-256:A0987A1D078B0993FB3B07208E3F4538A2319DCDDDEB2FAEA32FC463DEAFB8DB
                                                    SHA-512:D213285D0A723B7771263122AFA269C2ABD0325A97D32C3870341255C06597DD6851C22860CFF42BF54E3FF5A36FC88C306F3BF1C69E7BD7FD7F69FE7601ED1A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+9) {.. {-9223372036854775808 -32400 0 -09}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):159
                                                    Entropy (8bit):4.898210849752128
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDIyHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRUyJ8RQy
                                                    MD5:5AFB7F12BA056619252D48904523DFA9
                                                    SHA1:CD6E6681C8302BF38095975DF556BD14959FDAC8
                                                    SHA-256:EFF27B3DEE9306641FF344801E06BB33FF768CDCCFE2409FA8AF752FF6D39F66
                                                    SHA-512:2869BB347F42667A3D174816466B15916FC61FCB5A6A1BE1DD750C5C1751602FEE0FE5A27651B7A19C9F6764872DD0F00D3D5AA16CA1A743DBA09646D25A4EB2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT-0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):115
                                                    Entropy (8bit):4.979902281541545
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDI/fMXGm2OHMKUrn:SlSWB9eg/yRUXDm2OHtUr
                                                    MD5:4000096844091488200125FC8F50E2F5
                                                    SHA1:9FFEAE66405CFB254180C7DBE185288791DFEE5F
                                                    SHA-256:B4BF883FBE9246EF4079179A746B1F9E59F2C77D4F598794B60732D198DC6044
                                                    SHA-512:25C69E04018C2978A2E5748F0D3C61157453D998C16FA4B3C257A6515B87F5FD2B754893B47604BBC60AB60B60BA162BF2D1463E616E72CB8713C736F1B4D428
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-1) {.. {-9223372036854775808 3600 0 +01}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.964101313797091
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDINFeyFNMXGm2OHMUUMy:SlSWB9eg/yRUN5XDm2OHXFy
                                                    MD5:AE6601FACF6BE1E68083F8D353901181
                                                    SHA1:8B3BFA307D2A94BADD3A1A5E42545D6F7C620BCE
                                                    SHA-256:EF3046D7789CAE069B5473D053F3EF0157248F8A359A1282EE02BA613A75FC94
                                                    SHA-512:1859E6A2CB94EFEE7CD5C17803AA4F2DEEBE4DCF43D3B1EA737DF00BA86ECEC79D296D75E69D5829DECB48380B6B650724104FFA7959FD18FE032DF7D002A88B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-10) {.. {-9223372036854775808 36000 0 +10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):5.00162575418652
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIVSMXGm2OHlVVtyn:SlSWB9eg/yRUVSDm2OHlVLy
                                                    MD5:D864BA451C9E441BF47D233626C57B99
                                                    SHA1:6C38E6F8BA292575C496124572D187F97C9F8E73
                                                    SHA-256:CCDEADBD18BE81E59A669A460A14AFCBFF733C3A5D164FC2B6B93DEAF009B78A
                                                    SHA-512:5C16BD1189F3FE6789CB3630C841FD168EC87D0498EE6FCC4C8D635F8CF4BCAF0558B44F859C37E418F6BC5A7F6693D6EF1DD218A1DB6DA2D54FF55916685119
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-11) {.. {-9223372036854775808 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.978079707159482
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIjbNMXGm2OHwvv0UIoAov:SlSWB9eg/yRUjJDm2OHwvv0YAov
                                                    MD5:C3E7748C7CB9D8A7F7FA5170D5098983
                                                    SHA1:54F5374A32173BEC6EDA430745DCD18749ABC233
                                                    SHA-256:23B61B18C653E25F7245B0BB6E04AD347E038585B145962FD1EEACE26F118D54
                                                    SHA-512:4783A7CD4C94CCC67C1C71F9C5D9CD99A3918EA4792D8CE2443ACE8F034B9023EBC02405B5DEAB919AA35FD1FD29D8980774316AC96D32ECDEBEFA15BBE6878D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-12) {.. {-9223372036854775808 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.994320173226919
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIaMXGm2OH1dNv7Dy:SlSWB9eg/yRUaDm2OHty
                                                    MD5:224AAAA8A31C283F50149A090E3970D5
                                                    SHA1:E7E4876EC2474FEFD82D4B174CA8E3A3427062F5
                                                    SHA-256:A9F1AD5A7CB5ED43C5E6E8A7A9B887329890ABB75B9FC9483B8543A367457EBE
                                                    SHA-512:6EE0C6F519AAB2DAA3F7D802F0F838BA9F6BF1D56530000D3C9EA4FDA81DCB9832A3285E36208F29EEB23C27EC5BFD3438DC272929A7531268B7C0626A65D6A5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-13) {.. {-9223372036854775808 46800 0 +13}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):117
                                                    Entropy (8bit):4.9895752453470585
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIxhfMXGm2OH0FVtXvFv:SlSWB9eg/yRUxJDm2OH8jNv
                                                    MD5:8ADF71739DCADE63433B7BF8321EAC77
                                                    SHA1:AA6BDE83FF0D8BCFDE0426160250F2D17D3AF81D
                                                    SHA-256:A37A7160027BD38356764C4D1AA5B9B17F8D5DC3CFB81EF2ED399E44C41734CE
                                                    SHA-512:AEE3929DE269ADB5265A54841F041E41595359C101539F6309A4E737E3F5DF0BC91560781C7118975398C29A084113682C78F66E07E2E4AC5EAC8DFC33C4F0ED
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-14) {.. {-9223372036854775808 50400 0 +14}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):115
                                                    Entropy (8bit):4.921164129348819
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDInWNMXGm2OH/VXF9:SlSWB9eg/yRUnSDm2OH/Vb
                                                    MD5:CABB864F4E76B90928F5C54CD9334DEB
                                                    SHA1:4818D47F83F16B9F7612D1E979B2440C170ECDB9
                                                    SHA-256:7211BF8329B2388563ED8FA8C5140099A171B8A303A9473E9A6F3AF0C5D239CB
                                                    SHA-512:1FDCB05D675F1D28CB52B9F5EAC7EC52FDF2CE7E7411740A6F8FB5E9D443ED636CE268E3AF9E08605CC3E13A49B2D86FF4EA6A85F518D5C79E263BA94263361D
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-2) {.. {-9223372036854775808 7200 0 +02}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.948161547682094
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIYyXMXGm2OHkNsWYcv:SlSWB9eg/yRUlDm2OHkKWYe
                                                    MD5:4AE5F29A13A86E4A7064E9200668E43B
                                                    SHA1:2460BD1BB0FF3A3C774A5C7CC3DA10235DA06B0D
                                                    SHA-256:BFC86D65B0B94725DCE4C88EDC4300141ABBCA4B6CDECF037C437DF49F0C1D6A
                                                    SHA-512:190DC38B4A20F964C967866507086317D85D979DFCFA415D1569C485C6476024922BC6E7103273C41889D9D7B22E97933F286FCF4D341248077C1BA777D0EE3B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-3) {.. {-9223372036854775808 10800 0 +03}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.970850637731657
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIQXMXGm2OHkVsRYovV:SlSWB9eg/yRUQXDm2OHkSN
                                                    MD5:BBAF760E27C02D176A675AC3CF2D1E6D
                                                    SHA1:E524FAA7D424A1C1545D1D8EC00169125A68E8E5
                                                    SHA-256:02E2EEAF88EE179EF63DD29ACC7384A4B46DE1E3A151C1F3A5DD31BBB5A05AEE
                                                    SHA-512:6AC7CC0E52E7793C7F2D3DDA9551709DEAE654C1182EAD7108D04F1BAAAB7E1C473B6E8A3A126B0E421D8A246294A03B2EE9E070330924502DF2869CC61C37F7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-4) {.. {-9223372036854775808 14400 0 +04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.955530107787899
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDI7tNMXGm2OHM0VQVFv:SlSWB9eg/yRU7PDm2OHnVQVV
                                                    MD5:17F64A5969D3755211E60C0A9F83974F
                                                    SHA1:FEFA84725EFAE6405F43797296C342B974F2D272
                                                    SHA-256:3A2C75DCA11D1167126F0D44A8682420FAF75B0B82B3DCFC35A9F028A9A759E8
                                                    SHA-512:77DBCD8284A470E4869976E2E8A5EDE28104283F120C863785A6B2E64CF87E06243196817C0055A9B32D6FFFE94A25772F67D58BF8E885F7EC06C34FABE38766
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-5) {.. {-9223372036854775808 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.973993120288556
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIg3fMXGm2OHETNSTVVn:SlSWB9eg/yRUgPDm2OHETMX
                                                    MD5:51CAF7956E133C8A9788AE0B8C6145AB
                                                    SHA1:47F8B49DF9ED477BD95F908693A483AE4FDE881F
                                                    SHA-256:D22C87321373EC0EFB0F312925476CD0747323EF303E17621A871BF814C8ABB1
                                                    SHA-512:EC4B4BE74C1BA64DEC8EF11DAAA338C52BD67D55E8A2352FBC6C83FA142F8DBE424CC1110E9A9D9A891E1E858D1FFA6D1E3B997D41BBB374556FA1F9A708559E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-6) {.. {-9223372036854775808 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.928999319005163
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIpdNMXGm2OHAXUVSYovV:SlSWB9eg/yRURDm2OHAXUVSYyV
                                                    MD5:56D88B54CA33B43E2E7D3EA6AD3A4D6E
                                                    SHA1:9351E0C001C5D83325281AF54363D76D65548B7D
                                                    SHA-256:70CB3A766A2E84148B68613D68687D263D3592ED4B6E672797FB20801ECA8231
                                                    SHA-512:32B58AD16F64590903C7AB49BA4890DAF6F1F3D33187A7654D3DA88A1C0047483EAA58B2498D824A30116E235FCC8F8FB3FADD57F86396240E5D92B2CA337027
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-7) {.. {-9223372036854775808 25200 0 +07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.9145396982864895
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIlSMXGm2OHN/VsdYLyn:SlSWB9eg/yRUlSDm2OHUp
                                                    MD5:E462AD5E0C046EA6769EDB4B2C80F4D4
                                                    SHA1:6DDB94485648622875E0927BA1E8CFE67CEC1382
                                                    SHA-256:80C85D59416CEC91DB3DAC5FDD2FD7B91D6FC74A37BBBEF6FF58F6F6816E8FC9
                                                    SHA-512:42734FD2DA8BD6E0BC271FF1375A31DEB72EED85AB5EA6E1E0F81EE4E3E7E74380FFC98FAC30409684F736DB580AAAF4F62DB4757AA35C10383584F6144EF363
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-8) {.. {-9223372036854775808 28800 0 +08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116
                                                    Entropy (8bit):4.956751740978211
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRDIeyXMXGm2OHENScFAy:SlSWB9eg/yRUPDm2OHsScr
                                                    MD5:98F70EC1B1AC7D38CB8D01705FB0CA56
                                                    SHA1:EDAFA132E48935ACEB8E72D3FF463E4FC857C1A9
                                                    SHA-256:57395BB968AFA5A041EADA4B684B82F0379A9333F9522D69F069A79FDEA2B8D7
                                                    SHA-512:97B8D7603D6B54C075B005B905B2A7A28B8BEA67894F055663C44D2BF730BB937AC8EF5B2DF182BDD2D9EFFDBD135DF9467C813AEE39AA6B34256908A12DC011
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-9) {.. {-9223372036854775808 32400 0 +09}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):158
                                                    Entropy (8bit):4.886484135647838
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDVMFHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRC1p8RQy
                                                    MD5:F879FB24EA976394B8F4FAF1A9BF268C
                                                    SHA1:903714237EBD395A27EAF00B3DAAA89131267EE5
                                                    SHA-256:AB742F93BE44BD68AB8FE84505FA28120F1808765D9BAED32A3490AF7C83D35B
                                                    SHA-512:F5EE4C331E37036516F2A1BF12F2E088B2E2C7F6475127BF4E7B4937F864550D64D570BC855B6058D4311755E8696EC42095A36AEF13BB29E62192EE0AFB6EAF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):163
                                                    Entropy (8bit):4.911342539638601
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRp+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRp6BURQy
                                                    MD5:CDD2DE9CF0FECFEA0CDD32DAC32DCDE2
                                                    SHA1:311CD4C6E819E18BAAACC382F81359BC208E2F73
                                                    SHA-256:F89167B6117838D9679C0397496B6D96D3A7BEAEF0BD99406ABACDBDB658FBCC
                                                    SHA-512:1AF061D07D2F579A089905B6B259AABD7C58F4FA0CD379EE54206164F0DCAEA5C720FB1F5E76F5782F8613E62D8F83BD55F1848D5D7A73D4A5C9F7BC6B9F5DB1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/Greenwich) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):157
                                                    Entropy (8bit):4.838936002050477
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRKh8RFB:SlSWB9vsM3yzTHAIgm6N/yR68RX
                                                    MD5:0587EB7D1B1C684A4A0F90D3CB0959C8
                                                    SHA1:3F2840AE512774494D9A0B6357C52CCB7DBA5265
                                                    SHA-256:0856D14DBBC53D46460BCD530BD070E9E8966D1C96BA01BA556E215A98C09CD4
                                                    SHA-512:DE38EF28893853219AC24AE4A522307ADAA1502F6D0C129219FAD9D75CFCE03A505C3E0758CFF2D2D4F7101414A5F7E4FC1C1B119B667E6A9C89B60DDA641E86
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/UCT) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):110
                                                    Entropy (8bit):4.903699772785336
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/yRF3yFNMXGm2OHvL:SlSWB9eg/yR9SDm2OHj
                                                    MD5:3D3F94B6AC5FA232E509356C703D9177
                                                    SHA1:502B8EE9D4A1EA75A91272181AC87B9B6ECE1F84
                                                    SHA-256:4D74D9EC2397B1708FEF47806294B0BCA26679F3A63149AE24E4E0C641976970
                                                    SHA-512:205A761A01C577F602236CB5C9938C834B7F3F9F681B94036B0A86101119893EF87D206D0C3F7737075ED833D4E35E374ACAE6605163E9C37B705D99BEBC928C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/UTC) {.. {-9223372036854775808 0 0 UTC}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):163
                                                    Entropy (8bit):4.874807282103623
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRYzXDJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/yRY7VMr8RX
                                                    MD5:65E28EFF342B625E79175793FD38F9FD
                                                    SHA1:08B11474822E670DEAB8F0EA168BAED7D5E3DBE1
                                                    SHA-256:A2B62C5914DE169A68A018A5B47C1253DBCA10A251862D17B0781ECFD19B6192
                                                    SHA-512:79641D0E05F81BFB80034937D34E74B7483A790F33C1F9A0FA92C6A7913AC8C03036CFDEFB43850B84EFB3DD3C4A39022DC8F22E5B5DE6353586A546E03A5789
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Universal) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):158
                                                    Entropy (8bit):4.874356623237119
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRaQEBURFB:SlSWB9vsM3yzTHAIgm6N/yRYaRX
                                                    MD5:EDABCAC858EC9632D5D8DCCFB28F4D6E
                                                    SHA1:E5BEF1367A97A1900749CE6B1E01CF32F582BDD9
                                                    SHA-256:BBD6E93206FF3B7017AFBE63905B4C932C422B582F3CE2A79A7B885D390EE555
                                                    SHA-512:3A22364D423F2F970123561408018A2B72F43C4978836D3B6DF7517217445605838DCB8DDBDA204FD01C49A4A7D5ADAD4CA8BDA7C3B412D54750BAEAA589B683
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Zulu) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9102
                                                    Entropy (8bit):3.899679308991091
                                                    Encrypted:false
                                                    SSDEEP:96:UvV6eHuZ+y+2KDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOn:SVJUSs41sFpM5vwA6Efv03TBZLl
                                                    MD5:262A99D2D471F855C2A3C96CACB0C431
                                                    SHA1:2CAC8BFAD1A626A189413203ADA2E2B753A6DA69
                                                    SHA-256:5808F77CAB37ED4F52F0A02FF0B75EA194F8799A2165695CA3650579CAD498D9
                                                    SHA-512:6DC3BD4177292C07390CD0EC2F672FB6846CEEFA1A2C57B2C8E84CE43C90486544350DA998A5E36CA7A02C46859B4183D829B26013E01071014C6E2849D6573C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Amsterdam) {.. {-9223372036854775808 1172 0 LMT}.. {-4260212372 1172 0 AMT}.. {-1693700372 4772 1 NST}.. {-1680484772 1172 0 AMT}.. {-1663453172 4772 1 NST}.. {-1650147572 1172 0 AMT}.. {-1633213172 4772 1 NST}.. {-1617488372 1172 0 AMT}.. {-1601158772 4772 1 NST}.. {-1586038772 1172 0 AMT}.. {-1569709172 4772 1 NST}.. {-1554589172 1172 0 AMT}.. {-1538259572 4772 1 NST}.. {-1523139572 1172 0 AMT}.. {-1507501172 4772 1 NST}.. {-1490566772 1172 0 AMT}.. {-1470176372 4772 1 NST}.. {-1459117172 1172 0 AMT}.. {-1443997172 4772 1 NST}.. {-1427667572 1172 0 AMT}.. {-1406672372 4772 1 NST}.. {-1396217972 1172 0 AMT}.. {-1376950772 4772 1 NST}.. {-1364768372 1172 0 AMT}.. {-1345414772 4772 1 NST}.. {-1333318772 1172 0 AMT}.. {-1313792372 4772 1 NST}.. {-1301264372 1172 0 AMT}.. {-1282256372 4772 1 NST}.. {-1269814772 1172 0 AMT}.. {-12507
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6927
                                                    Entropy (8bit):3.8182041031531897
                                                    Encrypted:false
                                                    SSDEEP:96:CA34elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:CI41sFpM5vwA6Efv03TBZLl
                                                    MD5:D897DCA686A03495EB2C3323FAB0BEAD
                                                    SHA1:1433BC303DE92F7B36F881C8595A42B35E0814FC
                                                    SHA-256:F0B48DA7CA3659450D87CC0DDFDDFD28B464543DF1EE40D935C44D5CD7C9B9B3
                                                    SHA-512:A1C4AE1E0EC26B159B0F5D058A7A77B8774F611A4D3C6AECEDD7186957D6BD9F15CDFCBA248FCC8A4B4146BD72CD7D66B9F88A2BF7CDEF416F1831A2F335D48C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Andorra) {.. {-9223372036854775808 364 0 LMT}.. {-2177453164 0 0 WET}.. {-733881600 3600 0 CET}.. {481078800 7200 0 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0 CET}.. {733280400 7200 1 CEST}.. {749005200 3600 0 CET}.. {764730000 7200 1 CEST}.. {780454800 3600 0 CET}.. {796179600 7200 1 CEST}.. {811904400 3600 0 CET}.. {828234000 7200 1 CEST}.. {846378000 3600 0 CET}.. {859683600 7200 1 CEST}.. {877827600 3600 0 CET}.. {891133200 7200 1 CEST}.. {909277200 3600 0 CET}.. {922582800 7200 1 CEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2063
                                                    Entropy (8bit):3.679377249443024
                                                    Encrypted:false
                                                    SSDEEP:48:TvCAs6kKR6aQmF1cSNWrI+AjXgV/Ap40FjDOP:rCAs6kC6aZF1cSN4I+AjXgV/ApDFjDM
                                                    MD5:CB860328FA96A14055BF51A3B2D35A08
                                                    SHA1:CFA49DC861F4AC3D29A78D63D71C2D6D83D68F84
                                                    SHA-256:4B5FB0AF225974D117374028285F20A02B833FF4136E6BFAE7B65E6D6D28829E
                                                    SHA-512:960152826F4245012462E53F80B69B0C45C27D75D46C70D485674CA19071DF268671C7691B614BE53B9E7BD8CFEC5D24F3DCF933F2F14D827F2A32EB347D7540
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Astrakhan) {.. {-9223372036854775808 11532 0 LMT}.. {-1441249932 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7954
                                                    Entropy (8bit):3.7252594544513795
                                                    Encrypted:false
                                                    SSDEEP:96:1D/8QdzFu+f+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:Z/8ohvyDjivBeRF+W35Syrwl9h5j
                                                    MD5:8B2C99E1CD04D7559709FDF8D382343C
                                                    SHA1:C595D5159C742B815AF89EC8604376E01291F9F1
                                                    SHA-256:47353319419505AAB205C23F8C97EA0B12E5DED2113147794F77B67349AFF52F
                                                    SHA-512:227CA21A3B6160357988582E261A62AE7B09D46D479EABFAC8039185D710EFA765CD1694F4388EBF8800978A1E1DB69F6AF9BB9BF82C0FCD66E883930E1F8249
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Athens) {.. {-9223372036854775808 5692 0 LMT}.. {-2344642492 5692 0 AMT}.. {-1686101632 7200 0 EET}.. {-1182996000 10800 1 EEST}.. {-1178161200 7200 0 EET}.. {-906861600 10800 1 EEST}.. {-904878000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844477200 7200 1 CEST}.. {-828237600 3600 0 CET}.. {-812422800 7200 0 EET}.. {-552362400 10800 1 EEST}.. {-541652400 7200 0 EET}.. {166485600 10800 1 EEST}.. {186184800 7200 0 EET}.. {198028800 10800 1 EEST}.. {213753600 7200 0 EET}.. {228873600 10800 1 EEST}.. {244080000 7200 0 EET}.. {260323200 10800 1 EEST}.. {275446800 7200 0 EET}.. {291798000 10800 1 EEST}.. {307407600 7200 0 EET}.. {323388000 10800 1 EEST}.. {338936400 7200 0 EET}.. {347148000 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.876296755647751
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQahs3QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/y72
                                                    MD5:7160C6EE32380846653F016AE8AFD52A
                                                    SHA1:DE7805089639C54893F2107FA67342DA72A79BBC
                                                    SHA-256:557023674F6E8376707517103EE69C1DEBBE53CDD4BCAB11E763CC53B9CB1908
                                                    SHA-512:FDBDECBBDB0C419226E2604608FD2923CFB06E4B6948493208FD83FD796880E81F6147C0FAFEB572079C9C916831B7B055620EC939164CCA1DAF76897BE60F2C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Belfast) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7309
                                                    Entropy (8bit):3.8204712502914653
                                                    Encrypted:false
                                                    SSDEEP:96:lp+/4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:lY41sFpM5vwA6Efv03TBZLl
                                                    MD5:02A003411B61A311896A6407B622152A
                                                    SHA1:3B8BC6D1AF698CE7BB14A08307F5A4295EB8ED03
                                                    SHA-256:74B225511B518B0CED972CBB33D694697712CCB96A6D81E0F50ADA28CF6E2C92
                                                    SHA-512:9E03B3EB1E528E5B1ADBA09F808E73BF9C4314EDCBF6F96E46844D51A5F425BED3EE8FD5BA8706C46A7FB9882485F119F81996F2EAB7E1E9B598978C402DDE0F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Belgrade) {.. {-9223372036854775808 4920 0 LMT}.. {-2713915320 3600 0 CET}.. {-905824800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-777942000 7200 1 CEST}.. {-766623600 3600 0 CET}.. {407199600 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 360
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8020
                                                    Entropy (8bit):3.820756136386754
                                                    Encrypted:false
                                                    SSDEEP:96:Pi9+qFR274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:PQs41sFpM5vwA6Efv03TBZLl
                                                    MD5:84027C3C8315BD479B38DE11F38E873F
                                                    SHA1:6E92A2A9734A9C6B02ECCD99F114D667C909C5BA
                                                    SHA-256:7E7111F06288069B52A4E1CA0B016216DF9328FB3B1560A740146497CCDD4D24
                                                    SHA-512:5FFDE523021FC0C490261F55999204C9CE6C8C274888525EA6EE7C01BC5CCABC7A3877FD454B4167D81F4B89BACB087E8BA6AB0BAC46C2874ED9257BE2092340
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Berlin) {.. {-9223372036854775808 3208 0 LMT}.. {-2422054408 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-776559600 10800 0 CEMT}.. {-765936000 7200 1 CEST}.. {-761180400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717631200 7200 1 CEST}.. {-714610800 10800 1 CEMT}.. {-710380800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.943205109348136
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVtXrAeovXHAIgoquXrsY6RL/yQahcvEB5yQazXrH:SlSWB9vsM3ymzbAeSHAIgozbsY6N/y7c
                                                    MD5:C69AB60BE74D4BB7E31BE4E5ECCD8FD2
                                                    SHA1:9DD0BA6171080F074858EF88ADA2E91C1F465619
                                                    SHA-256:1D7C539AAA1E3AD5EF3574A629523B5B781F1A91D352C9B39B8DE7316756026E
                                                    SHA-512:C273B97CCFB5F328EB7A13CCA3126DE8D91B3876CBD248990C0BE063DDBE5B0F31EA138E31A1C5C43B1ABCF42EA511448E6DC589EB99E8172D7C2A68BA31A8E7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Prague)]} {.. LoadTimeZoneFile Europe/Prague..}..set TZData(:Europe/Bratislava) $TZData(:Europe/Prague)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9223
                                                    Entropy (8bit):3.8450929464870804
                                                    Encrypted:false
                                                    SSDEEP:96:RhcSQnG1Czyc1+FdDKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcM:Rh8zyc4Ss41sFpM5vwA6Efv03TBZLl
                                                    MD5:E6C1153C3F71C8C005D7A46DDF6461FB
                                                    SHA1:CBDF7D5D36AF57D83859C910B493464617EC9571
                                                    SHA-256:1402A2072ADC9EBB35F4C0368D2E9A7A11493626C667C022614FFB7CC05B6CB6
                                                    SHA-512:8B1B47678F75DBE59DB08E034F0701BD11FF4FD3AD0304C8ABF45E848F717D2787B8E47558D3C334D369E0938C633DC217178D3EAE6486CEFBE25CF1668479F6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Brussels) {.. {-9223372036854775808 1050 0 LMT}.. {-2840141850 1050 0 BMT}.. {-2450995200 0 0 WET}.. {-1740355200 3600 0 CET}.. {-1693702800 7200 0 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1613826000 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585530000 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1473642000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301263200 0 0 WET}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7974
                                                    Entropy (8bit):3.7264631277913853
                                                    Encrypted:false
                                                    SSDEEP:96:vMSsQMAz5CXNU5paNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:vMS1kdUoivBeRF+W35Syrwl9h5j
                                                    MD5:88DB5686937D3499A8142413B2CF2EB5
                                                    SHA1:E37BAD2127553600D0E38A43053D1B07B2498DA8
                                                    SHA-256:C560D45104A8DD73FC7370B5AC1615E22043DBC93DFB46A9ECC6468C2D38B19A
                                                    SHA-512:375B8A63CFF2E278CD8C78BF9DBC86288FFB1AD57DAED00CD2199F0B05F4FBFA7D17D93C6458B20B86F6D05F3E3A49D594E60AC97DDB47141E21D7CDE10F8456
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Bucharest) {.. {-9223372036854775808 6264 0 LMT}.. {-2469404664 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {296604000 10800 1 EEST}.. {307486800 7200 0 EET}.. {323816400 10800 1 EEST}.. {338940000 7200 0 EET}.. {354672000 10800 0 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8287
                                                    Entropy (8bit):3.8244305880244567
                                                    Encrypted:false
                                                    SSDEEP:96:rHw0+D5xp4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:rQXj41sFpM5vwA6Efv03TBZLl
                                                    MD5:11468F958796F971ADD5FB1A0C426D78
                                                    SHA1:3FA58BEF391BCF7BAC6A124D093B6505B4EAC452
                                                    SHA-256:B58F3E9066B8B57EB037D509636AA67A06ACC8348BE6C48482D87CDC49844A4E
                                                    SHA-512:0492EABD6EE16392C00A196AF38995E5F9E55E30A82A50EFFB381DC978E9E63E801555CDC219869E6251BD51115972F742D8A7D9524372B8B11702AE4B28BFB7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Budapest) {.. {-9223372036854775808 4580 0 LMT}.. {-2498260580 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1640998800 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1600470000 7200 1 CEST}.. {-1587250800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555196400 3600 0 CET}.. {-906775200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-778471200 7200 1 CEST}.. {-762656400 3600 0 CET}.. {-749689200 7200 1 CEST}.. {-733276800 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-686185200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-492656400 7
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.952483060656419
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQahDZALMFB5h8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/y7D17/f
                                                    MD5:CED145F8D9B231234E021D2214C1064B
                                                    SHA1:7B111DC24CA01C78A382CECD3247CF495D71CD34
                                                    SHA-256:F511A80AB70FF93A0EB9F29293F73DF952B773BB33EB85D581E4FB1FE06E4F05
                                                    SHA-512:E2323C04BF99909ABA9A09A66F9B4696519B5F9FE3AF178FB04D5E0053F41CAA8B937DC4148954ED093D317F454E0547786BEC934F2ABF22A60AAA6A24E63BF9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Busingen) $TZData(:Europe/Zurich)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8096
                                                    Entropy (8bit):3.7635458172251406
                                                    Encrypted:false
                                                    SSDEEP:96:jXSsijEpkv2XkN8qc/OyEie8hF5WQ9VX/Zs1cw27oXqdCA5XqjqFLigTE9s5VpJ:jXS+WeUqKie8hF5f9PwdXM9
                                                    MD5:E7F52393523729CA3916768B3F3B4E55
                                                    SHA1:1524A3E610DCD33AC0006946BAB2929CA7F5A33F
                                                    SHA-256:2BD1C0AB412A5E9C97F533C4D06B773D045215B92568A4E89ADC93C7462D62EC
                                                    SHA-512:218674ECD9FD6C1A1C83EE69AFE6AA5AD0D5A8BB59FF497FDF2573B7CF52DAE98ECE0815CF99668CA4E172FF67D220B227369865076333B3EE802A8839C65279
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Chisinau) {.. {-9223372036854775808 6920 0 LMT}.. {-2840147720 6900 0 CMT}.. {-1637114100 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {-927165600 10800 1 EEST}.. {-898138800 7200 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-800154000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7722
                                                    Entropy (8bit):3.8237774522471564
                                                    Encrypted:false
                                                    SSDEEP:96:vFKb+vS74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOR:vFKX41sFpM5vwA6Efv03TBZLl
                                                    MD5:F9BC892F4BAE6712718C75AA5A07E1C7
                                                    SHA1:D7BDB30B9E10A7B6FABB5A257F9F6C538C1E3371
                                                    SHA-256:C6ABC78AD0F03F903E04DB41067B555F9E589E321E253A01ED819189C6FFFC0E
                                                    SHA-512:A8F8BF7ED070A5DA021BC0A5F87003B7DE433EA66B38A09CA6BDC5F4DC964D35758AE325B0687694AA5F712EF563D1EB8444D11CBDD8332457AB8BBFF8602363
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Copenhagen) {.. {-9223372036854775808 3020 0 LMT}.. {-2524524620 3020 0 CMT}.. {-2398294220 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680490800 3600 0 CET}.. {-935110800 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 0 CEST}.. {-769388400 3600 0 CET}.. {-747010800 7200 1 CEST}.. {-736383600 3600 0 CET}.. {-715215600 7200 1 CEST}.. {-706748400 3600 0 CET}.. {-683161200 7200 1 CEST}.. {-675298800 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9810
                                                    Entropy (8bit):3.7669748644882417
                                                    Encrypted:false
                                                    SSDEEP:192:fbxxHZiMU8EKTy74jT56XdEN1+UZBdMN186LPR:fbzZiMUZ6y0jT5bZHMN186LPR
                                                    MD5:726F01B47BB99952639200AB73E29425
                                                    SHA1:FF38CF353CE007BE871A27DDF836D198D21F167F
                                                    SHA-256:930F4E37B6D60B6701CBA95EEA1F6053D85E5F9DE6BBE287A0D43E24B9D63FB0
                                                    SHA-512:CF3567BCB23C75527F154C987FAFAD09A5E84E0745A3DB55D268688E5BB37D4E17E2D71EF608FA9C1CA99066BD384108AB9F8C7AD5CAC9A95BC6A541B0135699
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Dublin) {.. {-9223372036854775808 -1500 0 LMT}.. {-2821649700 -1521 0 DMT}.. {-1691962479 2079 1 IST}.. {-1680471279 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1517011200 0 0 IST}.. {-1507500000 3600 1 IST}.. {-1490565600 0 0 IST}.. {-1473631200 3600 1 IST}.. {-1460930400 0 0 IST}.. {-1442786400 3600 1 IST}.. {-1428876000 0 0 IST}.. {-1410732000 3600 1 IST}.. {-1396216800 0 0 IST}.. {-1379282400 3600 1 IST}.. {-1364767200 0 0 IST}.. {-1348437600 3600 1 IST}.. {-1333317600 0 0 IST}.. {-1315778400 3600 1 IST}.. {-1301263200 0 0 IST}.. {-1284328800 3600 1 IST}.. {-1269813600 0 0 IST}.. {-1253484000 3600 1 IST
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9509
                                                    Entropy (8bit):3.8837074152297704
                                                    Encrypted:false
                                                    SSDEEP:96:QTOKVA1oCobz0W4x2+ZE74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNA:QyoCvTZ641sFpM5vwA6Efv03TBZLl
                                                    MD5:D04F8EDDA1C3611692FB91E317CCADFE
                                                    SHA1:1C483FC95459EC6F1D5FE4DD275879A9EBCA1718
                                                    SHA-256:0524A31131405347C1D5D86C5EE38A2064AB055C030AB3B43F25DB3B28FFD8D2
                                                    SHA-512:4E2E18EBDE2765F2251B1FE41EF8E6AC79875617348974A28619F5E59EC0467239C682CCE8DEBD7A698BE2F00252C77D1F7FA50B6CAFF920B3BE53A0B836F815
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Gibraltar) {.. {-9223372036854775808 -1284 0 LMT}.. {-2821649916 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.879252060643389
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQakQAL/yQavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yYU
                                                    MD5:07AF23DA01CB963EA9E57534E34E7704
                                                    SHA1:1C4A214FF3B722E80C0ECACA0FFD5DFF302F6AE9
                                                    SHA-256:F7046808A8E80B7AE449D1A49AE3E480096736B7D3F554A240C7DFB10F82076A
                                                    SHA-512:713860D340C0EBA5EEF873ECB9B28CCDE9BFAD31B6A8626EF507E96585F5CC1091BF8D8A2DB7E5CB532E44F4561FBAE1797141724EF934755B69919FEA09A78A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Guernsey) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7368
                                                    Entropy (8bit):3.7258352536809705
                                                    Encrypted:false
                                                    SSDEEP:96:OsR0uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hzj:OkyDjivBeRF+W35Syrwl9h5j
                                                    MD5:7FF902B06FA79F14553670A70E77FF8C
                                                    SHA1:0105051541F38956EA6192BD0C7ED4047668005E
                                                    SHA-256:5B5C0A9261A414EA8DC34F594EE05BEE16F695488B230857D2B569A6B603BC39
                                                    SHA-512:551940199783A0FF9D73695B77B10300644F50E91D6B02FE79BB0CD4B78C7BA88CCE56F4B9408EC146361BF408F52D01A1F435183360C801EA5E219FB718247F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Helsinki) {.. {-9223372036854775808 5989 0 LMT}.. {-2890258789 5989 0 HMT}.. {-1535938789 7200 0 EET}.. {-875671200 10800 1 EEST}.. {-859773600 7200 0 EET}.. {354672000 10800 1 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {410220000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 EEST}.. {717555600 7200 0 EET}.. {733280400 10800 1 EEST}.. {749
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.914274131294981
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQaqpfioxp8QavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/ycS
                                                    MD5:F9A0F19FAF3131D8A70C50FF21B365B7
                                                    SHA1:7FC2B5302FAD06BC4C633CD22A80A7D40073FFF8
                                                    SHA-256:2F1151B0528A5325443379D4E7CCE32C00213722AD9DF764E1DC90198084B076
                                                    SHA-512:6D04DF4480FE132A6641C4BF7E01936E2E4A71A3A6C2AB9F7DA7A9D8A4B836BC66EE2BB597B8C318D07A06F72C05B07E6785B53308ED9BC1103AE6DBDD0FF24E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Isle_of_Man) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3683
                                                    Entropy (8bit):3.814835316757376
                                                    Encrypted:false
                                                    SSDEEP:48:Qi0p05zvSPBUUl0ZFzo4ay0CREDcxn6nH78BV0QbCgkCPviiM0H7hdli80+j7x9L:Qiq66OFEIFMssCfMsXV3heM2MRlA0
                                                    MD5:A8256656B971F58CB991BC270BF93B26
                                                    SHA1:189796E1B8E29A7A7B8B0E143DD9B44BAF217AB2
                                                    SHA-256:08061A80FC0F1EF375EEFE784EACDF0812E289FD67E8613BDEC36209985CA1D7
                                                    SHA-512:1F11308B5BAC1F3DB75CAC7322BBEA6E51C6B4A2A3450F1DB84DE6AA127F0F1BAA7DAB409FAF1288C100BDA77DA6FA1C6E3C0BA962F9406D1445D7C9E2AA3A60
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Istanbul) {.. {-9223372036854775808 6952 0 LMT}.. {-2840147752 7016 0 IMT}.. {-1869875816 7200 0 EET}.. {-1693706400 10800 1 EEST}.. {-1680490800 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1440208800 10800 1 EEST}.. {-1428030000 7200 0 EET}.. {-1409709600 10800 1 EEST}.. {-1396494000 7200 0 EET}.. {-931053600 10800 1 EEST}.. {-922676400 7200 0 EET}.. {-917834400 10800 1 EEST}.. {-892436400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-764737200 7200 0 EET}.. {-744343200 10800 1 EEST}.. {-733806000 7200 0 EET}.. {-716436000 10800 1 EEST}.. {-701924400 7200 0 EET}.. {-684986400 10800 1 EEST}.. {-670474800 7200 0 EET}.. {-654141600 10800 1 EEST}.. {-639025200 7200 0 EET}.. {-622087200 10800 1 EEST}.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.8801202136140915
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQap6cEBx/yQavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yzx
                                                    MD5:FE10770868A75F4F8D76C5E23D99AA81
                                                    SHA1:30AC768BA47AF7A53831F5142B58ECEC41933621
                                                    SHA-256:97EB33915ED7C9C34144F8F42357FAB2262B3CD45287F3CFFD26C33D65F7651E
                                                    SHA-512:1D82DF45AB0CCDFBFAD0431C668794996E01776800F34DD4131C5287D37291657A749D497AA5B0AB81CAFF3190896633FBFF456BFFEB7E93A3420AA841E54842
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Jersey) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2512
                                                    Entropy (8bit):3.941165221943348
                                                    Encrypted:false
                                                    SSDEEP:48:coNlj+X2uxhuHJkw0QqXknzaVV04v3TfdGY3kNmneVuNlh000sGpdh:coN9+1EpkwCXkSV3A8qc0
                                                    MD5:104CCB93300F40BAF8F4D7CC882EFC05
                                                    SHA1:EA83F3C3791BD6F083844939DC405B248E738FE3
                                                    SHA-256:2387D26DF5429DF9867F42F7D4F872DC146643B4B3CC57DA7298C18561DE8BFE
                                                    SHA-512:12724C5BBEE0835626A98B66BF55C3DF1311F07018C70D76FC5C50E7E7BA5C4A9F064D9EDC376CC3B06C4FFFECA3FAF5B66948615A03DFECA7C361E326D950EA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kaliningrad) {.. {-9223372036854775808 4920 0 LMT}.. {-2422056120 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780368400 7200 0 EET}.. {-778730400 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-749095200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7453
                                                    Entropy (8bit):3.762620506765216
                                                    Encrypted:false
                                                    SSDEEP:96:j3C1LyEpkvIpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:j3C9VWdivBeRF+W35Syrwl9h5j
                                                    MD5:1F0C92A6E5C6BAD82AD7E35814ACC388
                                                    SHA1:F29C94DF4EE211481051186BBE5CD77EEDC6C33F
                                                    SHA-256:08B137B7B933393F8F4574615A370013288E5297937B5C59D4179744273FAB26
                                                    SHA-512:88E8B89439022D219D752340E28C21E461D8E288DA135DA4765C87037B610515E6D9E1B716707025B5BAE652FA2F2A89577949C8A923E5C8667AA6CB5C1BAD7A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kiev) {.. {-9223372036854775808 7324 0 LMT}.. {-2840148124 7324 0 KMT}.. {-1441159324 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-892522800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-825382800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {646786800 10800 1 EEST}.. {686102400 7200 0 EET}.. {701820000 10800 1 EEST}.. {7175
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2029
                                                    Entropy (8bit):3.668326642402654
                                                    Encrypted:false
                                                    SSDEEP:48:FFvCAs6kKR6aQmF1cSNWrI+AjXgV/Ap40FjDM:FhCAs6kC6aZF1cSN4I+AjXgV/ApDFjDM
                                                    MD5:57BB199152815B12FE4491C92FE25186
                                                    SHA1:7BC5ECDE9EFADE812AF40CB92CCE5323FB57C78D
                                                    SHA-256:60884D4B8B17A9AB8FB5697DA95F62E570755348109C661D783D56CD047BBE9E
                                                    SHA-512:2043FDBA860E8F6578F7E26A80C7787B82C7D15188327923EC36D153FDF9BEEAE063012ACE4309B76DB9DBA2DFFB7404DE370BA85023CCE93159FCAD3B9B92B5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kirov) {.. {-9223372036854775808 11928 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {78044
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9878
                                                    Entropy (8bit):3.8275310275285723
                                                    Encrypted:false
                                                    SSDEEP:192:j76abXsyZLEjx82YbtIaFF1w0us4qE3+sSGjT:j77bXsyZLEjx82atysLE3+sSGjT
                                                    MD5:0DA331C2A815739E6758797BD24554EA
                                                    SHA1:3829C441E908BEFDC4ED6AB65FD4ACD0C97D5E1B
                                                    SHA-256:9FAC9812411F88014779D34722F3E0D2750E45BF21595DF1AE14CB9CCFD3F33F
                                                    SHA-512:FEBBA05F64AC1F3066AF6351493DD89768154FD171D447503DAEDB90D16858BEDBCE4A74E24AC0C37B5FF191692AF44AADDE4A92E752F88C48DA646352AD9A0B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Lisbon) {.. {-9223372036854775808 -2205 0 LMT}.. {-2713908195 -2205 0 LMT}.. {-1830384000 0 0 WET}.. {-1689555600 3600 1 WEST}.. {-1677801600 0 0 WET}.. {-1667437200 3600 1 WEST}.. {-1647738000 0 0 WET}.. {-1635814800 3600 1 WEST}.. {-1616202000 0 0 WET}.. {-1604365200 3600 1 WEST}.. {-1584666000 0 0 WET}.. {-1572742800 3600 1 WEST}.. {-1553043600 0 0 WET}.. {-1541206800 3600 1 WEST}.. {-1521507600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1426813200 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1221440400 3600 1 WEST}.. {-1206925200 0 0 WET}.. {-1191200400 3600 1 WEST}.. {-1175475600 0 0 WET}.. {-1127696400 3600 1 WEST}.. {-1111971600 0 0 WET}.. {-1096851
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.948438246006353
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQavPSJ5Qahs0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNl
                                                    MD5:56C6C95484FEAF9BAF755683E7417B58
                                                    SHA1:A43176BEBC5B4D7144A7E1109E0AAEFD95C21EC6
                                                    SHA-256:713A842197516D618F2D86977262542A1CA334D7DF6026539FA2F2980DBF4CD3
                                                    SHA-512:566B6DF2D76A8A4D3405C4785C7A471A23D65CD8838831BD0DEDF5BF194E8A3B304CA9920CB4A8EC9D6CD60EAA9BE0335E38D9547A4D23C7E4E5E5A39A09DDAC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Ljubljana) $TZData(:Europe/Belgrade)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10211
                                                    Entropy (8bit):3.826887992237191
                                                    Encrypted:false
                                                    SSDEEP:192:GNoCvTZtcf80KYiK3BG0Myj9TYQOeMAwbccM0Fp:GNNTZtcf15iOBG08eNwbccM0Fp
                                                    MD5:0625C99E16D3C956DED1C0C0F867DEC3
                                                    SHA1:6ACDF0DB619B63E21EC89046B9320A85FBD3397A
                                                    SHA-256:D04C4E25DF4DE1C1CFE1EF84B3B6DD746CF08A271AB0958F22C7D580A3ED10E6
                                                    SHA-512:07AC42F0635DF01CC0AFD13F9668B143D4943BA0E4C377D254B5AF034D9DDBAB77BA813187E9AB73D2EEAD86EBAA26DC15599FD74FC82EEF287F5A6AB9C01635
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/London) {.. {-9223372036854775808 -75 0 LMT}.. {-3852662325 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9139
                                                    Entropy (8bit):3.8497931755359303
                                                    Encrypted:false
                                                    SSDEEP:96:TkR06ZldaKsc1+FpbdKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiT1:wxRscASs41sFpM5vwA6Efv03TBZLl
                                                    MD5:789594ED1BB0EDA605DFB567C1E7FE9E
                                                    SHA1:66C7116CCBED0917A429BB277CF4E0B3361A5B41
                                                    SHA-256:380E49D38F6ABE946A90A9343A277ED28492EB800747D6D14F4639FD3EA80EDE
                                                    SHA-512:62CC68E72E79B7A377EAFE92B64D829CD5B9651FCA6782DEF4886C91BB9DF5FCFCD0CF8C5C7628F49E8C523A4AF917DA2745ABA56107683CA014C3E0254E780E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Luxembourg) {.. {-9223372036854775808 1476 0 LMT}.. {-2069713476 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1662343200 7200 1 CEST}.. {-1650157200 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1612659600 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585519200 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552258800 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520550000 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490572800 0 0 WET}.. {-1473642000 3600 1 WEST}.. {-1459119600 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1411866000 3600 1 WEST}.. {-1396224000 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269813600 0 0 WET}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8517
                                                    Entropy (8bit):3.8326167134909177
                                                    Encrypted:false
                                                    SSDEEP:96:k5m01LdXKc0TJp+bwS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOn:+DaNVLSs41sFpM5vwA6Efv03TBZLl
                                                    MD5:63263380F57B756A1DFA3796E4188CD3
                                                    SHA1:8EEE707AC4FEA1C098C81AC2D289A46239121A5E
                                                    SHA-256:5337C9843C56DEEC6B91C4468C76EC1C896E80421B72B583B69DE5579063E09A
                                                    SHA-512:ACA4830020715C471741E27EB2292ACF002D2CD7EDCD1061978B64967EB447F61AA095F960D8A75A01B9B87558D83FF409F30BDACA83E063024F1E2381FA64C4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Madrid) {.. {-9223372036854775808 -884 0 LMT}.. {-2177452800 0 0 WET}.. {-1631926800 3600 1 WEST}.. {-1616889600 0 0 WET}.. {-1601168400 3600 1 WEST}.. {-1585353600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269820800 0 0 WET}.. {-1026954000 3600 1 WEST}.. {-1017619200 0 0 WET}.. {-1001898000 3600 1 WEST}.. {-999482400 7200 1 WEMT}.. {-986090400 3600 1 WEST}.. {-954115200 0 0 WET}.. {-940208400 3600 0 CET}.. {-873079200 7200 1 CEST}.. {-862621200 3600 0 CET}.. {-842839200 7200 1 CEST}.. {-828320400 3600 0 CET}.. {-811389600 7200 1 CEST}.. {-796870800 3600 0 CET}.. {-779940000 7200 1 CEST}.. {-765421200 3600 0 CET}.. {-74849
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8724
                                                    Entropy (8bit):3.816380386871747
                                                    Encrypted:false
                                                    SSDEEP:96:KAGvi2GmkwwnpH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZN:KLsww141sFpM5vwA6Efv03TBZLl
                                                    MD5:9B09D6EED8F23BAFFB62929C0115E852
                                                    SHA1:4AEF15333C73C2836C09D818FD0E20440D7C4780
                                                    SHA-256:C5C240BAAECE8235D1FBDD251C1A67CB2D2FC8195DD5BBE37FF9CFF0445FCDA2
                                                    SHA-512:43AA3492BD335A290C6EFEE275B47EA18E544199E37A9BBAE2E350D42BDFF42F0E9ED461A4BB1824CA33F84A90D4060906844A3E22DA49C9821E4CB460832D6E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Malta) {.. {-9223372036854775808 3484 0 LMT}.. {-2403478684 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812588400 7200 1 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 3600 0 CET}.. {-81997200 7200 1 CEST}.. {-71715600 3600 0 CET}.. {-50547600 7200 1
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.959733196757503
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV1AYKjG5XHAIgoq2AYKjo0ARL/yQausWILMFJ8QaC:SlSWB9vsM3ymrAdjGJHAIgorAdjo0ANn
                                                    MD5:C1844961691214F6E6DF6487788A7758
                                                    SHA1:6D08E9FB7B8602A80622148BFACD9676F45F0E2B
                                                    SHA-256:6136C3CFA4A767E7C9DDA23A283AD98B72E9868F192E6A8E3BFE6396F6989BD1
                                                    SHA-512:B2D1EA51AC5B34792AC02820A9D60FD41F3B91AB6505896476FCB0DC339B8DC1DE9E2C89A7627F69E16247661AE8040D789FFD2F8F1CD59F243B57C4845B450F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Helsinki)]} {.. LoadTimeZoneFile Europe/Helsinki..}..set TZData(:Europe/Mariehamn) $TZData(:Europe/Helsinki)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2177
                                                    Entropy (8bit):3.9354590900153172
                                                    Encrypted:false
                                                    SSDEEP:48:K8cVnR7xhuHJkminzaVV04v3TfdGY3kNmneVuNlh000sGpde:5mnRtEpkmiSV3A8qcN
                                                    MD5:9C10EAE9FA0DE192C5FD4F76E12606F0
                                                    SHA1:AFD5650410EC3E6ED564A8B2ABF91709D090B4AD
                                                    SHA-256:8C95EA696EA578DEF726502AC181AF475A676030878F56B4E2D667757BBD1C49
                                                    SHA-512:3B9ED6B68858485B9A46A0863B7D9D3C1E4C5BBA269457F24A9A12C274F0F9B35E63D8C25EB53E7200DB57DD35ACCB7FD7D8AB005FEE2C4D7FC6E72E8CF57194
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Minsk) {.. {-9223372036854775808 6616 0 LMT}.. {-2840147416 6600 0 MMT}.. {-1441158600 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-899780400 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-804646800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {670374000 7200 0 EEMMTT}.. {670377600 10800 1 EEST}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9186
                                                    Entropy (8bit):3.856050322706834
                                                    Encrypted:false
                                                    SSDEEP:96:2d4STO1C+4qoM9JfKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcot:wvp+hSs41sFpM5vwA6Efv03TBZLl
                                                    MD5:859DF194457CED25EA3EC247CDEA5025
                                                    SHA1:970579F53446EBE50438CC3582D88094C7D7DEEB
                                                    SHA-256:654B92E8B9E8FBDC967D094B48110908F458454D7057F680AC745B9C8D48FCC1
                                                    SHA-512:3E589FC8CA5E0B0F7F6F17A6983813460AB7E07B9B631D8380836F00A8288FF80650D4139B2A6DEDFF245DE571C7726E087DFF3E6F5F9E7E9C9DFE72B839DC7A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Monaco) {.. {-9223372036854775808 1772 0 LMT}.. {-2448318572 561 0 PMT}.. {-1854403761 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1470618000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1253494800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2430
                                                    Entropy (8bit):3.942836780611272
                                                    Encrypted:false
                                                    SSDEEP:48:7fnjazk7e+LxhuHJkvVineTeCTU50x0Y7:7fnjazk7eoEpkvVieTeCTUax0Y7
                                                    MD5:4547D47E9364ACAFB2A4BEE52D04BFBB
                                                    SHA1:1E7F964692F81D49AEAF581FE70AD22D4E36226B
                                                    SHA-256:31F9C3C2F17B3EE4FA6D9EE6A86BF407AC0377DE4D666C65E86CE5AC591F829F
                                                    SHA-512:7F1D7C80A1BF611D5440EEF9085DA6CDED86B5EF4C2737C105640030E5AA998A0951182E72DC224190A25DA8846CDE856A78EBAA8876AA0B18B1CBCADBB060FF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Moscow) {.. {-9223372036854775808 9017 0 LMT}.. {-2840149817 9017 0 MMT}.. {-1688265017 9079 0 MMT}.. {-1656819079 12679 1 MST}.. {-1641353479 9079 0 MMT}.. {-1627965079 16279 1 MDST}.. {-1618716679 12679 1 MST}.. {-1596429079 16279 1 MDST}.. {-1593820800 14400 0 MSD}.. {-1589860800 10800 0 MSK}.. {-1542427200 14400 1 MSD}.. {-1539493200 18000 1 +05}.. {-1525323600 14400 1 MSD}.. {-1491188400 7200 0 EET}.. {-1247536800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.7873368289068905
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85GKLlXHAIgNwMGKLZRRL/yQatHefeWFKYGKL8n:SlSWB9vsM3yZdL1HAIgGMdLZRN/y3HeA
                                                    MD5:BE82205480617CF07F76BA0DF06C95BC
                                                    SHA1:46D2D8D9FE4FB570C2A09BC809B02C8960F9601F
                                                    SHA-256:FC93B7516933EDFDC211AC0822EE88BF7ACAD1C58A0643B15294F82EB0F14414
                                                    SHA-512:F490A70053A6011D80FB0A4E96D2871BFEEB168690E21C4EC31F2F5C0E24A67C706528C81322A1D48E71242F0FFA277550192925FDE5B1F34BFCB308290E11FC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Nicosia)]} {.. LoadTimeZoneFile Asia/Nicosia..}..set TZData(:Europe/Nicosia) $TZData(:Asia/Nicosia)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7922
                                                    Entropy (8bit):3.818430983275607
                                                    Encrypted:false
                                                    SSDEEP:96:MC+4twRQqvSO774elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhn:MXRQqvSOv41sFpM5vwA6Efv03TBZLl
                                                    MD5:9923D3F3C50D2BD96BD36558FBCD8E92
                                                    SHA1:56584B8B9CB27B0ADCAD490C029EE58308C4D7C5
                                                    SHA-256:5A28B5CEC79B57D4856E3F05615245E6F74DF6388B48BF3F605B792CA3BD972D
                                                    SHA-512:1FA928EA5F468F2B4AA40B6B73CE6E42267832413B333C399431FE08C6CB4FD4BDD7E3DB15682C76E5EDEB5849224F1EE5B9667E68A8C5C89AF09B075E4F7755
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Oslo) {.. {-9223372036854775808 2580 0 LMT}.. {-2366757780 3600 0 CET}.. {-1691884800 7200 1 CEST}.. {-1680573600 3600 0 CET}.. {-927511200 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 0 CEST}.. {-765327600 3600 0 CET}.. {-340844400 7200 1 CEST}.. {-324514800 3600 0 CET}.. {-308790000 7200 1 CEST}.. {-293065200 3600 0 CET}.. {-277340400 7200 1 CEST}.. {-261615600 3600 0 CET}.. {-245890800 7200 1 CEST}.. {-230166000 3600 0 CET}.. {-214441200 7200 1 CEST}.. {-198716400 3600 0 CET}.. {-182991600 7200 1 CEST}.. {-166662000 3600 0 CET}.. {-147913200 7200 1 CEST}.. {-135212400 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9152
                                                    Entropy (8bit):3.8506895725632746
                                                    Encrypted:false
                                                    SSDEEP:96:fySTO1C+4qoMYOKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdi:fdp+3Ss41sFpM5vwA6Efv03TBZLl
                                                    MD5:9CAF8C5C5AF630E7F782C0480DD786E7
                                                    SHA1:9FBEF9EEDD8BAFB48B17E3AC388CFEF8DCD10CB0
                                                    SHA-256:AE61491C4A587F56426A9F2118E31060276F2B0231E750C461781577551CA196
                                                    SHA-512:F809744BB597184A2815758A27B6A07C515C65DB96CFFB3625FD059DEBBF05EE903E999483B3459C7C8D3991824746F8530CD1378F8A63B1F54F60CFACE9F89B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Paris) {.. {-9223372036854775808 561 0 LMT}.. {-2486592561 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1470618000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1253494800 3
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.910162937111088
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQazKIGl1/yQ0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNK
                                                    MD5:52C36955D6BD1D9FE9CB64822D04B6DB
                                                    SHA1:D5FF82EC486409E6FB314AD5ACE608577C9632CF
                                                    SHA-256:B87630FF459DE07EB16CD0C2452660772E3FFC4EEB8419EA77A013B6F63A5900
                                                    SHA-512:ABA49D3F05A41A4982600E4DA5C225D8994251F447401EE6FE8478E008BCD5D41C057034185B5CFF805634D571F3CC98EFE98093ABC8E6271351E11A4DA1E7AD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Podgorica) $TZData(:Europe/Belgrade)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8038
                                                    Entropy (8bit):3.8240363895915914
                                                    Encrypted:false
                                                    SSDEEP:96:Kr9+neXAS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlh:KnASs41sFpM5vwA6Efv03TBZLl
                                                    MD5:828134FA1263FEFA2B06A8B2F075F564
                                                    SHA1:4B332DE6E0855F8B9517F7098A3FB439671FC349
                                                    SHA-256:5D3AFED5C1B07C6C6635D6BDEB28A0FB4D11A61F25F26C91227B2254BE5F4AA0
                                                    SHA-512:9AB1462CDBD7F13F0CECDCCC2D91A85D8C0576B71508F935D26638C25ED023CF8FF4BA4FFDA402B308E6142B135D1B9D88700A519DBE2381E8E945329A5354F7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Prague) {.. {-9223372036854775808 3464 0 LMT}.. {-3786829064 3464 0 PMT}.. {-2469401864 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-777862800 7200 0 CEST}.. {-765327600 3600 0 CET}.. {-746578800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-728517600 0 1 GMT}.. {-721260000 0 0 CET}.. {-716425200 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654217200 7200 1 CEST}.. {-639010800 3600 0 CET}.. {283993200 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7658
                                                    Entropy (8bit):3.7750218768791806
                                                    Encrypted:false
                                                    SSDEEP:96:eq+cEpkjXkSV385aNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:ePWjUS7ivBeRF+W35Syrwl9h5j
                                                    MD5:0D3C919F60081388524BD5DB22E6904B
                                                    SHA1:6691EAB901C8B57D2F2693120A45A67799D05FCB
                                                    SHA-256:8B64A42BAFD90F9255CACFDBAC603D638DD7C18DC27249F9C9B515E1DA634424
                                                    SHA-512:62A2820B8C1C5468AC1F1BB626F9AAAD0BA1DEC5B73740F00FE4DB8CFA3F2BCF9947968E693824FC8770BA20AB962F93F7E5E345AE8A85F99CDB18E2B510308E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Riga) {.. {-9223372036854775808 5794 0 LMT}.. {-2840146594 5794 0 RMT}.. {-1632008194 9394 1 LST}.. {-1618702594 5794 0 RMT}.. {-1601681794 9394 1 LST}.. {-1597275394 5794 0 RMT}.. {-1377308194 7200 0 EET}.. {-928029600 10800 0 MSK}.. {-899521200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-795834000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {6
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8813
                                                    Entropy (8bit):3.8168470239811736
                                                    Encrypted:false
                                                    SSDEEP:96:hhGvC2GmkNXEq74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhn:hUsF41sFpM5vwA6Efv03TBZLl
                                                    MD5:C4F49446D3696301EDB339691DCB2FDB
                                                    SHA1:537963A77B9BE9BE6B997A812A6E6DD120F6F247
                                                    SHA-256:DCD2D9144507311E573568598E1FFD0E0574FB677AA0DAFC5641D80A19EB6E58
                                                    SHA-512:1F0A9A549FA0995C51E90AC392671E3F09744B268F1EE6A27CA7E3C41C2B02A4BA0F98369BE40BA482FBA1FED8F1EE712F0B3217AD86164D1AD498E369C24D76
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Rome) {.. {-9223372036854775808 2996 0 LMT}.. {-3252098996 2996 0 RMT}.. {-2403565200 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-830307600 7200 0 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-807152400 7200 0 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 36
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2118
                                                    Entropy (8bit):3.664269700453612
                                                    Encrypted:false
                                                    SSDEEP:48:7PvCAs6kKR6aQmF1cSNWrI+AjQnTRYZ/YF0LUdt/LkajuZbIJltiabs2Tb:7HCAs6kC6aZF1cSN4I+AjQTRYZ/YF0Lw
                                                    MD5:965D987F6576F66A08871697144D4CDB
                                                    SHA1:AF7226DF81C2B3C3A5832F59FC708A6BCBF389CA
                                                    SHA-256:8F395352AA05D35E7D13380E73659A0D5B56FFC17E3F4E40E4F678A902F0E49B
                                                    SHA-512:B82E0CFA5EDA0FCDF03609AE439255F8937A7E9EFA0AFE15EA8877316782AFC74514BCD2B4F06F1B5F0F3C5A64A933D73CB50D5AED2BB1491BD6CACBB77B10E8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Samara) {.. {-9223372036854775808 12020 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-1102305600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 10800 0 +03}.. {687916800 14400 0 +04}.. {701820000 18000 1 +05}.. {717544800 14400 0 +04}.. {733
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.955758257767983
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQawELDX7x/yQaxE:SlSWB9vsM3ymx5PHAIgoxvN/yt/yrE
                                                    MD5:D253DA6880630A31D39DB0CFA4933ABD
                                                    SHA1:E5798DAAE574729685FE489F296B964BC1CCF2E4
                                                    SHA-256:B6856A0E38C2404F7D5FA1821559503F8AE70923A562F0D993124D131515F395
                                                    SHA-512:CFB6005F3E8D1C585AF36EB7A8C9F49760EF6F446C97E7804EB61EFD0804424C4FB6AE81B71C5A867274EF89A17DAC0D2A0FF882A0F6AEA1D5FFD51593726C5F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/San_Marino) $TZData(:Europe/Rome)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.937834327554967
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawEX3GEaQa5:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNZ
                                                    MD5:F7C7DAE9C5D371EF9EE1F490246ED3CC
                                                    SHA1:40C388FE2A55078C8E0524A4385B3F8846960E24
                                                    SHA-256:BC00D953C2F3E55E40EDA13838AB66B9E9D0BDAD620E4EB917637761ABB06FB1
                                                    SHA-512:EB22C59F4D58D96797A718FC59B010795F587626E456D44A3E6398E0FBF4ECD97BCDC151BC1359151798B5AF2964FE5708233F8ECD0D344C3E27629F2645687F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Sarajevo) $TZData(:Europe/Belgrade)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2061
                                                    Entropy (8bit):3.6638125261109824
                                                    Encrypted:false
                                                    SSDEEP:48:yFvCAs6kKR6aQmF1cSNWJjXgV/Ap40FjDQ:yhCAs6kC6aZF1cSNcjXgV/ApDFjDQ
                                                    MD5:CC4D7C478790588D232568CAB12D8E67
                                                    SHA1:07A7CFCFFFF91D124EDFC99F5053BAFC79FBB12B
                                                    SHA-256:AB90363DEE5077C39EC55FE8E519593FF08223E5A8E593F6CCE01FB5B8B35BAE
                                                    SHA-512:23944D20624C942CFDE58F1019160D64401BD0AFB8C3EC49F904038482FAA6741812548C860A2DAE050B8D17A7E08ED9C6EBE7FF19393CFA46D78B1D21B1CACA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Saratov) {.. {-9223372036854775808 11058 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 +04}.. {575420400 14400 1 +04}.. {591145200 10800 0 +03}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {780
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2389
                                                    Entropy (8bit):3.9502615086649637
                                                    Encrypted:false
                                                    SSDEEP:48:wM2wE0xhuHJkN+2kCnbdSisa0ewEKGfUslIYtq8X:UwEAEpkuCgaNl7
                                                    MD5:1953A171614196D2FD2CA12FFE6F70D4
                                                    SHA1:20958D5888F94C1FF2C90DDB97915435095AA67C
                                                    SHA-256:4186A873A6218FF746957A0AAED1D61FC28FF5ED6D44BF38F36B5120A21C06C6
                                                    SHA-512:35A628EBB2C2068A7DE07175494E195D75ADE30CB4B8BFE7EE7EA0A3B30F68BF6E0F21590A0A2DA0E02B944473545A5887BF95692A9C9E9DCD08CB8D542D142B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Simferopol) {.. {-9223372036854775808 8184 0 LMT}.. {-2840148984 8160 0 SMT}.. {-1441160160 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-888894000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-811645200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {646786800 7200 0 EET}.. {694216800 7200 0 EET}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.953089768975736
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawOgpr8Qahr:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNO
                                                    MD5:0BF8ADBB63F5D6187C75FF1B0BAC761E
                                                    SHA1:7DE15E767D34812F784CE6E85438A592E2CBA418
                                                    SHA-256:52F20858433261B15797B64F0A09CEE95D552EF93B5DAA7C141BFAB6D718C345
                                                    SHA-512:27D395635427C8FA1A4E0063A32F482701D2CC7C7724B4A06E661D4A419D23E219672888D37367FE5E70B6872914EB9EE034AE359DCB6A4C4CE05CA34C3589A9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Skopje) $TZData(:Europe/Belgrade)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7654
                                                    Entropy (8bit):3.727428614069594
                                                    Encrypted:false
                                                    SSDEEP:96:8lmG4+K7Gjz5CXNUatpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:8lmGWwkdUasivBeRF+W35Syrwl9h5j
                                                    MD5:91357DFC23ADB0CE80C463E4B6D896BE
                                                    SHA1:273F51BE4C67A9AC1182F86AC060E963684151D5
                                                    SHA-256:6415F279CB143EA598CF8272263AC5B502827B10CEEB242B39E6EFCC23A2EE12
                                                    SHA-512:8EA7E2D4C2239879A4D6CCE302C38A6D2A9093A2CADEF4F4294E60D373AB9A2C468BA6E3D54DEC7F73D954CE5226EF2B022F8BDEF29B3B4AAB3838B05C72EA29
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Sofia) {.. {-9223372036854775808 5596 0 LMT}.. {-2840146396 7016 0 IMT}.. {-2369527016 7200 0 EET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-781048800 7200 0 EET}.. {291762000 10800 0 EEST}.. {307576800 7200 0 EET}.. {323816400 10800 1 EEST}.. {339026400 7200 0 EET}.. {355266000 10800 1 EEST}.. {370393200 7200 0 EET}.. {386715600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465350400 7200 0 EET}.. {481075200 10800 1 EEST}.. {496800000 7200 0 EET}.. {512524800 10800 1 EEST}.. {528249600 7200 0 EET}.. {543974400 10800 1 EEST}.. {559699200 7200 0 EET}.. {575424000 10800 1 EEST}.. {591148800 7200 0 EET}.. {606873600 10800 1 EEST}.. {62259
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7308
                                                    Entropy (8bit):3.817544865319589
                                                    Encrypted:false
                                                    SSDEEP:96:Skhe74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:Sky41sFpM5vwA6Efv03TBZLl
                                                    MD5:A17318A055D4BB049FB4621CDC2AFED3
                                                    SHA1:61BA62F253BD4D8B34C2CFCDB96AB458D413E214
                                                    SHA-256:12447CE016745FC14584CB5F753E918C23ECA5D028CA50042E0714CF3783608A
                                                    SHA-512:90CF037C1DBF55C5D70164D2B2CBDC9580F7FE496279416F578E42A444AD6CEBFF29336921619AAFC4E872B886A9AC5EF45006D2B9585D17AA3864F773C89610
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Stockholm) {.. {-9223372036854775808 4332 0 LMT}.. {-2871681132 3614 0 SET}.. {-2208992414 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7549
                                                    Entropy (8bit):3.76585669030767
                                                    Encrypted:false
                                                    SSDEEP:96:dUusEpkjXkSV3AMaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:O0WjUSWivBeRF+W35Syrwl9h5j
                                                    MD5:54EF0224F5E28FA78F212EC97D4AE561
                                                    SHA1:FA7C9A951ED943F1E1E609D2253582016BC26B57
                                                    SHA-256:6F3594CCDA78B02B2EE14C8FAE29E668E47193AF2DFCF5AF1ECD210F13BCE9CE
                                                    SHA-512:2D1CA2BB1945AE5E3F56AF8FA7F950CE7169F215C783E683634581C5EC01B54159E47A0E9551897077BBEAB06158906029A4E4B0051A263D9E5D903EA9DA1692
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tallinn) {.. {-9223372036854775808 5940 0 LMT}.. {-2840146740 5940 0 TMT}.. {-1638322740 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1593824400 5940 0 TMT}.. {-1535938740 7200 0 EET}.. {-927943200 10800 0 MSK}.. {-892954800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-797648400 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 10800 1 EEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7675
                                                    Entropy (8bit):3.809498345470167
                                                    Encrypted:false
                                                    SSDEEP:96:n05NWKIHBJ9AE4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt:0iKqxAE41sFpM5vwA6Efv03TBZLl
                                                    MD5:1983B88075A92942209BB2B80E565F4E
                                                    SHA1:12A0401026C5C036144FD1D544173AAB39969F61
                                                    SHA-256:C62686BF598138FEFB72E8CC6632BA75A5FE147F2A30124EE3583BE1F732E38D
                                                    SHA-512:E95C38FA0A2B526C00B9DCF5CDF53059DECF64B085AA18BE000968DA626561944415D053CF7A5C32BC672085538920CFD67A3A3B627CFD5B1A4C9CEC49AA3F96
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tirane) {.. {-9223372036854775808 4760 0 LMT}.. {-1767230360 3600 0 CET}.. {-932346000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-843519600 3600 0 CET}.. {136854000 7200 1 CEST}.. {149896800 3600 0 CET}.. {168130800 7200 1 CEST}.. {181432800 3600 0 CET}.. {199839600 7200 1 CEST}.. {213141600 3600 0 CET}.. {231894000 7200 1 CEST}.. {244591200 3600 0 CET}.. {263257200 7200 1 CEST}.. {276040800 3600 0 CET}.. {294706800 7200 1 CEST}.. {307490400 3600 0 CET}.. {326156400 7200 1 CEST}.. {339458400 3600 0 CET}.. {357087600 7200 1 CEST}.. {370389600 3600 0 CET}.. {389142000 7200 1 CEST}.. {402444000 3600 0 CET}.. {419468400 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {457480800 7200 0 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 C
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.906212162381389
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV+NM/LWXHAIgoq9NM/HARL/yQa3MPgJM1p8QagNMj:SlSWB9vsM3ymI6CHAIgoI6HAN/ytM4MO
                                                    MD5:E0C99DB7673EEE440BA1848046455BA1
                                                    SHA1:1BCCC1BE46306DEF8A9CA249DE8FA11FC57CC04D
                                                    SHA-256:FDD53FDB5F754BBBA8FF98F0B1555FE0BAEB7852843220A7CF93A190B641A9AD
                                                    SHA-512:CD56B540AE9084DEAA9D0A1DBBAF89733C465424C22CE74696B9AE90FD4FEFAB265CF23C5B13A7F04597D75FD0147BD593E0552B56D87372170CB4CA1BFC8259
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Chisinau)]} {.. LoadTimeZoneFile Europe/Chisinau..}..set TZData(:Europe/Tiraspol) $TZData(:Europe/Chisinau)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2119
                                                    Entropy (8bit):3.680951255407528
                                                    Encrypted:false
                                                    SSDEEP:48:kFvCAs6kKR6aQmF1cSNWrI+AjQndgV/Ap40FjDOP:khCAs6kC6aZF1cSN4I+AjQdgV/ApDFj4
                                                    MD5:83C86E437B5FBA1DC9CC5235396AC381
                                                    SHA1:5493A59C3A5A1B55ACD493E67F9E29D2A415A8DB
                                                    SHA-256:9FA9D09509B4F8F5A9C8E422DBA02605070C3EBDAEB7C1DF8527C8EEF5E3632D
                                                    SHA-512:86222489C65C87646939DECF91C2EC336EB46F64B644526A3FA8A4854B9D11819F6FD253107AB8A3DE911E254C88092D25137442164A6E437CDAF258A7CBB66C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Ulyanovsk) {.. {-9223372036854775808 11616 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 7200 0 +02}.. {695779200 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7541
                                                    Entropy (8bit):3.769633712898356
                                                    Encrypted:false
                                                    SSDEEP:96:dpSlo5Epkn/paNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:dpUWnmivBeRF+W35Syrwl9h5j
                                                    MD5:4AD237C8A1D94E2CB70377C49867AC76
                                                    SHA1:121303331223925BFB708918BAED3CD2F0E33C60
                                                    SHA-256:747F543B7A875214F8EEBFDAE3182D91B1E93CEB57B58D2B7657672F949B13A9
                                                    SHA-512:FD2FB930CB81BD3427AEF374ACAC2A120F6AD447625824AD6D08E68868A3B389FDDE7E2A82FCFF3490488601ADE646AC989AA7CEF1FE77A700E232D7561B6E74
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Uzhgorod) {.. {-9223372036854775808 5352 0 LMT}.. {-2500939752 3600 0 CET}.. {-946774800 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796870800 7200 1 CEST}.. {-794714400 3600 0 CET}.. {-773456400 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {646786800 3600 0 CET}.. {67
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.953146873643623
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQa1NEHp8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/yvNEJ8G
                                                    MD5:A0BAEC8B6AF1589ECBE52667DDB2A153
                                                    SHA1:37093F4F885CBFA90A1F136D082E8B7546244ACC
                                                    SHA-256:06B235BF047FC2303102BC3DC609A5754A6103321D28440B74EEC1C9E3D24642
                                                    SHA-512:DBEC235AFB413FA8D116FA1AFFE73706762E7458038B6D68E0BFD71C339510D766825BA97055A06DEE14D5880EAE6CD035BFE0C935C0DF44B0107A356D293A78
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Vaduz) $TZData(:Europe/Zurich)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.914414313741477
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQa1xLM1p8QaxE:SlSWB9vsM3ymx5PHAIgoxvN/yvN+8rE
                                                    MD5:2404265F8DE1F7D7745893DD4752BA1C
                                                    SHA1:C07E7F72DBDC7F5F746385523EA733C2714F5DA2
                                                    SHA-256:C203E94465BD1D91018FC7670437226EF9A4BB41D59DDE49095363865CA33D00
                                                    SHA-512:5C20834542B74041AAB1DBE35686781B32EEB5814B1A35A942E87D1FC3B6D8F9264CB90433C44A480EA86DDEA65D8C152F41CE3E983C1DE5FA74D6FB5208F701
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/Vatican) $TZData(:Europe/Rome)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7930
                                                    Entropy (8bit):3.8193566380830273
                                                    Encrypted:false
                                                    SSDEEP:96:8F6zq+gH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:8ozE41sFpM5vwA6Efv03TBZLl
                                                    MD5:6A3A8055DD67174E853C7A208BABAC9B
                                                    SHA1:64445543DE9D6C01FA858442976E249E37BE23EF
                                                    SHA-256:A8165313C9B51DAEF130401439CBA60DAA9887FC5EAA61A5AFD4F7BAD1AD934F
                                                    SHA-512:4407B9E8709A8DD05337A10030895AA9876EAF64EF5347952249EE2A541E304331B46D38532FD7CDFF9E633BF8C9884282F0A5ED259EBA1D99DC0914AF1A50C6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vienna) {.. {-9223372036854775808 3921 0 LMT}.. {-2422055121 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1577926800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555801200 3600 0 CET}.. {-938905200 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780188400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {323823600 7200 1 CEST}.. {338940000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CE
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7485
                                                    Entropy (8bit):3.7711709848169592
                                                    Encrypted:false
                                                    SSDEEP:96:FAhEpkwCXkSV3A/PplKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:FfWHUSKivBeRF+W35Syrwl9h5j
                                                    MD5:1AB5FCEACC4E09074BA9F72F0B7747D5
                                                    SHA1:E0134E61EC0ADC60BF6DB4544EA7B7FFA4EC7857
                                                    SHA-256:B762DB4A068DC79FA57691E070D7026086E5A6D2FC273D5C1872E7C8E3711533
                                                    SHA-512:07565071D05CF972DD64F6060599EB68A00BF264172873BA310168AD07CE0CFCF90D0019B775433EC910DA748B89F0C614E7FD4E821993DA53C7E33F194C6A97
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vilnius) {.. {-9223372036854775808 6076 0 LMT}.. {-2840146876 5040 0 WMT}.. {-1672536240 5736 0 KMT}.. {-1585100136 3600 0 CET}.. {-1561251600 7200 0 EET}.. {-1553565600 3600 0 CET}.. {-928198800 10800 0 MSK}.. {-900126000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-802141200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 7200 0 EEMMTT}.. {606873600 10800 1 EEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2123
                                                    Entropy (8bit):3.667144931158014
                                                    Encrypted:false
                                                    SSDEEP:48:menvCAs6kKR6aQmF1cSNWJjXgV/Ap40FjDqR:mevCAs6kC6aZF1cSNcjXgV/ApDFjDqR
                                                    MD5:53E5BA5747B3255BB049F6FF651CEE25
                                                    SHA1:A69E2BFDB89AC8756E1CD2EAA9109ACD924A0850
                                                    SHA-256:22968D40DAC2B669E6D2BC43ED6B16C8A9CA3E1F9DACBF8B246299C3C24CC397
                                                    SHA-512:3269D20DF9C9DDFF8252F33ED563B118771FC71049542DA7C6678E0B5B75FFEA00845FA6F3BC26EDABB4BB7CE449B0B7E00B72473D8D95F126AB3893A9A969B4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Volgograd) {.. {-9223372036854775808 10660 0 LMT}.. {-1577761060 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-256881600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 +04}.. {575420400 14400 1 +04}.. {591145200 10800 0 +03}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8662
                                                    Entropy (8bit):3.8187545871488995
                                                    Encrypted:false
                                                    SSDEEP:96:ELn9M9Nivtctwwoy4qelPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCso:E6Nivtctgq1sFpM5vwA6Efv03TBZLl
                                                    MD5:992C1D268E336AF1FB8200966C111644
                                                    SHA1:C893B82224C8EF282DB2E16A5BBCC3A21C49B6FE
                                                    SHA-256:F9DC10EC2AE2CC810A6C08837059B34BE651900BA4E1CEDB93C209972CCFB5A2
                                                    SHA-512:EC4E0D8684D57FA66144F11D8E8C80E5272D4A7304300FEBE20E236476C1B8B33BBC5E479BF96D9ED12900FE6D41DD1DC0D11CBE02B89E0C4C7A153B4BFBCB1F
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Warsaw) {.. {-9223372036854775808 5040 0 LMT}.. {-2840145840 5040 0 WMT}.. {-1717032240 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618696800 7200 0 EET}.. {-1600473600 10800 1 EEST}.. {-1587168000 7200 0 EET}.. {-931734000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796870800 7200 0 CEST}.. {-796608000 3600 0 CET}.. {-778726800 7200 1 CEST}.. {-762660000 3600 0 CET}.. {-748486800 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-715215600 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-397094400 7200 1 CEST}.. {-386812800 3600 0 CET}.. {-371088000 72
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):4.899266605519742
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQa5rXv1/h8Q0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNB
                                                    MD5:B07D9D3A5B0D11A578F77995A5FBE12B
                                                    SHA1:1C4E186F2D53C0A1E6A82A6D33B172E403A41D6D
                                                    SHA-256:A49B3894EB84F003EB357647D6A40CEAF6213523196CC1EC24EEFD7D9D6D3C3E
                                                    SHA-512:43520AE325980B236C47C866620D1DA200AC0CD794E8EB642D2936D4B0ECEFE2DA0A93C9559D08581B3CCE2BC75251A4D5B967D376B16EB0C042B0ADCE1DCD01
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Zagreb) $TZData(:Europe/Belgrade)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7490
                                                    Entropy (8bit):3.767302554706298
                                                    Encrypted:false
                                                    SSDEEP:96:rnziEpkvV5lpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:rhWd50ivBeRF+W35Syrwl9h5j
                                                    MD5:CC195C2ED7DEE40A4A42C6CCF64E4DB6
                                                    SHA1:34DC86891FBAAAE0FF328D4896566C777CDF1075
                                                    SHA-256:F0045F64F64A2C40088F2960616AB8E0AABB8D6309F489FEE842056FB8412F72
                                                    SHA-512:8F58C8023260B5BBA51EE05811F33A2315A79996C900F04069372114EF3B1AB593CE7155288B8699BF2B2E9B284FE5109827B3FC8644012DB54D039E73F2B8EA
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Zaporozhye) {.. {-9223372036854775808 8440 0 LMT}.. {-2840149240 8400 0 +0220}.. {-1441160400 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-894769200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-826419600 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {654649200 10800 0 MSK}.. {670374000 10800 0 EEST}.. {686091600 7200 0 EET}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7305
                                                    Entropy (8bit):3.8199799674700277
                                                    Encrypted:false
                                                    SSDEEP:96:94hH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:9Y41sFpM5vwA6Efv03TBZLl
                                                    MD5:EBD66FAEA63E1B90122CC1EB21634ECE
                                                    SHA1:C6487BB8AB2A6A72B2170B220F383ADB6B9AC91C
                                                    SHA-256:95AFA61E439CA38551306D8FDB11C2788D935C42768D0407C9E4337F105A3E93
                                                    SHA-512:25A8D0ED9BBE6BF23A1A76CC6D5378CF4D50544AA22DA97DDCD0673D7A5CCFEFFD81B660A1AEFB254B8BBEA55F6EF734BBBD3F0CB903E0721BE107667CA1E328
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Zurich) {.. {-9223372036854775808 2048 0 LMT}.. {-3675198848 1786 0 BMT}.. {-2385246586 3600 0 CET}.. {-904435200 7200 1 CEST}.. {-891129600 3600 0 CET}.. {-872985600 7200 1 CEST}.. {-859680000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):170
                                                    Entropy (8bit):4.8978035005721265
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/wox6QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/wRj
                                                    MD5:68667037110E713DB3F51922DDE929FE
                                                    SHA1:2EB02BE3FD35F105B59847892A78F1AA21754541
                                                    SHA-256:E20D829C605A7C5B2A96B83C3480DF28C964A13381A8BD2C72C2A37295131FA7
                                                    SHA-512:3A8CC2EC9E3053283F996CA2C4B422061D47F1D16CA07985CBA2C838DF322C23CC9DD28033646F22EAE0E401781480B9D3AF82A539444166A4DD9B7BCCAE45FE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):175
                                                    Entropy (8bit):4.90874180513438
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/w4b/h8QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/w4E
                                                    MD5:625520BAAB774520AC54BFB9EDCF9FCA
                                                    SHA1:C72F0FD45F448901C6B2E24243175729591B9A54
                                                    SHA-256:C9334480D0A970254B6BA6FF22E958DC8DD8BF06288229461A551C7C094C3F1D
                                                    SHA-512:1B672218FF9C86168E065A98C3B5F67DAB710D1C2A319E9D6599B397C4B4C00D3721B76C735C8AB04BCB618C1832B07F6CCDAF4266CC0D12A461A3A862D1AEB2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB-Eire) $TZData(:Europe/London)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):153
                                                    Entropy (8bit):4.867609984313873
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wZ8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wZ8RQy
                                                    MD5:A01FE6FC260711F0E11C85DC3DE3550A
                                                    SHA1:988311B71498591425C63669DC3F802F270B2C44
                                                    SHA-256:747C15CDC239855D5380B7A7F47112F2A26C61B0BF300EEB9711E6521550D189
                                                    SHA-512:BE4678DCBAE5DBC72865665413206C1909F28BA54F4943257870EFFBA6525457866DED7A985E89F2689C810B314DE4AA2FA3A0A1826A664727F5F7113AA56595
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):155
                                                    Entropy (8bit):4.917182390229381
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/we7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wI8RQy
                                                    MD5:3327B1BF3118AC6AFC02C31DF5B67CD9
                                                    SHA1:3932577E66801AD31519B0BB56CCE7B9E36221A9
                                                    SHA-256:BE48462CCFBB3AEE19597F082A17C2C5D2FD8BB1C9122245EFAB0A51F8F413B0
                                                    SHA-512:53866FD513B039E8203E51FF3434D5736D3A4C4E0A46874D1C99A17115181AF749F0D079C2E14C5B0538D3DFA52B1645C977CD6599DA3EDA57CC7F84EEAB2D06
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT+0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):155
                                                    Entropy (8bit):4.904279164422928
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/w4Hp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/w4J8RQy
                                                    MD5:0CFFC5655F031D954BD623CC4C74DC9C
                                                    SHA1:CE5E7AD67252F52D7E70719725FF5BE393DD6EF0
                                                    SHA-256:944C86F516141DDC3AEC1AE4A963E9769879C48ED12DADDF4ED63A01313ACD00
                                                    SHA-512:C7352D1394E8B8AC90CD19EE753D5277259BE5512ADDCAED2A2DEF144762CF20BE7A9FA09AAA1829EE401DD195C2AED8C967A7FF46739236E042AF4298EC84A2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT-0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):154
                                                    Entropy (8bit):4.892526720357546
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wPHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wvp8RQy
                                                    MD5:565B41A5DB28F9FE7D220E9BA39062A4
                                                    SHA1:5183689210F07C8A71F880DCE8E5C2CB62CEB17D
                                                    SHA-256:54850A5F488205DB01FBB46E2DA9FFF951C4571029EA64D35932DDEA5346DAAF
                                                    SHA-512:BD6E5141F06B03D62DCF725E9E48D6AA8ECD6E8E47A4015B25DC3F672392065FFFD80D688C6695324DC105EA528025CF447FA77E6D17E15D438E61DC51879CB7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT0) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):159
                                                    Entropy (8bit):4.917976058206477
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wE+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/wE6BURQy
                                                    MD5:443FA76F107ED438F9571A044B848C6A
                                                    SHA1:1CF508429DFC40643B1FAB336A249A3A287D8C7C
                                                    SHA-256:9E7A8DAA26CE36E8F7D7F13460915C063EE98E2A4DB276AD9D15CA5C7C06815F
                                                    SHA-512:6C0C5FF513A742FBDA349AC3A2581D456701B5348A54ECF38E496DAA1EFC74D937982B6F69F1761CC2FC4B88D9A971EFA2B16096E71EAF002EC5CE4130B533DE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Greenwich) $TZData(:Etc/GMT)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):111
                                                    Entropy (8bit):4.90682088010982
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x//LhdNMXGm2OH1V90v:SlSWB9eg/jJDm2OH1VGv
                                                    MD5:79C82A5F8B034E71D0582371E3218DBB
                                                    SHA1:1476CE8EA223095094B6D25D171E6319C96669F4
                                                    SHA-256:8D710699AF319E0DDB83E9F3A32D07AE8082EA2F7EABBD345EFFFFB0F563062E
                                                    SHA-512:ADEE55581D1A158929F09A63B03883ABE9193337DDF225C61AFDBB8A2C7D0BD248ADC4714E0EEFD334826C54C1AFFC8B1E6C2B0D6EF830C3CCA50CC79834F473
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:HST) {.. {-9223372036854775808 -36000 0 HST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.913328649996328
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8Li0vXHAIgN2qfvRL//XF1p4WFKQyvn:SlSWB9vsM3yW2HAIgAOvN///p4wKlvn
                                                    MD5:6A307B229C302B1BAE783C8143809269
                                                    SHA1:EA169AF81AD12380A69FB6B7A12479BA8B82878B
                                                    SHA-256:359C9C02A9FA3DE10BA48FA0AB47D8D7AFF3B47F950CFAF5EB68F842EA52AB21
                                                    SHA-512:505445FD0B3E140384EDC27993923BBF9ACD23A244B0F14D58804BFAA946D0BC4C0D301FBCCB492BAFDA42C8A92F4163FB96F4D75DD7374858D1C66183BEC24B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Hong_Kong)]} {.. LoadTimeZoneFile Asia/Hong_Kong..}..set TZData(:Hongkong) $TZData(:Asia/Hong_Kong)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.888934660651573
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqLGsA/8rtyXHAIgvMGsA/8rJARL/+GAKyx/2RQqGsAW:SlSWB9vsM3yj6SHAIgv1sAN/+XZx+RQK
                                                    MD5:F51C5B80789F65136304CE107E4E60E1
                                                    SHA1:3F4690BCCA45C0ADEC184175DEC53730C326733C
                                                    SHA-256:E4AB3A08ED590D907F9741D4B8FE27E552B19FE0257F14CE2ED5289D5685974C
                                                    SHA-512:9D0BB2D8C9D42C3F7274E0831B4320023069A7DF2069AA5EB6FF1BBBF5781629020BBB70C9ECCC38955FC79A5E2CB3110AB90C21191A6FB421F3195C31FC984C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Atlantic/Reykjavik)]} {.. LoadTimeZoneFile Atlantic/Reykjavik..}..set TZData(:Iceland) $TZData(:Atlantic/Reykjavik)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.807410166086502
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL/liEi2eDcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LzM2eV
                                                    MD5:0F20CBF1F7600D05F85D4D90FDAB2465
                                                    SHA1:2F3C9479C4F4CD7999B19C07359B89A5FB1B9839
                                                    SHA-256:1B1177CE4D59D7CBCAE9B0421EB00AD341ECB299BD15773D4ED077F0F2CE7B38
                                                    SHA-512:657341FC2CCD6A4F7B405ABC8E24C651F6FFEFD68EBD6E2086ADF44834DCBF21D1B9D414436E42C8DCE46FFB88116B98C1D073782E214B3996D49EC00DFF4383
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Antananarivo) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.853088038233057
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9WJx3vFNMXGm2OHi/FvoHscfJ7XH0VQVFV6VVFSTVV:SlSWB9eg/+LxWJxPDm2OHqFvoH9+VQV3
                                                    MD5:06143C3DFD86B3FE4F2A3060C0E05BB6
                                                    SHA1:88E0E30CEE4AB8117860A35AD03B16AF48988789
                                                    SHA-256:11044AD7CB0848CC734D2A67128AA6AC07CB89268399AA0A71A99024DE4B8879
                                                    SHA-512:79195D3D0D475BEA982F40683D4BA14AC33B3FA91311F513DCED955C9297C2B0F12D94CCA930FAE0FB7F95DB34CD4E74B5AF0233E792122646592B7EFF0F3163
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Chagos) {.. {-9223372036854775808 17380 0 LMT}.. {-1988167780 18000 0 +05}.. {820436400 21600 0 +06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):154
                                                    Entropy (8bit):4.957836950238227
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9FBIEW3odNMXGm2OHAWMx5oHvTLyvMVSYovV:SlSWB9eg/+LxpW3SDm2OHAnx5oHvTIMI
                                                    MD5:DA36A8158AF3480E67CD6EF3ABB875E3
                                                    SHA1:9DA259BFB6B39AB0425E67A1E4F1ECAA1321AD72
                                                    SHA-256:CB43DEAFAD0F8BF7DE8567841790A58D358EF2B210BB2022686B3EB7F97B2E5B
                                                    SHA-512:48B20BFD14B0C756CD3AAA9A422837D7D5012612294EB01EBF12A26D0147D85087DED1B95C3E5CAB1485E8BC3B19A69B9DB234D06562AD0482CB7518977256BE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Christmas) {.. {-9223372036854775808 25372 0 LMT}.. {-2364102172 25200 0 +07}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):152
                                                    Entropy (8bit):4.861380366254495
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9dsFNMXGm2OHGXTvxoeoHvmVUXxXW5d6TW7Ay:SlSWB9eg/+Lx2Dm2OHGXCeoHv3BG5UI9
                                                    MD5:4D5285269D6F0A54495B10EEF4994E01
                                                    SHA1:FEE44907B02B660390CFDC560E3981112D5774BB
                                                    SHA-256:71194B896CC00967EBBE3F9F4609F8C5CD73CE56B2529646A7A6AC679BB03400
                                                    SHA-512:068D29EA51465A5232724A0CEF0274FD5DFC16A44720823CEA470125129FF527BF411EDAAFAEBE5F9783334BD93DB92372D0847207E4A42C79A0F6158163F1C8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Cocos) {.. {-9223372036854775808 23260 0 LMT}.. {-2209012060 23400 0 +0630}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.825881690094318
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL9TKlBx+DcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LxGV+V
                                                    MD5:7EBDFA311C7852AFADF880395071DE48
                                                    SHA1:F6EC21FDFB75EC1BE45B1C4170147CBA3E870E7B
                                                    SHA-256:53FA58E32DC2E4ABB574B2F78011815EEB7F89F453CC63C6B6C1460ABBB4CA5C
                                                    SHA-512:DFBCD4EA4AFFA1D1CAE7308168874527FD36B5CAE76153AADA9C5E5F628258AB26654A16C8A5F8906FC5918398FD880B15B6DD4E3EF6AD3BE63D4A2455701FA8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Comoro) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):149
                                                    Entropy (8bit):4.871582172327986
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL12h2FNMXGm2OHvavFd9vM0VQVFv:SlSWB9eg/+L53XDm2OHEd1nVQVV
                                                    MD5:5D07EBAAF83E8E473C23142CB09A05BF
                                                    SHA1:34FD76789085EB6336193889D8FB5A8B3142383E
                                                    SHA-256:C7AFDE6978D8CE5413730D370E2776E2ACC7D96570A6034EB504C0F42CA5D1E7
                                                    SHA-512:FC5613EFC3B8EFA3553ECD3232383FF4CF5F4D777A1E46C4D212080711EA33F38A59449F828C6E33CB1F359249F254B4869AFD8F434FBD5213E657732D832777
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Kerguelen) {.. {-9223372036854775808 0 0 -00}.. {-631152000 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):149
                                                    Entropy (8bit):4.942285614866899
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELzJM5FNMXGm2OHuVdF+YoHscfNmHIRNVsRYovV:SlSWB9eg/+L/YDm2OHWgYoH9YHkSN
                                                    MD5:ECA9671460E65583ADF4892E40F2402E
                                                    SHA1:6E5DE51DD1FB619E33254F5967647A77A5D7C496
                                                    SHA-256:8E1D0F7268A5EE75E8A7C17FD6E1A9880BAD18A612346C29D70B462024D7371E
                                                    SHA-512:CBD970D789943120B8DE5A166B97ABC7E221F7692DE26FC5523FB0D76C4BF9D10F541778ED1ABB7A3B9529547C20B804B702B7221516970B7B3225A87682AC93
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Mahe) {.. {-9223372036854775808 13308 0 LMT}.. {-1988163708 14400 0 +04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.883092265054605
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELzE5FNMXGm2OHnz8eoHvZT5lxV/uUQwGN0VQVFv:SlSWB9eg/+L/EJDm2OHnz8eoHvZT5rdI
                                                    MD5:4DF975C040D78FA8F9C92E5565D63A73
                                                    SHA1:48488F076871530D32278084F1C9CB90CB1E6AB4
                                                    SHA-256:9FAC69DC609CC6074ECD67E0BE8AE62E33D8D9C7F055A3E0DEE1430C7FFC54F6
                                                    SHA-512:880B920FB51F48731BA8C741B9583038A3276221C55F1CE0B464D2797D71EF9D22B4E166841BAB0544B7091CE683697BFCA5A4235FF1E6264B0619DBDD4BB619
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Maldives) {.. {-9223372036854775808 17640 0 LMT}.. {-2840158440 17640 0 MMT}.. {-315636840 18000 0 +05}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):272
                                                    Entropy (8bit):4.5144164346164715
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/+L/GDm2OHlNnoH9SvulvSNFF+c0FSFFMVhvSNFFVBjvVFSFFVGlvSN:MB86+L/CmdHlNnCy6qB0FScZq9BjVFSL
                                                    MD5:05362B6A17C5F4F4E8CBE5A676D5D0DE
                                                    SHA1:84675D5E8D1425A5E9DB07D1BC1E6A5921B5AC91
                                                    SHA-256:A2B1B93CBEECBD900ED71E61A4932509EB52688E97A6015DAD067066D0D42072
                                                    SHA-512:351D2BC5F5888D8E842BF160D11D57E059811186D63B0413061768C7FE348CECB700748A0C0125F0ABCBB039FC74FF7BEEFDD42088BA1E28C785E545ED2CDF24
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Mauritius) {.. {-9223372036854775808 13800 0 LMT}.. {-1988164200 14400 0 +04}.. {403041600 18000 1 +04}.. {417034800 14400 0 +04}.. {1224972000 18000 1 +04}.. {1238274000 14400 0 +04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.828945679595274
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6ELzO1h4DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/+L/O1hm
                                                    MD5:8ABBEC0E138C1A68CB5D096E822DE75E
                                                    SHA1:E9C5CE1A249F6DC0F6EDBB3F5B00F3106E3BD6CA
                                                    SHA-256:845C45FD7B6F0604B03A3C72DB117878B568FB537BCA078304727964157B96AB
                                                    SHA-512:15790CCA70140D3139F3E2A202DC8F12E68466A367C68458D6A78CDDC7822FB5EDB87D630926B51F3DE48D95DE7CA3FCB946CD7B762FE5B15866DAA9DBA40B46
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Mayotte) $TZData(:Africa/Nairobi)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):152
                                                    Entropy (8bit):4.978742383555601
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELsAcCFNMXGm2OHuU7oeoHsdvcUeNVsRYovV:SlSWB9eg/+LBXDm2OHb7oeoHTfNSN
                                                    MD5:A03BEEC3F4CF0F6E1077A04C67CF3375
                                                    SHA1:4C39038341E26C2E68F2E46AD243A0955098F149
                                                    SHA-256:E039B16CAAB8F5D8F85625E0CC1D0FE42369715F2A4810BDF7F9CF19A28B5603
                                                    SHA-512:B23C6C28FEE0A8CA93DB2928A9AC97DD8475B7C1FC6DCB70E696F066D67DF4FF0285D7631400DEDD780C4B5F868B194CC59108FCFA519473D1ADDEC36CC53262
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Reunion) {.. {-9223372036854775808 13312 0 LMT}.. {-1848886912 14400 0 +04}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):166
                                                    Entropy (8bit):4.809541513808179
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8g5YFeovXHAIgNqjyVHRL/+XiMr4WFKBpv:SlSWB9vsM3yA5oPHAIgcjeHN/+Xvr4wY
                                                    MD5:A90C26358FEF60E49044E3BE02866FAC
                                                    SHA1:137AC8CCA23F39E7A16C4050EA9A3A8731E9AAD7
                                                    SHA-256:FE7F4453CB5F6B81B23C1C795356B91FE319F0762BE7868FAFE361DB1F9C2A2B
                                                    SHA-512:D6C74CACF69D29E14CB46E5DD885234AC50EE2E258E0C5E3AC76465061622F064F974D33E91A6A020B9D618D90799DDA6EB1EA53022EDB6E26A9CB6ADFE0AA30
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tehran)]} {.. LoadTimeZoneFile Asia/Tehran..}..set TZData(:Iran) $TZData(:Asia/Tehran)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):177
                                                    Entropy (8bit):4.8290104377288925
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/+WXnMr4WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/+zr4wKY+
                                                    MD5:6BCC43951637D86ED54585BE0819E39C
                                                    SHA1:6F04F306B3AB2A6419377294238B3164F86EF4A3
                                                    SHA-256:805105F5F17B78929F8476BAE83ED972128633FF6F74B7748B063E3C810C27A6
                                                    SHA-512:ABB9F4308BF4BD5C62C215A7ECD95042CBFB3005AF1E75F640962B022574C930DD5A12CD0CE0AF8A3D7E38B999E37C3A45A55091683F6A87E9D0CDA9EE417293
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Israel) $TZData(:Asia/Jerusalem)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.722012123002917
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx00EIECWXHAIg200EIE/vHRL/9S//2IAcGE0EIESvn:SlSWB9vsM3y795VHAIgp95HN/029095c
                                                    MD5:1F020341AD51AA82794B8018F214DE0D
                                                    SHA1:4414E56C1277B4D31FE557F8652D522C0594F4B2
                                                    SHA-256:F01B00D52BD7B2694BF5CB55A17028C30A41BD22A774CA54740E8B1DDE4FCB2E
                                                    SHA-512:CC41848A851D4992AE9F27C38669CB87CE2FD05A33AB6989EA21AFCB1A2707DE0CB4D62BCC45E536DD944859991D7564847205F47509A42D41932370496A77D7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Jamaica)]} {.. LoadTimeZoneFile America/Jamaica..}..set TZData(:Jamaica) $TZData(:America/Jamaica)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):164
                                                    Entropy (8bit):4.8422204749795545
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8aofXHAIgNqsRL/9hM7/4WFK9vn:SlSWB9vsM3ypPHAIgcsN/4r4wKNn
                                                    MD5:9554A65BFFCFFCFB2C1588569BB4638E
                                                    SHA1:B377ECB04586396D37093856AEF8BBDC93192F66
                                                    SHA-256:98DBD07AE3B9251B9091F4D265336CE98BDFB492AF863C1F3FF25248A2CADF35
                                                    SHA-512:E2E761B8B1995B68721BC714A546E0F45EEC025FAF81DE579FF0D73D37783D0E031B9E78BA2FAC6B097E3673C47AFB8761FBC58E42E33018FD44B77F2871E0C6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tokyo)]} {.. LoadTimeZoneFile Asia/Tokyo..}..set TZData(:Japan) $TZData(:Asia/Tokyo)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.810216093939366
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG1/EOM23vXHAIgObT1/EOMH6RL/8/FMKpUDH1/Ex:SlSWB9vsM3yc1EiPHAIgOb1E+N/8xMEx
                                                    MD5:05C0C40F2AA456F580EAAFC4F7E49B56
                                                    SHA1:5796A9122693B2D6010BC5E617A6091F46330B0C
                                                    SHA-256:85E95363ACF468043CD5146927A97B2D9E3B141EDA0A7993DADA9382D1D6DD54
                                                    SHA-512:2155F8E3EB73312F0AFD5CDDF4B19EBB67A15658101870C2CEDF96955470DBC7B30F34E143D9C14CBFA7A138F63324009581BD0B807AE295C68588CA0470D7AD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kwajalein)]} {.. LoadTimeZoneFile Pacific/Kwajalein..}..set TZData(:Kwajalein) $TZData(:Pacific/Kwajalein)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.829980800076139
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsbKJqYkyXHAIgNGEnKJp0ARL/7beDcbKJ6v:SlSWB9vsM3y7JSHAIgNTxAN/PeDE
                                                    MD5:4D44D88336212E162CCEFADE6321EDBC
                                                    SHA1:B9EE7AFE26DC61AA9EA37EB99A3C10DD176E8063
                                                    SHA-256:F776839C1999056E6A0D2ECFDF9054FC309454AFDFF8E8BC803F33EC423B7361
                                                    SHA-512:FDDCBD194DE07B51DEBBDEF4FD96762EE3507117443FB9F7975FB56E0AE97B0D1F8657FE26B092021FB12B5A5D3EFFAB9E0A54B1C2AFCEC1029855442A0A95AB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Tripoli)]} {.. LoadTimeZoneFile Africa/Tripoli..}..set TZData(:Libya) $TZData(:Africa/Tripoli)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7736
                                                    Entropy (8bit):3.799706947156251
                                                    Encrypted:false
                                                    SSDEEP:96:aJCP8D3pCS2JWk55EyqJNSPTub3NDOyFyJYVtLbTxdqs0xcQVq+O7JSAmwQZjltB:FSyWBSPTujlOyqc3JuzVNvTN
                                                    MD5:02B993B4A6956014A2DB844E8A5498C0
                                                    SHA1:378333547254AC43BEB4FA2CBC24B8DE241B3078
                                                    SHA-256:DF45F5414F1636B1856C7534BB5F3D4387C32D56283A68BB47D8C48C1DDAD5BC
                                                    SHA-512:CC3ABCC1FB5ABD10A685F140931DE38D6875142D3595F8D9A581F5B31A7F354FA4CCC9727B69F58E0D2F773EA0F76D9ACFDF7ACBAFC6BAA6E93A46EAE8F18672
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MET) {.. {-9223372036854775808 3600 0 MET}.. {-1693706400 7200 1 MEST}.. {-1680483600 3600 0 MET}.. {-1663455600 7200 1 MEST}.. {-1650150000 3600 0 MET}.. {-1632006000 7200 1 MEST}.. {-1618700400 3600 0 MET}.. {-938905200 7200 1 MEST}.. {-857257200 3600 0 MET}.. {-844556400 7200 1 MEST}.. {-828226800 3600 0 MET}.. {-812502000 7200 1 MEST}.. {-796777200 3600 0 MET}.. {-781052400 7200 1 MEST}.. {-766623600 3600 0 MET}.. {228877200 7200 1 MEST}.. {243997200 3600 0 MET}.. {260326800 7200 1 MEST}.. {276051600 3600 0 MET}.. {291776400 7200 1 MEST}.. {307501200 3600 0 MET}.. {323830800 7200 1 MEST}.. {338950800 3600 0 MET}.. {354675600 7200 1 MEST}.. {370400400 3600 0 MET}.. {386125200 7200 1 MEST}.. {401850000 3600 0 MET}.. {417574800 7200 1 MEST}.. {433299600 3600 0 MET}.. {449024400 7200 1 MEST}.. {465354000 3600 0 MET}.. {481078800 7200
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):111
                                                    Entropy (8bit):4.902637155364683
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/6xtNMXGm2OHrXV4foAov:SlSWB9eg/6lDm2OHrCAAov
                                                    MD5:36119516E87814F3C219193069CD6A90
                                                    SHA1:BDB25531B30E6FC454100F37177EC9D4A0FB4E39
                                                    SHA-256:E57746D5DB479A8B30973F2BC16E2B8DFB6E2BFAECBFF0FB956F04526E4B935B
                                                    SHA-512:2730C5DABA0B2CCFD32A799C48EE07351659F51B9C2B91DCD145675AF276F2D0B5AA51ACF7D283C0DC236D3AFA3A75E58EB9F970B1831A6E36F02139CAF6A655
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST) {.. {-9223372036854775808 -25200 0 MST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8505
                                                    Entropy (8bit):3.8405400251137207
                                                    Encrypted:false
                                                    SSDEEP:96:T1ktwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:TswDPlLv/PCenJzS6cy
                                                    MD5:87B3BCD4A793BA383889ECFDB44C846E
                                                    SHA1:3EA34B5E6E3078A9501653BA069D5E5E879D7FE4
                                                    SHA-256:A5DEB89D59613D9A54C1E146056A805B3DE9F2A2593AEC2B8A25F863328699C0
                                                    SHA-512:AA4DAC2614661EF18A2A60A5BD4D5BBBCCB5D721F90A25E9D11C5B6AF8C39FD475B3E23894719E2F8F74469F13D5492FF31DDD193D9E3172182FBCBCDD860A41
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST7MDT) {.. {-9223372036854775808 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1 MDT}.. {247046400 -25200 0 MST}.. {262774800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.884776849010803
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/6AdMSKBbh4IAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/68K5h490m
                                                    MD5:3050A0100A2313C1D3AB4278B464F17A
                                                    SHA1:1A140447B3972900F13768659FD6979F68126E97
                                                    SHA-256:F8CA38A845CD01BF785EE222277DAD9325AB6BD17E44A362C450855AEB522814
                                                    SHA-512:C91C4BF2318C50D473E6051855C12F0E11CBAA8580B88115CDDE054D36476A1D8DDC5D17A7A123BD84148C20B96BD839511EAD573F5FD2C9A8556646B9CDE5E5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:Mexico/BajaNorte) $TZData(:America/Tijuana)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):191
                                                    Entropy (8bit):4.8897674180962145
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0zjRJ+ovXHAIg20zjRJ8yHRL/6AdMPCoQIAcGEzjy:SlSWB9vsM3y7zjRJvHAIgpzjRJ8yHN/Z
                                                    MD5:FAFD9727A0E153AFCB726690D215DA76
                                                    SHA1:3CD3B2737FC781F38DE26E255968CBB88B773CBF
                                                    SHA-256:2E6E32A40487F0146B59150B66FF74901CA853B12D47922819AF23EEA5B4149C
                                                    SHA-512:76D110494D4EB76961C818B2A2CCB2303B31DA161664FA712C87B95B81DE7B8F3E50DC7B2836C6ECC6437AE9595668E62E4E706F1B343EFEA12C32210F113540
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mazatlan)]} {.. LoadTimeZoneFile America/Mazatlan..}..set TZData(:Mexico/BajaSur) $TZData(:America/Mazatlan)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):200
                                                    Entropy (8bit):4.877941255622543
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y7zBDSHAIgpzBx6N/6BXl490zBf:MByMYzppzH6t6Bi90z1
                                                    MD5:29ACBFCD0FD521EC0C9523906B9E2252
                                                    SHA1:BBC1AD3F78CAA634A2F0BC38059975EF8E4A2CE9
                                                    SHA-256:2DFF1B83FECFAD5C27EC47B206696C29B91398F8185B5D406A66FA9E0AECA93F
                                                    SHA-512:802502010CFB6F1F4E60C22ECB0E6CA22750975E5838BE7E7DC9D12EA019CB6508F0F87465A113A98356CC9E145E32E6633AE2B45B93412A358C4AD13E923EFE
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mexico_City)]} {.. LoadTimeZoneFile America/Mexico_City..}..set TZData(:Mexico/General) $TZData(:America/Mexico_City)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.888611285267583
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG/u4WXHAIgObT/KvRRL/5E1nUDH/uov:SlSWB9vsM3ycqXHAIgObOvRN/iy
                                                    MD5:92548E239012515D756E002768CA876A
                                                    SHA1:6BDC73DBD7356C3F82C5C76E6E2D58656FA9E21D
                                                    SHA-256:E22D629D53C54960AD156C377DE0AE461C27F554990A3D1305724CA8F869BCE4
                                                    SHA-512:42AD074EE08E083EE91270F203707698A8B3308005C94514B8B2D950F4C6F0B37D7D32973EC9F6AB49A0875209076FB40341B31433A27E47B3CC0EA711ECE321
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:NZ) $TZData(:Pacific/Auckland)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):181
                                                    Entropy (8bit):4.881663364410736
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9WQ+DyXHAIgObT9WQiovRL/5AmtBFB/pUDH9WQg:SlSWB9vsM3ycwQ+DSHAIgObwQTN/zzJ7
                                                    MD5:3811C133C6311E33FDAF93660E1EAED5
                                                    SHA1:64756FF877B2EB91BAED2889B3924DAB6784DF43
                                                    SHA-256:83F4CA3522B64F9B151EDEFAE53E0F28C2E6C4CE16D0982186B3344F2A268724
                                                    SHA-512:7724D6CD08E13E116CCDF073F86CE317C0D4A849C5FE81DF3127D435704507FBF554BFC6E7A50CCA3852F6001D8654B7FF90466878DB8C3298338BE16149FD32
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chatham)]} {.. LoadTimeZoneFile Pacific/Chatham..}..set TZData(:NZ-CHAT) $TZData(:Pacific/Chatham)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):177
                                                    Entropy (8bit):4.8545620422964015
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/5vf1+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/pd+90+B
                                                    MD5:5E9F3294F68873BF503F3DDDDF6713B0
                                                    SHA1:954CD6F123C043E64F5E49733327E2C78877BDFB
                                                    SHA-256:2CC8CE235F2EE3160E6AFD04A4E28AA0312494EBB6FED08D8CC81D414EC540EE
                                                    SHA-512:200FC489989CA57219D5B28FB135BE5BDAC67239F3D243C496545D86D68089E51856CEAC4D2E700C0E47BAE4D5FEAB18A367C554235615B2B860F4E5E1BB08C3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:Navajo) $TZData(:America/Denver)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):171
                                                    Entropy (8bit):4.902914099699953
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/nL75h4WFKdy:SlSWB9vsM3yMPHAIgO8AN/H5h4wKU
                                                    MD5:87C439DC623BF5C7EB01ADA6E67FB63A
                                                    SHA1:1CC357558E09CDEA49F821826D2AEA9A6EF2C824
                                                    SHA-256:6A5BAA9CA54B2A2C6D21287443BE0B1064AA79B5C4C62939933F8A0AD842B73E
                                                    SHA-512:E628B8F1C967AABAEFBB68A33416F6FE47422970BA18414BB3396AC063E65A4DC892595D4071395194AF320633EE915A494E1F8D4216EE8194A034739D275C49
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:PRC) $TZData(:Asia/Shanghai)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8505
                                                    Entropy (8bit):3.836877329152454
                                                    Encrypted:false
                                                    SSDEEP:96:0KhTG0hjvZkR/bvtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:0sG0U9bFzN6IkWq/WHQt/RY4yP
                                                    MD5:45E7E9E183A990F56E17C04FA48CE620
                                                    SHA1:A1F39E0ECEA3C64E761A9A3159E331FA51B625F9
                                                    SHA-256:D148708F1E70EEFA51E88E5823776CBE710535D4D6D6356E7753A44463A1C5AB
                                                    SHA-512:1D1F4BA90D07D7EE12DFD0E37DBFD5410A4EAFFBA8960B816FDD5963CD6B20938080A4248E7B249AAE02F068E817AB9A85735D226F7DA8DD2C5462A70B18E8EF
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:PST8PDT) {.. {-9223372036854775808 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-84376800 -25200 1 PDT}.. {-68655600 -28800 0 PST}.. {-52927200 -25200 1 PDT}.. {-37206000 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):909
                                                    Entropy (8bit):4.042826306713664
                                                    Encrypted:false
                                                    SSDEEP:12:MB86HbmdH2oVCvcCfdf3NaDyTb6Dye78ubUt1NEUtszIVbUtoUtoUt3mbUt4qUt6:Yekv5fcfem+Cuy
                                                    MD5:E5B913965F72AB807BAE67BD20C0A699
                                                    SHA1:2161B73EC868C8D18C09970766D19A8583FF7981
                                                    SHA-256:983884249ACC11C3FE740D78E72B1A89BE9C8B077283549BF6BCD8C93FA71731
                                                    SHA-512:F8807C52DB852C48C62F25569C990C31D977BC7D0DF502CF2B92F9ED6BCB89A6DD8A6758FBD1185E0B5C34DE5450D5C748B71760AC93E72DC3976B3B31D1A605
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Apia) {.. {-9223372036854775808 45184 0 LMT}.. {-2445424384 -41216 0 LMT}.. {-1861878784 -41400 0 -1130}.. {-631110600 -39600 0 -11}.. {1285498800 -36000 1 -11}.. {1301752800 -39600 0 -11}.. {1316872800 -36000 1 -11}.. {1325239200 50400 0 +13}.. {1333202400 46800 0 +13}.. {1348927200 50400 1 +13}.. {1365256800 46800 0 +13}.. {1380376800 50400 1 +13}.. {1396706400 46800 0 +13}.. {1411826400 50400 1 +13}.. {1428156000 46800 0 +13}.. {1443276000 50400 1 +13}.. {1459605600 46800 0 +13}.. {1474725600 50400 1 +13}.. {1491055200 46800 0 +13}.. {1506175200 50400 1 +13}.. {1522504800 46800 0 +13}.. {1538229600 50400 1 +13}.. {1554559200 46800 0 +13}.. {1569679200 50400 1 +13}.. {1586008800 46800 0 +13}.. {1601128800 50400 1 +13}.. {1617458400 46800 0 +13}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8772
                                                    Entropy (8bit):3.900078030355782
                                                    Encrypted:false
                                                    SSDEEP:96:pj4hKuZaqaaiFKgjGeGV3atL67G9kJGsU+mpe7Vy:Cla1KgjGeGcQMsa
                                                    MD5:8174D7205622711F58E0B515246FE89D
                                                    SHA1:9777B2633ACF5588268D5072F817E65C879358AC
                                                    SHA-256:201CFADB00FBCD3283249DAD73872ED75C5BEC07F5A5B157726638C20728B833
                                                    SHA-512:64121ED1EE70D5423710319E806B19261576AECC89A64CBEC44A29BF4AC9FEE21C6484CC3C4550CC92C315B3855BE265F696F8CD4D95027226D608B3ADD022F1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Auckland) {.. {-9223372036854775808 41944 0 LMT}.. {-3192435544 41400 0 NZMT}.. {-1330335000 45000 1 NZST}.. {-1320057000 41400 0 NZMT}.. {-1300699800 43200 1 NZST}.. {-1287396000 41400 0 NZMT}.. {-1269250200 43200 1 NZST}.. {-1255946400 41400 0 NZMT}.. {-1237800600 43200 1 NZST}.. {-1224496800 41400 0 NZMT}.. {-1206351000 43200 1 NZST}.. {-1192442400 41400 0 NZMT}.. {-1174901400 43200 1 NZST}.. {-1160992800 41400 0 NZMT}.. {-1143451800 43200 1 NZST}.. {-1125914400 41400 0 NZMT}.. {-1112607000 43200 1 NZST}.. {-1094464800 41400 0 NZMT}.. {-1081157400 43200 1 NZST}.. {-1063015200 41400 0 NZMT}.. {-1049707800 43200 1 NZST}.. {-1031565600 41400 0 NZMT}.. {-1018258200 43200 1 NZST}.. {-1000116000 41400 0 NZMT}.. {-986808600 43200 1 NZST}.. {-968061600 41400 0 NZMT}.. {-955359000 43200 1 NZST}.. {-936612000 41400 0 NZMT}.. {-923304600 4320
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):280
                                                    Entropy (8bit):4.715653436088026
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/FtTfDm2OHHhp5oHvZiuo2HvDVeEU8vScH9syZEizy:MB86FtTLmdHf5CvZiIvJeJ8HH9F6izy
                                                    MD5:4E858B3754BD8864719A61839ACA64E6
                                                    SHA1:597025A8DAFD5AE75EBD162AC0E9DA71815816BA
                                                    SHA-256:2D3BFDED297214BA25CFD8C6F508D0C8B1A1CD7D46701A78EC5E510076185EB6
                                                    SHA-512:720F301B73C852EA8EEFA79DEF6B6762554E50222DE114FE87EB5178507F1895A9A39B3872A1A4B9DFF58D1CC6460BA4A82F2C165E3659E13036451F22E389C3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Bougainville) {.. {-9223372036854775808 37336 0 LMT}.. {-2840178136 35312 0 PMMT}.. {-2366790512 36000 0 +10}.. {-868010400 32400 0 +09}.. {-768906000 36000 0 +10}.. {1419696000 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8165
                                                    Entropy (8bit):3.6566720439018874
                                                    Encrypted:false
                                                    SSDEEP:96:gpvlGCcn6AadFurBrioCdL49mq9X4a2t3I/KVE:gOCBdFurBr0soaz
                                                    MD5:8105A806A1762932897AB59C47BBE89E
                                                    SHA1:386E41A4A83FA84DBFCA994F679242D067CEED64
                                                    SHA-256:CA0EEF84DBC5964EF2265E9252237BE58BB8D75C34817CC2305CCCFAEC7E690C
                                                    SHA-512:8A609E7F4868BD455DA811E62142FECD792D0CA0DAAF7C10C4E4254C9EC44B8EB92D388D9224C8FD3CC3FB326A106D831B80F5E1264CCF3EABBCE177BB82E9D6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Chatham) {.. {-9223372036854775808 44028 0 LMT}.. {-3192437628 44100 0 +1215}.. {-757426500 45900 0 +1245}.. {152632800 49500 1 +1245}.. {162309600 45900 0 +1245}.. {183477600 49500 1 +1245}.. {194968800 45900 0 +1245}.. {215532000 49500 1 +1245}.. {226418400 45900 0 +1245}.. {246981600 49500 1 +1245}.. {257868000 45900 0 +1245}.. {278431200 49500 1 +1245}.. {289317600 45900 0 +1245}.. {309880800 49500 1 +1245}.. {320767200 45900 0 +1245}.. {341330400 49500 1 +1245}.. {352216800 45900 0 +1245}.. {372780000 49500 1 +1245}.. {384271200 45900 0 +1245}.. {404834400 49500 1 +1245}.. {415720800 45900 0 +1245}.. {436284000 49500 1 +1245}.. {447170400 45900 0 +1245}.. {467733600 49500 1 +1245}.. {478620000 45900 0 +1245}.. {499183200 49500 1 +1245}.. {510069600 45900 0 +1245}.. {530632800 49500 1 +1245}.. {541519200 45900 0 +1245}.. {56208
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):305
                                                    Entropy (8bit):4.600179085934857
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/ZzSDm2OH9pvoHT1YoHvmdcXALEzvScHoVvXKnOjvScHb01Fy:MB86RGmdH9pvCT1YCvnXALEzHHIfKOjd
                                                    MD5:AEC058BE796F1513F3DF3E545290D223
                                                    SHA1:27D274974AC95B724A4BFDD65CB1B9DD92F73E3D
                                                    SHA-256:492DF366BB0A7D29D2DB4A9C40CF0C15CB47343FF908D1AA86092C8E84E4434B
                                                    SHA-512:E0924AB86E512AE1B800DEFA637F6B1743FF77F1FEFDC5068A7C30C1AC0BAC60F0D0351278866FD98A59D56BA2C56A1AFC1EBB4F14AAFE5D450085587B7C8F4A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Chuuk) {.. {-9223372036854775808 -49972 0 LMT}.. {-3944628428 36428 0 LMT}.. {-2177489228 36000 0 +10}.. {-1743674400 32400 0 +09}.. {-1606813200 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 36000 0 +10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8203
                                                    Entropy (8bit):3.546693824302767
                                                    Encrypted:false
                                                    SSDEEP:96:QXn3AWkHkPp2YXaVU+PO/Un4n6MSmSmiTpk9eL6Z5waKkhWILTc:QXn3AWJB2m+PO/UnOSmSmS6ZaILg
                                                    MD5:B8B2048F107528DEB4B04CB3E698A5BD
                                                    SHA1:0E82DCB11A4553771760B8B0A748EC03F953D2FB
                                                    SHA-256:84B815988D1A5AC16F3EC52844BDCE7A8E8707800C782235B5928473EEF9B433
                                                    SHA-512:511E3C51B4016641146D21264C031151F2CE9F916F0D97C47D623B66F6244BA9243108179C786B63B8B71F77885B916AC6D18C10CFA1001290019CE6B73278D9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Easter) {.. {-9223372036854775808 -26248 0 LMT}.. {-2524495352 -26248 0 EMT}.. {-1178124152 -25200 0 -07}.. {-36619200 -21600 1 -07}.. {-23922000 -25200 0 -07}.. {-3355200 -21600 1 -07}.. {7527600 -25200 0 -07}.. {24465600 -21600 1 -07}.. {37767600 -25200 0 -07}.. {55915200 -21600 1 -07}.. {69217200 -25200 0 -07}.. {87969600 -21600 1 -07}.. {100666800 -25200 0 -07}.. {118209600 -21600 1 -07}.. {132116400 -25200 0 -07}.. {150868800 -21600 1 -07}.. {163566000 -25200 0 -07}.. {182318400 -21600 1 -07}.. {195620400 -25200 0 -07}.. {213768000 -21600 1 -07}.. {227070000 -25200 0 -07}.. {245217600 -21600 1 -07}.. {258519600 -25200 0 -07}.. {277272000 -21600 1 -07}.. {289969200 -25200 0 -07}.. {308721600 -21600 1 -07}.. {321418800 -25200 0 -07}.. {340171200 -21600 1 -07}.. {353473200 -25200 0 -07}.. {371620800 -21600 1 -07}.. {384922800
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):789
                                                    Entropy (8bit):4.0457106900970325
                                                    Encrypted:false
                                                    SSDEEP:12:MB86HmdH6mvCON3Xj/kw2eX/xtDedjX24ots0FX2ud5KRGkpFxy:uegazZBzCdXUFQzy
                                                    MD5:6841B8A2FB9BBF464AA00088CBDCEC80
                                                    SHA1:26CC5CCE00A765F8B6493ED24F50957AA7F0089B
                                                    SHA-256:332372E5EFB46123FBB66F9F32F91B59EBD88ADB956249DB3F14CAAB01CE2655
                                                    SHA-512:A6C67A0F7361E599369597E9A8A52FC7D5C96DE6B5A7C1BE1D02F5DF11051F448289786C7F0E82E71CDEB825215E64E072CF034C45D6E2F822D7201AB8B41B57
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Efate) {.. {-9223372036854775808 40396 0 LMT}.. {-1829387596 39600 0 +11}.. {125409600 43200 1 +11}.. {133876800 39600 0 +11}.. {433256400 43200 1 +11}.. {448977600 39600 0 +11}.. {464706000 43200 1 +11}.. {480427200 39600 0 +11}.. {496760400 43200 1 +11}.. {511876800 39600 0 +11}.. {528210000 43200 1 +11}.. {543931200 39600 0 +11}.. {559659600 43200 1 +11}.. {575380800 39600 0 +11}.. {591109200 43200 1 +11}.. {606830400 39600 0 +11}.. {622558800 43200 1 +11}.. {638280000 39600 0 +11}.. {654008400 43200 1 +11}.. {669729600 39600 0 +11}.. {686062800 43200 1 +11}.. {696340800 39600 0 +11}.. {719931600 43200 1 +11}.. {727790400 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.82787610497142
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG11avXHAIgObT11ORL/nUDH7/UDH11B:SlSWB9vsM3yckHAIgObON/h
                                                    MD5:CD1AC50AADC3CF9C0E7A055D587E790D
                                                    SHA1:BEE0E16D3954DF33C697DEA469A130BD9875AB8B
                                                    SHA-256:790E6B48B261D6DEF7D183CC8F38FB8D8A6E3EFB8844281EFABB2DFD621E53B5
                                                    SHA-512:B6A93DFB4CBE2F35268AACA88FDCC4D19949A2E8DC9464D8341C38065C6FF48A3C49FE756FFCE777C8F806DE309C8AFC4CE4BC4ABD183C28808F995A0F89B091
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kanton)]} {.. LoadTimeZoneFile Pacific/Kanton..}..set TZData(:Pacific/Enderbury) $TZData(:Pacific/Kanton)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.913439535905759
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDH4ErKYofMXGm2OH18VkeoHvmUENBBy/aCPFVFv7Dy:SlSWB9eg/BE3ofDm2OH1VeoHvmH7y/Fy
                                                    MD5:6250F332356787613A2D1853EF6D1AC3
                                                    SHA1:0464B9EE8B691990022295D2DEFE1AAE4B247E63
                                                    SHA-256:336058DCA4802C79ED43F6177ADB73085D4FA0754B94051CAE2A19346B0C4904
                                                    SHA-512:B8FAB5E128D2EF3CB7050DA717D80247045BE09F7F6542AA154CB85F4A56884F195EE2776421890A3F86D133106DCA4672D7D9329E0DE6F4A7CF8F4030822988
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fakaofo) {.. {-9223372036854775808 -41096 0 LMT}.. {-2177411704 -39600 0 -11}.. {1325242800 46800 0 +13}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5636
                                                    Entropy (8bit):3.637086785452708
                                                    Encrypted:false
                                                    SSDEEP:96:9QdCQvGPccyGqjXKZ2luR7oVqqJZozv88s2:Wd9vGPfyGi6Z2opCs
                                                    MD5:D2A17937A99B50B3BCD50F8C10520B56
                                                    SHA1:A27681C6EC2B4625262359E5ADFEA09CAB58FAFC
                                                    SHA-256:A29FAAEE67BC07F5DF858DAC070F03E45E29B67A5F9DE6DD992E79A9601979B7
                                                    SHA-512:A16F96B17E7221A9C60EF506D7ABFE806304AAAB8C64A69E340E9960BEB64C7334931CD6FBBA5F22A1A3BFFE55690BDF04E60852E516CB3048EE34AC3EAB16CC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fiji) {.. {-9223372036854775808 42944 0 LMT}.. {-1709985344 43200 0 +12}.. {909842400 46800 1 +12}.. {920124000 43200 0 +12}.. {941896800 46800 1 +12}.. {951573600 43200 0 +12}.. {1259416800 46800 1 +12}.. {1269698400 43200 0 +12}.. {1287842400 46800 1 +12}.. {1299333600 43200 0 +12}.. {1319292000 46800 1 +12}.. {1327154400 43200 0 +12}.. {1350741600 46800 1 +12}.. {1358604000 43200 0 +12}.. {1382796000 46800 1 +12}.. {1390050000 43200 0 +12}.. {1414850400 46800 1 +12}.. {1421503200 43200 0 +12}.. {1446300000 46800 1 +12}.. {1452952800 43200 0 +12}.. {1478354400 46800 1 +12}.. {1484402400 43200 0 +12}.. {1509804000 46800 1 +12}.. {1515852000 43200 0 +12}.. {1541253600 46800 1 +12}.. {1547301600 43200 0 +12}.. {1573308000 46800 1 +12}.. {1578751200 43200 0 +12}.. {1608386400 46800 1 +12}.. {1610805600 43200 0 +12}.. {1668261600 4
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):154
                                                    Entropy (8bit):5.018668544746349
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDH4QwyFPMXGm2OHwodGeoHvmcpXrWXVN0UIoAov:SlSWB9eg/BCPDm2OHwxeoHvmgSX0YAov
                                                    MD5:C1547FDC362DA1162FE7B53BC16AEA87
                                                    SHA1:3249423B61C42E6CE54A77BACA0A8FDFD2594CF9
                                                    SHA-256:B2ACF1461318A0B21653B6F21DE5E54651A417A469AAD0DBF8099626040BEB51
                                                    SHA-512:76D0F4489CCB32A8CDCA5151E086E93A0199C6FF5066DD73F873F103F7592BFE4A3765BC862246817C2F0CA7F33B02EF40E5A3C9CF461A07D9AF03F623FC08FB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Funafuti) {.. {-9223372036854775808 43012 0 LMT}.. {-2177495812 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):247
                                                    Entropy (8bit):4.687336389955113
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/fEGDm2OHvQYeoHTie7KVQRncRvinrN5/uFifriX:MB86fhmdH0CTV7OcdrN5/uFiGX
                                                    MD5:0557D164DCD8DF5D99F7AF5A2AB1AD4F
                                                    SHA1:68AFD04303E5F541480425405D82E1827F78A8DF
                                                    SHA-256:192545659F971084ADC8489A2B96A6439FF391599DC962AA13375ACCFB3C09D9
                                                    SHA-512:1DA004E51F8E7A712EDE920CBB62E81F9F55450FB52B62F78F1CD4F8F4E342B4DAB2C28AA5161E8B24942A7A5BD55F978AFDA1C5E1949241E71D738079DEF9B8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Galapagos) {.. {-9223372036854775808 -21504 0 LMT}.. {-1230746496 -18000 0 -05}.. {504939600 -21600 0 -06}.. {722930400 -18000 1 -06}.. {728888400 -21600 0 -06}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):155
                                                    Entropy (8bit):4.976931060677737
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5hBYfMXGm2OHKToxYoHsdNfis:SlSWB9eg/DDm2OHPxYoH4qs
                                                    MD5:45330CE0FA604304C6ACF8EF8CAF51EC
                                                    SHA1:20EEF9646996C2EC9B2641EBCCBE4766BF38B17B
                                                    SHA-256:190E02A0C00D165FA45C73AEF9C0D6C82B1720E7406E5610DD860AED10A021A5
                                                    SHA-512:51C7931B503405DA0B4078F6BE411895DD00E86AC7C5BE475030664D5302AD614293541DEE7FFC3D86A9DDB1BDA32BCAA746CF1D207DB063FBA2F9E9BE12836C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Gambier) {.. {-9223372036854775808 -32388 0 LMT}.. {-1806678012 -32400 0 -09}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):157
                                                    Entropy (8bit):4.9796189407775255
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5RyJTLJ5FNMXGm2OHddHvpoxYoHsdMWdHPVtyn:SlSWB9eg/LJHjXDm2OHdFGxYoHgHPLy
                                                    MD5:DF09960360D8CEDCA2A4DC19A177C4A6
                                                    SHA1:9F73F271B8C85B25FE6392B8BF7465C92EFFE621
                                                    SHA-256:161762334DFF48B1D58824911E1FF4171386EA18234DD3DD5B0798515593086A
                                                    SHA-512:1BE9E0F90DA529C99E317F399BFDB913A076651CF8801A1849247B26A350A76D8B5807AB139F3DBB97790DDFC332BDBEB57B364BF67FA2BB440AFEDC4130A648
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guadalcanal) {.. {-9223372036854775808 38388 0 LMT}.. {-1806748788 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):733
                                                    Entropy (8bit):4.244282318063802
                                                    Encrypted:false
                                                    SSDEEP:12:MB862mdHanCTCtBCv1yWQkHHLTaWJ+x+87W0x+8+yWSi+JW7+sWU0dwaW1j+FaW2:FeaC2twvY3knLGs+I87p+8d9i+J7s70c
                                                    MD5:BA319E451BE323C852A8ABFC299DDA28
                                                    SHA1:FC9314C162FF1FE1ED5E2C5DF962A55D4D6D8115
                                                    SHA-256:42CB69ABC83415F63CA7D2A3E5314A41817AEE3206ECCC7172C50A74B1597DB0
                                                    SHA-512:3BF733B9ED2A57B01BE173A8421B2D5A45888A230461EA0BD8C5B4AC7DC010BB527346731196141C70AFECDF88DD47AFE48636243DFC395D88E58231BEDF7D2A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guam) {.. {-9223372036854775808 -51660 0 LMT}.. {-3944626740 34740 0 LMT}.. {-2177487540 36000 0 GST}.. {-885549600 32400 0 +09}.. {-802256400 36000 0 GST}.. {-331891200 39600 1 GDT}.. {-281610000 36000 0 GST}.. {-73728000 39600 1 GDT}.. {-29415540 36000 0 GST}.. {-16704000 39600 1 GDT}.. {-10659600 36000 0 GST}.. {9907200 39600 1 GDT}.. {21394800 36000 0 GST}.. {41356800 39600 1 GDT}.. {52844400 36000 0 GST}.. {124819200 39600 1 GDT}.. {130863600 36000 0 GST}.. {201888000 39600 1 GDT}.. {209487660 36000 0 GST}.. {230659200 39600 1 GDT}.. {241542000 36000 0 GST}.. {977493600 36000 0 ChST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):344
                                                    Entropy (8bit):4.640604617840767
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/PeDDm2OHsVVoHvBrai3UNFv+rUXaWFvAHovj/0nvCv7p+v:MB86WXmdH0VCvBz0GOTA0/0y74v
                                                    MD5:F3F0E64655FAA79E40860765EEBB5B77
                                                    SHA1:7F6C2FC100AEABC26B7205AB53C1E016B12E4D60
                                                    SHA-256:69319015799D32D3CF7C0A3E9991B4B1F3E0C5D1B4FBF400517350CCA9D2C3B7
                                                    SHA-512:7C9238BCCB13B90D4DC9B5E776C421A42C25D21B4E026406F57FA1E70983E8F6BF1CE927AB9D0D6261C5C1802A8B810399F506915262F82F487417CFD704B2F1
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Honolulu) {.. {-9223372036854775808 -37886 0 LMT}.. {-2334101314 -37800 0 HST}.. {-1157283000 -34200 1 HDT}.. {-1155436200 -34200 0 HST}.. {-880201800 -34200 1 HWT}.. {-769395600 -34200 1 HPT}.. {-765376200 -37800 0 HST}.. {-712150200 -36000 0 HST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):193
                                                    Entropy (8bit):4.844454917943834
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3yc6e8SHAIgOb6eKAN/NWyVheo:MByMdniinbtNWzo
                                                    MD5:4244078A03C2493009EF2F6BDA2F326F
                                                    SHA1:AC2FF3E91A8831A479B33DF32A0118BC2EB255D0
                                                    SHA-256:6E52B361AC8A6A578C709F6D58AA7535F06C0CB1707081C2D5A63FA8545D955C
                                                    SHA-512:398B32E0FAF80E40DF3ACD203DF380D61DC39322F0BA0388A18281BC26973945F45683A104B9A785BB9DF5E514322F6994F934289E4B56B7982F94D4528D4272
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:Pacific/Johnston) $TZData(:Pacific/Honolulu)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):208
                                                    Entropy (8bit):4.669308556946547
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/KyXDm2OHEMmzQwXy29BVyv7y/fTVVFty:MB86KyTmdHEZzQUBVyDy/fZvty
                                                    MD5:544A0A83241333805192A6F03888E359
                                                    SHA1:99D2BE79D57B44BD538386F9E7551C9E1874D7E3
                                                    SHA-256:0B1345555EC2B4738CC4DEBFE496C287966F238386263032FF1E27912CCBFBA6
                                                    SHA-512:61C91265632D01FBB7F4C739368756C428258FA6C141E49E88B6C78ABEA6150A74B8DFCF14C5AADDA03C1EA6F04D122734654495C26B8614561786B1C5C7EF10
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kanton) {.. {-9223372036854775808 0 0 -00}.. {-1020470400 -43200 0 -12}.. {307627200 -39600 0 -11}.. {788871600 46800 0 +13}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):219
                                                    Entropy (8bit):4.739672105601744
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/iSDm2OHjkeoHvmLVFFz4YWXfSzvjNv:MB86iGmdHpCvU4VfSbxv
                                                    MD5:1B695BBB9C50F6AFC05F67DE30374160
                                                    SHA1:08AD8BBB6C99EB36FC3E462DB41C6896F52F150C
                                                    SHA-256:4F7235B956A5A01676BE05275E086D5157EBC24FD91022E87817020669F915F7
                                                    SHA-512:DC35CB1C2E5E035A82F91D1B1F4B48D7B112D9B7A1A7DB9C4A4C42C4D58002E1ECD9D24B2EA5B624DBB526ADDF9A8AB37D4315843207C34C16B2EFE33A254752
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kiritimati) {.. {-9223372036854775808 -37760 0 LMT}.. {-2177415040 -38400 0 -1040}.. {307622400 -36000 0 -10}.. {788868000 50400 0 +14}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):394
                                                    Entropy (8bit):4.441317927120857
                                                    Encrypted:false
                                                    SSDEEP:12:MB869nmdHlCTvrvCvKcHwzHHI/HKOjHHwZaLYkcy:2ecrrqvGznISknwZaLxcy
                                                    MD5:B489D7BDE8EB805B2A24726A6FB0C441
                                                    SHA1:7997A33AA56857EC52B1198DBEF4CE1DB50D69FD
                                                    SHA-256:B528E5E712E5F878603183E7CCFF55E5DB97CB47D7628BCB635342796317B899
                                                    SHA-512:4898AC2747FB8620BE29933CC7AA344AF1A3B7777D1AFF08BB4C6CE6E7AF205581937CCB488F3CB39CC8CA7FB42EDC8E1CAD8BADC9FCA40E3CAD23271CD66FCB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kosrae) {.. {-9223372036854775808 -47284 0 LMT}.. {-3944631116 39116 0 LMT}.. {-2177491916 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 39600 0 +11}.. {-7988400 43200 0 +12}.. {915105600 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):304
                                                    Entropy (8bit):4.5947337310364835
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/yEyDm2OH4T2eoHvmfKnOjvScHrkL/Xy2185k0YAov:MB86XmmdHWCv6KOjHHgLN8tby
                                                    MD5:7D1FC9913941693ACBD6A3CCB2F34555
                                                    SHA1:D07C8AAED1DF9614BCA6EEF0F72FB98BE46CF5EF
                                                    SHA-256:38133BE70100D7DC244A680827879E6B240646C7C0B68F58652051E681A71985
                                                    SHA-512:419F0A1D1D71C8F84765C7B54271D7EFD6A81F428751523A214ABB24A8770DD5A7666F634A20AF97D5AAB8F21C0DEF23DCDE068CF4C1CCC7639ABC43864A9DBC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kwajalein) {.. {-9223372036854775808 40160 0 LMT}.. {-2177492960 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-817462800 39600 0 +11}.. {-7988400 -43200 0 -12}.. {745934400 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):333
                                                    Entropy (8bit):4.49621343701744
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/QpDm2OHyexYoHvmf/aHwzvScHoVv3HKnOjvScHr8e0LYX0YAov:MB86cmdHyuYCvMiHwzHHI/HKOjHHYe0I
                                                    MD5:CA7ED52987F13BA6A3043C324F72C3D0
                                                    SHA1:F5798473DB3A9AA588E5F0D772AD2145A90DE707
                                                    SHA-256:67EA1A2A84E0FA686C04EF327E7EEACCC15E21BED79A801E64BB57FE4184509A
                                                    SHA-512:4EA25564E1430615D0FE75319B3CFC88E3FB7BCE026B4C59842FC513CBE7BFF3AD39CC283ED88DD7292DFE8185ACECD5E1ED0D5997F27082F3F6B2D1317D86C3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Majuro) {.. {-9223372036854775808 41088 0 LMT}.. {-2177493888 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-818067600 39600 0 +11}.. {-7988400 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):159
                                                    Entropy (8bit):4.976348164850869
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHzrHeWNMXGm2OHOx5oHsdNpNFvvIVVFvYy:SlSWB9eg/cHeSDm2OHOnoH4/FvQVVFAy
                                                    MD5:80CB45F42BAB1AA72CD7C7BC394DF3F8
                                                    SHA1:8B5ED2BCCA1AEB41F22AFD14F46533959828B2BE
                                                    SHA-256:AE0B5055C6E57516F23749B13681205EAD376E682959716A457B1377AF8160BA
                                                    SHA-512:71562E340B7A96B91D04FCBCAF71B66EA725CA1BD1094343C4442F8F9A8C67A3BE378034849197407D21C3EE74E2C753B1FD3BAFF2378714B993AD9336236A0E
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Marquesas) {.. {-9223372036854775808 -33480 0 LMT}.. {-1806676920 -34200 0 -0930}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):194
                                                    Entropy (8bit):4.81307101485774
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHz0HvUDHurKv:SlSWB9vsM3yciemHAIgObiecN/Zevn
                                                    MD5:13CE48F8FF74BFCEFCB8D217D6357E38
                                                    SHA1:296D31E3F868934C6EB34BF1BF4C23F3E1839294
                                                    SHA-256:F62C6A2DEC1E9EC78115D5F14E5B9DB7C86F788662D2E68F7E6714F4A05DC974
                                                    SHA-512:778813FC08EF803743F392000BECE73C1C079883DAFC26FAC0AF8FA3FA4AE1D94BA8F3CAA5E82DD4DB1A5F12AD49E123901908F5483E0E325952622AB4C4A26A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Midway) $TZData(:Pacific/Pago_Pago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):244
                                                    Entropy (8bit):4.702705620563736
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/JdDm2OHceoHx6sCH/ZdqvScH9cd0YAov:MB86J5mdH9CMhcHHauby
                                                    MD5:30A8285FCCE2E98889E53DF60B906C3D
                                                    SHA1:C7789CB11A2C8FE3861FF3C0A7A41F6CAFD87631
                                                    SHA-256:22C367F3219B5FC736260D9DBFEF5FCB767F1A6BDA991C9352F790A3D1FFE884
                                                    SHA-512:02DA82680588839B06F820979AECC78B7FBEAB9D6D49176B513B80F1C8BA2D55FB3674B19EFDD574EE6FC01539EF7C3081A4B34D14A54DACF367D816B62E5843
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Nauru) {.. {-9223372036854775808 40060 0 LMT}.. {-1545131260 41400 0 +1130}.. {-862918200 32400 0 +09}.. {-767350800 41400 0 +1130}.. {287418600 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.846897598147338
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHwMQA3WNMXGm2OH0SNoHoRWVGXyOyovFaSUGFAZvBByV:SlSWB9eg/Jm3SDm2OHJoHFGXCodZUGFd
                                                    MD5:6E8EC957423917AE7A7EF503661C1A77
                                                    SHA1:B4FA3C3E3F96C28B7DB87BFD441D2EE99CC81B6F
                                                    SHA-256:869CCA656BE88E4E7481C75737C3656BAB6924AD1751505815AC719C59269842
                                                    SHA-512:9047ABE673259699C7A548BC7B5636DD646DD382C751B796522F65404162AB1B0BB022FD274653921E5B23C847EE248AEF6749E15ED2CFC1DCE35BBA294D8251
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Niue) {.. {-9223372036854775808 -40780 0 LMT}.. {-543069620 -40800 0 -1120}.. {-173623200 -39600 0 -11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5139
                                                    Entropy (8bit):3.65794255179185
                                                    Encrypted:false
                                                    SSDEEP:48:K/yg8hZbeS07HbbYTqge+gDrWnAxhejtB0e+Pwn1UVimqNQrKvyXrStkCDv:K/y7hNeS07sq0Erk10lINQrKvyXrwv
                                                    MD5:E19700A894AA64715D14F501D8D2FA98
                                                    SHA1:57CFC96E2EBB985720DB290F59181860AF2AC1AA
                                                    SHA-256:5D16C3EF1DB996C1B8E33AD884C33946F77DA872F35F41EC3BD5B288F43CC9AF
                                                    SHA-512:E11EAF2A7B217CDBEECB57635184F04171F0DB088FCC4702AA8D40A3A5453904592F5869849913E2EB02DC5941C84203A76D270E8930B0B691A3B9C39B78BF30
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Norfolk) {.. {-9223372036854775808 40312 0 LMT}.. {-2177493112 40320 0 +1112}.. {-599656320 41400 0 +1130}.. {152029800 45000 1 +1230}.. {162916200 41400 0 +1130}.. {1443882600 39600 0 +11}.. {1561899600 39600 0 +12}.. {1570287600 43200 1 +12}.. {1586012400 39600 0 +12}.. {1601737200 43200 1 +12}.. {1617462000 39600 0 +12}.. {1633186800 43200 1 +12}.. {1648911600 39600 0 +12}.. {1664636400 43200 1 +12}.. {1680361200 39600 0 +12}.. {1696086000 43200 1 +12}.. {1712415600 39600 0 +12}.. {1728140400 43200 1 +12}.. {1743865200 39600 0 +12}.. {1759590000 43200 1 +12}.. {1775314800 39600 0 +12}.. {1791039600 43200 1 +12}.. {1806764400 39600 0 +12}.. {1822489200 43200 1 +12}.. {1838214000 39600 0 +12}.. {1853938800 43200 1 +12}.. {1869663600 39600 0 +12}.. {1885993200 43200 1 +12}.. {1901718000 39600 0 +12}.. {1917442800 43200 1 +12}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):326
                                                    Entropy (8bit):4.531117764974758
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/JcSDm2OHTYoHgnX2czO/FxgV62JFy:MB86JcGmdHTYCgX2czUjgM2ny
                                                    MD5:2F1E92A11DF44C72DC305C13111DEA35
                                                    SHA1:847F551C3D6C75CD2D0D6D87FCF3294CA8DD90B2
                                                    SHA-256:238683C027D2319C33D975A837E9FC9D24DD53B1A67108EDBF7ABDF0DB050881
                                                    SHA-512:E35D8C71AFDBB9A7507E873925001AEDE3734B1D235F509D19952E85279CBCC233A73412EA1F79CB534A45D36FEAA8AFDA98D9964DC93C7892B318F4AFC9A076
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Noumea) {.. {-9223372036854775808 39948 0 LMT}.. {-1829387148 39600 0 +11}.. {250002000 43200 1 +11}.. {257342400 39600 0 +11}.. {281451600 43200 1 +11}.. {288878400 39600 0 +11}.. {849366000 43200 1 +11}.. {857228400 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.985607855830399
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHurKeTFfXMXGm2OH2ivkeoHvUPi1TsYoHsdfWTVvvVFv:SlSWB9eg/XecDm2OH23eoHvWieYoHiWB
                                                    MD5:E86D90DAA694B0EAC42F8C01346BC95B
                                                    SHA1:CD29DEFC291C939296E86DC7EF5D0654D85285E8
                                                    SHA-256:CCA96640AB3BC707224FA86D9AF66F9D53A204A97B370B2785BA8208688BF8B6
                                                    SHA-512:937BA420061E3781F831779B458E914A0FC465C4B41796F8B7CB1E548822F5777A6450FC6002AB13EBC5C9F54E374D3ED731D05B2B302B95359BE34094E5062B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pago_Pago) {.. {-9223372036854775808 45432 0 LMT}.. {-2445424632 -40968 0 LMT}.. {-1861879032 -39600 0 SST}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):183
                                                    Entropy (8bit):4.919381181565273
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHugEZF3fMXGm2OHKvkeoHucRbgnJnoHvmdQ4+vScFAy:SlSWB9eg/Xg2PDm2OHK8eoHTWJnoHvmi
                                                    MD5:2E6C7EC61C7E29A147475C223B163F6B
                                                    SHA1:3A98D3441335224E7EBC0648990BCA1DE3BDF5C6
                                                    SHA-256:97DE6C2C717BFEAD00F83B5D39D654C32CEE580226F5F084484EBAD57BBCE7FF
                                                    SHA-512:5868C43966DDEBA8EC4BBBB29CDFDDFF0C7B01FD4D579FF655F3363029059F969B39C9221190672B6A2F7938583594AA0B103FC2A7ED573E2BC1C3A1623DE8DD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Palau) {.. {-9223372036854775808 -54124 0 LMT}.. {-3944624276 32276 0 LMT}.. {-2177485076 32400 0 +09}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.809907977056877
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuQTWLMbNMXGm2OHUVFvoHvmXUlgloWkcyf/vGpn:SlSWB9eg/XQyLMJDm2OHUVVoHvmXUKm2
                                                    MD5:3F4987676F9C461895EDF9985AD22E06
                                                    SHA1:A96E470209010B837EF5BB3AC93BAE74BF2CCF64
                                                    SHA-256:5D363729A986E24C79F4B817CC88D2B22ACCCE3ADD20138D51C4422C4297AD6F
                                                    SHA-512:988FB98EFD3F57F5D66A932CC6B9D0387E9B0951FC590E08DAF19ACF5E4F39BC1B25265F16E14930BCF394902F5F0EF507E0E91C98902DFB10FA16D716091AB0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pitcairn) {.. {-9223372036854775808 -31220 0 LMT}.. {-2177421580 -30600 0 -0830}.. {893665800 -28800 0 -08}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):338
                                                    Entropy (8bit):4.55704384204571
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9eg/XyiDm2OHANgYoHT6WKNoHvmScHwzvScHoVv3HKnOjvScHb0Zzy:MB86C2mdH1YCT61NCvfcHwzHHI/HKOjX
                                                    MD5:497B7BE4CE7A51C19CE7D4DDC3109281
                                                    SHA1:5ED794E3B95A99CF1B9520174A15396A3A8ADF28
                                                    SHA-256:88D62B644BB96A9318427B4CA56DB37C8217DA449328C801ED77007BE9420F9C
                                                    SHA-512:2E0898F7135E1634298BD5DE73F129433F9DA47E6F08E5A58D83A4DF4F6FC0F54B6FC2660B0EE4C13561A925841B160B893D4A21A0622125D2E3DC66883C5080
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pohnpei) {.. {-9223372036854775808 -48428 0 LMT}.. {-3944629972 37972 0 LMT}.. {-2177490772 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 39600 0 +11}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.786230343954939
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGuySeyXHAIgObTuyoAFARL/nUDHu3HppUDHuyB:SlSWB9vsM3yciySeSHAIgObiyJAN/X3y
                                                    MD5:D32F290A7020C13D7A130A0548112B02
                                                    SHA1:314877B3C316D7BD9962DE18A9D57A59556E0D95
                                                    SHA-256:EDC43EF78691A1B22D111BC4390EA442B893E61771A6FD76BDAE1D46C5904C0C
                                                    SHA-512:9054C22EA382CACE946FE08F0118E2A4120DE4FF1F3FA908869E4BFA20D2DF8AED0DD5F169871BD09743563639F6E24C7DB8BBFB3A7268DE15DB7CCAFE622192
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pohnpei)]} {.. LoadTimeZoneFile Pacific/Pohnpei..}..set TZData(:Pacific/Ponape) $TZData(:Pacific/Pohnpei)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):190
                                                    Entropy (8bit):4.945354510868153
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuwKXI3SMXGm2OHwdvoHvZUeQTnoo3v/vnqMVVMUMy:SlSWB9eg/X/43SDm2OHwdvoHvZZQTnoQ
                                                    MD5:2CFB7C2A3D26D7AF0F6AE32ADD81C364
                                                    SHA1:80C96E50D23A9A9531E4EE33744CF445C054B901
                                                    SHA-256:124C137B091D9D54D5E0579131485428FAAE040ACC978D20D6A8C8E4DE9889AA
                                                    SHA-512:A215FF5A69BD3E786BD3F8C952C8593396402EFA85005F5342093028617A6862EAE8BFD7B6D5737F90D90897AB62CF785544A4157A222AE4D0F70797FFBEC2CB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Port_Moresby) {.. {-9223372036854775808 35320 0 LMT}.. {-2840176120 35312 0 PMMT}.. {-2366790512 36000 0 +10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):969
                                                    Entropy (8bit):3.943959457262612
                                                    Encrypted:false
                                                    SSDEEP:12:MB86VrjmdHI5Cvn9HCFkN00hjNFq++UE+q0hwA+A7VxVnDEFn:IeZv8w0MNFq+xE+uAtx1c
                                                    MD5:64AD3A103F4D145C48484BF8FACF41C2
                                                    SHA1:40C00CFA56C87E506C254A93A164D7227DFF3BD5
                                                    SHA-256:5AB006A686E564E30C94884FF8A9D728AEC74681DA8772E9722B6FE203630B5D
                                                    SHA-512:D1088C3B673B5456A8706B69BE4D7AB18615EE53A82BF4ABE76E86700837E6BAD0BD79C13EDA9B04776B08A95B835BA755AA565F86E45BFE507E8783896C1EE2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Rarotonga) {.. {-9223372036854775808 48056 0 LMT}.. {-2209555256 -38344 0 LMT}.. {-543072056 -37800 0 -1030}.. {279714600 -34200 0 -10}.. {289387800 -36000 0 -10}.. {309952800 -34200 1 -10}.. {320837400 -36000 0 -10}.. {341402400 -34200 1 -10}.. {352287000 -36000 0 -10}.. {372852000 -34200 1 -10}.. {384341400 -36000 0 -10}.. {404906400 -34200 1 -10}.. {415791000 -36000 0 -10}.. {436356000 -34200 1 -10}.. {447240600 -36000 0 -10}.. {467805600 -34200 1 -10}.. {478690200 -36000 0 -10}.. {499255200 -34200 1 -10}.. {510139800 -36000 0 -10}.. {530704800 -34200 1 -10}.. {541589400 -36000 0 -10}.. {562154400 -34200 1 -10}.. {573643800 -36000 0 -10}.. {594208800 -34200 1 -10}.. {605093400 -36000 0 -10}.. {625658400 -34200 1 -10}.. {636543000 -36000 0 -10}.. {657108000 -34200 1 -10}.. {667992600 -36000 0 -10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.854594370903023
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG5RFeyXHAIgObT5RV5RL/nUDHtluKpUDH5Rgn:SlSWB9vsM3ycdeSHAIgOb7N/vKbn
                                                    MD5:EFC985F07B24BEDA22993C9D0EA7E022
                                                    SHA1:6D05D12925621F1D05999A5DCC81B8C6F4D18945
                                                    SHA-256:4F6A1C20A11E186012466091CD4B3C09D89D35E7560F93874DEC2D7F99365589
                                                    SHA-512:5FB4D8784D2EB8AEF660D6CBC7C403561EE5874BEC0439762F3688C64830B52B1F557B467CA65B64B1210E82F385E134BF676F3CA443FB480702A2C90B3C3757
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Guam)]} {.. LoadTimeZoneFile Pacific/Guam..}..set TZData(:Pacific/Saipan) $TZData(:Pacific/Guam)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):193
                                                    Entropy (8bit):4.78073436515702
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHthA5nUDHurK:SlSWB9vsM3yciemHAIgObiecN/NXevn
                                                    MD5:8E335F5D0A2082BB673E7FEB56167A89
                                                    SHA1:EF37235922D4477AC9B3D9576888CDE41E700741
                                                    SHA-256:98D06302EFC18FAD7751F7E5A059FE4ABAFBC361FDC365FE1EB576209D92C658
                                                    SHA-512:2572D99EE8BAF264B8A2EF3D7647D33A387EE83E036F9E7BDB21F64C2FCB43317AF9C899C8CDD822A2A5A207EF17504E71B217370473ED95AE925BBA2CFA90F9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):154
                                                    Entropy (8bit):4.946903999617555
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqhFPMXGm2OHl/oeoHsdNqRU7vV:SlSWB9eg/TTPDm2OHloeoH4qRW9
                                                    MD5:341B0F535043051A91A21297BFA39DC0
                                                    SHA1:6AD9177FC237503E6D36DE5408790A68D5D36E2C
                                                    SHA-256:440A87DDB4F304DCBEAED1B0DE8F6058840E597918B688E0782F584DA03B1BBC
                                                    SHA-512:D97D399A0F1B4347F8AE5F15E43A8787697339AB0EFB4E1106C790528FFC529ADC5B44B231D95449D39DB464D84A5DDF7B61E7D190E3E2B0091D1EC204B530A2
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tahiti) {.. {-9223372036854775808 -35896 0 LMT}.. {-1806674504 -36000 0 -10}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):152
                                                    Entropy (8bit):4.969953728206455
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqQ3fMXGm2OHyyFpoeoHvmciRrWFN0UIoAov:SlSWB9eg/T+Dm2OHyyFGeoHvmbu0YAov
                                                    MD5:AA67FBBB6A02F5B30486C54E3A5C11D7
                                                    SHA1:C64FD3654A47A0ECDD681B8A4D9B621AC6D97DBE
                                                    SHA-256:91AA5DA8D5D1E72B1F561D0AEAB4B07E02EDD4EB95AE8C9F1C503C820460599F
                                                    SHA-512:FC170904098011C091622A263CA554CEE952D64888D3573EB324E0A262E1A0C0885C059429F0FFF9219FEB8F1B6B97EC34661DD8DD547124D0C6C0A1C8EE24B7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tarawa) {.. {-9223372036854775808 41524 0 LMT}.. {-2177494324 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):451
                                                    Entropy (8bit):4.343299747430587
                                                    Encrypted:false
                                                    SSDEEP:12:MB86PmdHmCdC/V7XZXw8Ut2rbUtGiAUtb4bUtqVy:iemn/VbKeOSy
                                                    MD5:87CFDA2399A8126117E5BFC018B06518
                                                    SHA1:6291611BCFB34293F9C20BA77170A13C1502C2ED
                                                    SHA-256:ECC9D2E7AD7B5E5D6599CF442941595C99C4D69E802A4DDB4DA321898CDDE91D
                                                    SHA-512:846FE07FEB82EC5F87FAE137D23074934246DBB7C7EE30F44F6C5373183B5FD2211B58E5CF1AB9A47938D282CA322FBDE80B58054FE6517CDC549992439F19A8
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tongatapu) {.. {-9223372036854775808 44352 0 LMT}.. {-767189952 44400 0 +1220}.. {-284041200 46800 0 +13}.. {915102000 46800 0 +13}.. {939214800 50400 1 +13}.. {953384400 46800 0 +13}.. {973342800 50400 1 +13}.. {980596800 46800 0 +13}.. {1004792400 50400 1 +13}.. {1012046400 46800 0 +13}.. {1478350800 50400 1 +13}.. {1484398800 46800 0 +13}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.913386161054243
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9CoveyXHAIgObT9CuYFARL/nUDHqAOsvUDH9Coy:SlSWB9vsM3yckGeSHAIgObkXFAN/TAO2
                                                    MD5:643A77CAA5D7E031418C150A2D114BC4
                                                    SHA1:BE00B59D7AEB6AAB871D87A1C6243233833C4539
                                                    SHA-256:BDD8C779AF9D671AD7F20832FFF8EB3B25C9989A619C23337743F112FF4C8764
                                                    SHA-512:1CC7BFC35FB4FFE9517F0E6C9CA52E4FC71BFBA9E85F77773E490BCB3EF5F0C041E3C24A08A9A39F749161AB6F4027F703A254CF6158C1AC31E9CFBDBAAA2A45
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chuuk)]} {.. LoadTimeZoneFile Pacific/Chuuk..}..set TZData(:Pacific/Truk) $TZData(:Pacific/Chuuk)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):150
                                                    Entropy (8bit):4.981440234973766
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHpDFNMXGm2OH4VkxYoHvmcDVv0UIoAov:SlSWB9eg/8Dm2OHYkxYoHvmyv0YAov
                                                    MD5:11F5DFD4F782517FAEFBB7D7FEF3CED6
                                                    SHA1:B511E65FCB17E8910E347DE1C94B5BCF1A9A6081
                                                    SHA-256:2D18D9AB10C9D8947A88D486D0BC0B0523049A2ED2CA2FBDFA0577E40F189D13
                                                    SHA-512:0F72C4ACF54758B61ECC4584B86C0257178D0A82C98076C56B417DC4D0CB6743FD1D47E5DBC5EE9635E8297704C86F6841DB4704706C96F89F47D0CE55883230
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Wake) {.. {-9223372036854775808 39988 0 LMT}.. {-2177492788 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):152
                                                    Entropy (8bit):4.977211872736631
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QF08x/nUDHpEYdNMXGm2OH3UPoHvmcCRQH0UIoAov:SlSWB9eg/tiDm2OHkPoHvmiH0YAov
                                                    MD5:DA5CFD5BFC06355B732CAFB11B2BBBCA
                                                    SHA1:5AA3838C8799CE33D261331971E42494E2A88041
                                                    SHA-256:A3D83E6C504EAC75C4CD87B696F0DF2703D0A78DF27D8B1FAC161ACB07F2A9DE
                                                    SHA-512:95444BDD838DAF8C4B70BFE0345C7437DF5E1FA8BF3C8E4AD43C3F9887B2B4A1885E8EDDBE5EF7306BEBFBF597A662603001A5EF4144F204A6EDAB9A5D671EC0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Wallis) {.. {-9223372036854775808 44120 0 LMT}.. {-2177496920 43200 0 +12}..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):179
                                                    Entropy (8bit):4.935135597072032
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9CoveyXHAIgObT9CuYFARL/nUDHnHPUDH9Coy:SlSWB9vsM3yckGeSHAIgObkXFAN/eBl
                                                    MD5:BF20184F9BBBE1E43490F93E97DA202D
                                                    SHA1:D44B0A82DCE2131BDB52BFE70B8B59F412551B52
                                                    SHA-256:E348A2D02966CF9599B5F6F1F5B6C3412113DEF548BD322F0C22376106E12D92
                                                    SHA-512:C1BA813BB3F8628866C1042669051C2763FD2B13CA724CB91F0BEC0CF97D77FFF353157036C789D3589238D7FC013FB61248356CFB8D14C54D9EE525AF2D1331
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chuuk)]} {.. LoadTimeZoneFile Pacific/Chuuk..}..set TZData(:Pacific/Yap) $TZData(:Pacific/Chuuk)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):174
                                                    Entropy (8bit):4.940195299412468
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVqEGIV5XHAIgoqpEGYvWARL/nSi67x/yQa0EGIy:SlSWB9vsM3ymc4HAIgocVAN/27x6qF
                                                    MD5:E6AA2F6A05B57AA9B4AEF8E98552EEB2
                                                    SHA1:22470C204152702D8826CA52299E942F572C85ED
                                                    SHA-256:C27E1179B55BF0C7DB6F1C334C0C20C4AFA4DBB84DB6F46244B118F7EAB9C76E
                                                    SHA-512:B28A264907C32F848D356FB0F5776C2CE819DCB6BC08A5E2DCD4FA455EE1616966E816748079C7A55485BABFFB292D567E6F958168F945889E33A267B0E7EDA9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Warsaw)]} {.. LoadTimeZoneFile Europe/Warsaw..}..set TZData(:Poland) $TZData(:Europe/Warsaw)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.9353841548970205
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxMvLS3vXHAIgoqyMvLL6RL/nM24h8QavMvLBn:SlSWB9vsM3ymvMv2PHAIgovMvH6N/e8i
                                                    MD5:7D7BD6E40D3ADCA04754255D69B5CC9D
                                                    SHA1:EE32167B450DE7B0F1A15199795AEF9524BE623B
                                                    SHA-256:EFD666F3062D52C5D0B4F83B1A206E6840C1EAEC356CD77A0A71C7EDFA78C964
                                                    SHA-512:6056AAF078316A89079D19555F0BAEFB4C1CDBAA5426A8BEE76E0BFA5C69A5DAAFD199DEF978ABD67287AE1B80F754B7845EAFD5CC0995FE10E44D1F34D5435C
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Lisbon)]} {.. LoadTimeZoneFile Europe/Lisbon..}..set TZData(:Portugal) $TZData(:Europe/Lisbon)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):165
                                                    Entropy (8bit):4.795776391333205
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qMveyXHAIgNqBLFARL/lOr4WFKfMy:SlSWB9vsM3yKMveSHAIgcBJAN/S4wKfB
                                                    MD5:C5AE3A1DAD32C870651C74E367F604CF
                                                    SHA1:9FF81383C43D98441841E182BC783381EF565204
                                                    SHA-256:9AEC39777013B23D63D0509EBB2F01D57A2C1592264DBB19CE2C61C7D7DDD8DE
                                                    SHA-512:3A7217ED885011972262B71DB7F5D7E4C9C6E82B4BEEF0718BCB9452E49FDBDD5ED78564156577AB09150140B862E1944B4B739BCE0C50E63667050C35329503
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Taipei)]} {.. LoadTimeZoneFile Asia/Taipei..}..set TZData(:ROC) $TZData(:Asia/Taipei)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):4.900717350092823
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ZQckovXHAIgNtvQMHRL/lmFeWFKKQ7:SlSWB9vsM3yJJHAIgbHN/pwKv
                                                    MD5:59E4C80F97FAFC92987B08BFA03B5EE5
                                                    SHA1:4F86FCE17A51C3789DEB887BE01A1A0E6EA3D2DE
                                                    SHA-256:63153B40225270ADB7CD248788CA9F18C6DEBAF222B3165BBAB633337592DF44
                                                    SHA-512:9FCC0F747096775D0FB8DD252A73E6F47C16BF2D7DB0C3FBDFD206EE57393276FB40F65C1441296AE2AC115CFEE11098474DF3FEF8EE1FABE139427A8991F052
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Seoul)]} {.. LoadTimeZoneFile Asia/Seoul..}..set TZData(:ROK) $TZData(:Asia/Seoul)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.85623787837429
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq801c3vXHAIgNtK1tyHRL/kZ8O5h4WFKf1z:SlSWB9vsM3yUgHAIgWv6N/kth4wKf9
                                                    MD5:5EABBAAF3B29B5DFF9E54136F7ABC654
                                                    SHA1:44615F03264012D97512F9AB386413DD72BE1090
                                                    SHA-256:B9443FB17F0128DDB9F2DF657DC5D2DF176F64C61B0D02B272E5DFB108537678
                                                    SHA-512:B930D637A1E69E0847ADDEAB013B2C25BC27EBB9CDF20B9CDDFDAC111E9F26BB5EBC83194E845ACC3E1B9A08C386C94FCC4FDE32292EB558E3F7463832BB38B9
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Singapore)]} {.. LoadTimeZoneFile Asia/Singapore..}..set TZData(:Singapore) $TZData(:Asia/Singapore)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):201
                                                    Entropy (8bit):4.996391010176349
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3y7p5oeSHAIgppON/kjx+90ppv:JByMYbpwt8+90b
                                                    MD5:1AC81E2C60D528A6C5BF2E6867146813
                                                    SHA1:73D2D24FE6D56CA34ABF11B9A95DC22F809C5158
                                                    SHA-256:978C4E5256057CE7374AD7929605090FC749B55558495BD0112FB0BB743FA9C2
                                                    SHA-512:DB2673FB54C1308BBEB298A186F9130FB9090CE33B958C82D62B9BD88EE39BAB9A1BE40645547BA4167FD475892A323CF8EBA16C97F6FDF5693F1BF7A313FE9A
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:SystemV/AST4) $TZData(:America/Puerto_Rico)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.9470542553730255
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/kRDwh4IAcGE2NEOyn:SlSNJB9vsM3y7UEOXHAIgpUEqA6N/k+H
                                                    MD5:2AB4B896957F26B114A990F69989F3FB
                                                    SHA1:8048C99F5EE02C021F311709B30EB28D650D884D
                                                    SHA-256:0114C111F5BCD838A28F2E16E01ECB79D8AFC8CBF639A672889ED0D692FC6CDC
                                                    SHA-512:353744359CD94B1E8184A8B83F762459C69D3AEEA43DA638C1F4CC34E01E9D86C2EBCF7F7BFD059CB23B64051510D1C4556A49D180F8A92DE8449139194DCDC9
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:SystemV/AST4ADT) $TZData(:America/Halifax)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.957831162100758
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/kR/eIAcGEsAzEpv:SlSNJB9vsM3y7hzi2HAIgphznN/kc90q
                                                    MD5:3EC0B09EAB848821D48849673B24401C
                                                    SHA1:41599CBA78E124A7DA9744D2B4EA8CDC10008E0B
                                                    SHA-256:30428B85B37898AD98B65BE5B6A8BD599331D9A1B49605FC6521464228E32F8F
                                                    SHA-512:9A3303B3338C01B281A40BB48B93C446ADB92BBDC45371667F09EDA92F9EE2AEC60CE8E98CE15C0112B823799C76AEF14895B15DC997DA506494D75BBE58D662
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:SystemV/CST6) $TZData(:America/Regina)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.975428048518589
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx096yXHAIg20961yHRL/kRwx/h4IAcGE967:SlSNJB9vsM3y796SHAIgp9616N/kyxpQ
                                                    MD5:D85CCC5EFAA1ED549D02F09A38A53C68
                                                    SHA1:642ED571E4C6F60A953D42DA4F756F2262E4E709
                                                    SHA-256:44BEF7D4660A9A873EB762E3FDC651D31D97893545DE643FA1B2D05991C090A1
                                                    SHA-512:3CC6A14A17EA4833958A7D444073D6C2709FD61BF54387E5C362151E9143F795B2432B621080DD53E0FC9BDD7C58F406E046E3D0A2BBA4132D99E7C705E6D645
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:SystemV/CST6CDT) $TZData(:America/Chicago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):4.928128138328689
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3y73G7JHAIgp3GZRN/kkp4903G8:JByMY3G7Kp3GntVp4903G8
                                                    MD5:506D15E2F37F501F5A592154142A5296
                                                    SHA1:5ACA12E0BA0FFF9734ED978A9C60AAA9D1E05A59
                                                    SHA-256:798F92E5DDA65818C887750016D19E6EE9445ADFE0FCB7ACB11281293A09C2C7
                                                    SHA-512:2EE08D39461CAD3492BE88B421BA463B4CEB8497F036518794BCF605F477057FEA218A9DFBB6335A28A5120750EA06AED9D2EA84CD0007D34CDE562DCD79CC0C
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indianapolis)]} {.. LoadTimeZoneFile America/Indianapolis..}..set TZData(:SystemV/EST5) $TZData(:America/Indianapolis)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):5.113680059406992
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3y71RHAIgp1aAN/krp4901Yn:JByMY4pltw+90q
                                                    MD5:AAD8EF3067E97785D4052B80F5C4ACE1
                                                    SHA1:3EF0A06FCC41119F4A60A32CED0E5A1E0E8B4300
                                                    SHA-256:D159140114A13C69F073CFE9AD0B67D713E8811CBFF773A3D1681FC38EA0E699
                                                    SHA-512:A8774ADF6818D85476A6C147A45E55B338F413CD9B61BF9FDB0CB7A335C0CE8F8C6D1970783FEFECC2CE18388DF91304CB295BD4DFD29FB538D74F6A414A441D
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:SystemV/EST5EDT) $TZData(:America/New_York)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):193
                                                    Entropy (8bit):4.9733028894475195
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3yc6e8SHAIgOb6eKAN/kQmrheo:JByMdniinbtRTo
                                                    MD5:458061B3F3C8F06C61B5726393A26BA2
                                                    SHA1:E894F5615654D1110C9964B8F6A54C048442D8EB
                                                    SHA-256:BF62C8650BBA258000F62F16B0C7CBB66F4FD63F8CFDAF54273BB88A02A6C8D6
                                                    SHA-512:6A161A7AE44CBF8CE4C704C94456A5B714AAF2A3FAF30731254C9FE056F9DDF207119D516CC6A4C44AE76EC078F5C59F5EC6DD6701FAA3A36F061AF3953B7C7D
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:SystemV/HST10) $TZData(:Pacific/Honolulu)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.999038624718282
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/kRgFfh4IAcGEuto:SlSNJB9vsM3y7OBHAIgpONYyHN/kch4y
                                                    MD5:B06AB4998A57446FC4D5A5B986BCA0A9
                                                    SHA1:5E4A28466383CBAB2067B9B6D22882CF6D83C3FB
                                                    SHA-256:FEBE49FAE260E5595B6F1B21A0A3458D8A50ACA72F4551BF10C1EDB2758E0304
                                                    SHA-512:9E44174C4E348E1B768039585BA6393FD001B606E111092EEC57C75210A1E87BF3C72728321945D584CA60D4C848D88EB8B2F82CB88F38F90224A43FDCFEA9AA
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:SystemV/MST7) $TZData(:America/Phoenix)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.956231227702093
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/kRMMFfh4IAcGE6RB:SlSNJB9vsM3y7+SPHAIgp+ON/kD490+B
                                                    MD5:5D3C1ADB8AC4EAC9E9A31734CD6884BD
                                                    SHA1:535B024EA088B9B192BE4206CBDD56BC5B163762
                                                    SHA-256:64556A7B20E425C79375C2A7CCF72B2B5223A7DE4FF4C99A5C039DB3456C63F6
                                                    SHA-512:FB799A42880613752AD6010D7B4E97ACCF7F6AE281D9A37057F6423AEF2607B608DB2AC52176F1653D8B2D086223C9658B101E73125F0FF7D6D9E8CD876EEC53
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:SystemV/MST7MDT) $TZData(:America/Denver)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):4.831981174214766
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQGuQTWLM4YkovXHAIgObTuQTWLovFvHRL/kRQB5nv:SlSNJB9vsM3yciQyLM4YJHAIgObiQyLQ
                                                    MD5:B568B46A0207800D9C022BAB1E48709B
                                                    SHA1:71CE3F0E75E440D5BBA219BCBB92AF9C1F5A7466
                                                    SHA-256:0B8227AFC94082C985E8E125DF83E5EFADE7CD9CA399800D7B8E8B2BEAE22C7D
                                                    SHA-512:5067AAD0CD02EBDECA6980F9C7CCC80D076C34D6463C5B6B19B678D76B5E69C1C3639D046F56FE9D6255CBEA49189EDD735F66AD9EE2CB0389BE020E7ED3AD50
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pitcairn)]} {.. LoadTimeZoneFile Pacific/Pitcairn..}..set TZData(:SystemV/PST8) $TZData(:Pacific/Pitcairn)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):204
                                                    Entropy (8bit):5.003766957083974
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3y7DvPHAIgp5N/kQ1p490Dy:JByMY8p5th090W
                                                    MD5:7E587175CA0F938C47FA920D787C57BD
                                                    SHA1:C3F7D8576C0AC74D6B70F4363EE2C174FADC70B0
                                                    SHA-256:D51D9549835E9C058F836C8952932CB53C10F7F194CD87452E9B13494D1C54C9
                                                    SHA-512:4460686AAA470F07A6DB1F8957FA4DB600E116273497F46E8A2D3FDECF622122DF753556B78C39FA2ADFDB2AF3C3ABB3C330ADA79B35C6A3CD8C498A0319CEE6
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:SystemV/PST8PDT) $TZData(:America/Los_Angeles)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.9524733332469095
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQG5hB5WXHAIgObT5hByY6RL/kRKlUDH5hBpvn:SlSNJB9vsM3ycT2HAIgOboN/kNv
                                                    MD5:5970A466367825D72D9672293FCD4656
                                                    SHA1:1A736D61A6797295EEC8C094AED432171E98578E
                                                    SHA-256:55710EFDED5B5830B2F3A2A072037C5251E1766F318707ED7CD5EB03037FED43
                                                    SHA-512:1F2A1B2A7D0A3E410652546C174D9EC18C91C9327F11C384A0AA1EB12D7EFE85C4D53CA3C2A6C347C0068A4CE92A3138EB17232B0DEC88D52465C5DEDEEE6827
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Gambier)]} {.. LoadTimeZoneFile Pacific/Gambier..}..set TZData(:SystemV/YST9) $TZData(:Pacific/Gambier)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):198
                                                    Entropy (8bit):4.994125896811442
                                                    Encrypted:false
                                                    SSDEEP:6:SlSNJB9vsM3y7/9EtDSHAIgp/9Ef6N/kB490/9E9v:JByMY/947p/9XtN90/9s
                                                    MD5:560B18DFB138DAF821CFDAE017B94473
                                                    SHA1:0BB0312C742CC0097DF033656AE3D10723035C30
                                                    SHA-256:DA20018DE301F879E4F026405C69FA0370EB10184FE1C84A4F1504079D5DAFA1
                                                    SHA-512:B1D4EAD5F549E319DAD55EE67DAFD732E755164748C08633AA8F07C280B2CF617380D6F886304142D0E4D50026E63678DACFBE2DC809F780BA4CFF35A90DE906
                                                    Malicious:false
                                                    Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:SystemV/YST9YDT) $TZData(:America/Anchorage)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180
                                                    Entropy (8bit):4.9295990493611495
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/jCl1yQaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/SymKv
                                                    MD5:1FABF2DFD4BFD0184AE22ED76F7569E5
                                                    SHA1:5859266B26357B4FCADD7EC65847667631E303EB
                                                    SHA-256:8471A5575B9D9E47412D851A18A26C4405480540AABC8DAED5F81BE0C714C07C
                                                    SHA-512:1DCBECEF6D1F923E6C9CEA70CB10F1FF4E453265966AA88FBC8739E93EF40F8A16AAD85AF4ECC5CC1E52F22F49E5D3F4EE01A97DE2302FC4FBC063FE814F3851
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Turkey) $TZData(:Europe/Istanbul)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):153
                                                    Entropy (8bit):4.844017562912325
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iGMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iP8RX
                                                    MD5:DA060D2F397C978E0842631B4EC73376
                                                    SHA1:649BC85430B04662BE079C0AAD43DF5D5D499D28
                                                    SHA-256:356A9BB6F831971C295CF4DCE0F0CDC9EDF94FD686CA3D3195E5F031A0B67CBA
                                                    SHA-512:3359BFC6F0837D2DA9D72DA8053773CE0C1A1B1A47C33163BF38965E2104F57BC147F9EEC228A3591B75BF1BA93285AB83E8427E8E2E697AB18501DC017B6E6A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UCT) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):189
                                                    Entropy (8bit):4.911775112130145
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/VXEtDovXHAIg20/VXEfovRL/iOGl0IAcGE/VXEN:SlSWB9vsM3y7/9EtDSHAIgp/9Ef6N/i4
                                                    MD5:4379C0BF618649AA07CC4BDAC75F62EF
                                                    SHA1:7813B54BF2BD0C40A39CA9A29CC50C6D034880A3
                                                    SHA-256:CED56F09D68BE00555219594C7B2F3E7EFE8323201FB3E2AA0E1FA9A6467D5AF
                                                    SHA-512:AC822061F5C9743120A66E11C02B199253A40460A87F78DC154B0BDD91E410EDDA581E889F5D2A74670939034F39A7F6C7E814E038A1371DAB71EF79A8911AE7
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:US/Alaska) $TZData(:America/Anchorage)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):176
                                                    Entropy (8bit):4.8886795125313585
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/iObMEIB/4IAcGE/y2:SlSWB9vsM3y7/yrHAIgp/yH0AN/itE8h
                                                    MD5:AB14CF1840CBDA2B326660DBD51273B4
                                                    SHA1:78144B3A2C75568307E4E86AE3B01EA7F541B011
                                                    SHA-256:A4F1398CF84D0AE09BF19288770756622D1710CCBFBFE79E0D3239497731287D
                                                    SHA-512:557A3ED9D1401E76291DC41524A1FD04AFF0829CEF66E103CEF9D10CD751F04FDEB6B7C0490302C71297F53AA8DC42930649AD274215D5DF068BCDE837E73756
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:US/Aleutian) $TZData(:America/Adak)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.9334626069754455
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/iQMfQfBx+IAcGEB:SlSWB9vsM3y7OBHAIgpONYyHN/iZfQfl
                                                    MD5:30ED80335BE37C7CBA672C33FDE23490
                                                    SHA1:B627E86F023FE02A5590FE8D55FF41946BE6D24B
                                                    SHA-256:9503403F231BA33415A5F2F0FDD3771CE7FF78534CE83C16A8DB5BC333B4AD8A
                                                    SHA-512:C1352612EC0B4FF2F6F279CDB6008D7E9DA7F94F0009EFD959AD3092393150ECA83A09E72C724E1A4BFC3A057B9218D54A87FFA1102E2D9BF058B78AC0A0B1AB
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:US/Arizona) $TZData(:America/Phoenix)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):184
                                                    Entropy (8bit):4.90255068822036
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx096yXHAIg20961yHRL/ibXgox/h4IAcGE967:SlSWB9vsM3y796SHAIgp9616N/iB490+
                                                    MD5:7770A6B85B2FE73BCCE9D803E0200F23
                                                    SHA1:784AD1082FF1569961C2AC44F6D6F7605FBBE766
                                                    SHA-256:B6AC9FAE0AB69D58ECFD6B9A84F3C6D3E1A594E40CEEC94E2A0A7855781E173A
                                                    SHA-512:EEE79D37D77E6B80B91E8F30CE48B107371F6A58F0C91785E3C74EF210AE1011D0EB913113F1873BE6099B0BE1260410F0C74650446CB377F8FDB5505A44F266
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:US/Central) $TZData(:America/Chicago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):228
                                                    Entropy (8bit):4.7645631776966715
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/i3E0903GK8:MByMY3GK7Kp3GKnti3t903GK8
                                                    MD5:96828B6BA17CA96723794F4B3744B494
                                                    SHA1:C3A824A925AEFE2A13A0E65548078D9842C2C7D7
                                                    SHA-256:5D86F8D36598516FB2342A18A87DB2701BABD265B0671CC9321C48DB22C7ECA5
                                                    SHA-512:2A27A455787DEAC3EC78A2784FB989DAB178E9D6DD7721CD3F5D3337231A3C651994B964D6CE040B7858E0127D7F70C0C48CB0D553D5B725B649C828288224B5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:US/East-Indiana) $TZData(:America/Indiana/Indianapolis)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):187
                                                    Entropy (8bit):5.0345860115708785
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wAy0vfXHAIg20wAyGWARL/i37oxp4IAcGEwAy0yn:SlSWB9vsM3y71RHAIgp1aAN/i37oxp4P
                                                    MD5:375DB249106C5D351CA0E84848835EDB
                                                    SHA1:ECC5C0C9DA68773B94C9013F4F1A8800D511CC4C
                                                    SHA-256:2FFCAD8CBEF5ECDC74DB3EE773E4B18ABC8EFA9C09C4EA8F3A45A08BADAF91A9
                                                    SHA-512:21550743BF4E1A79754F76AB201F0EB6BA6B265F43855901640054316A4A32A5D01D266B2441E4A6415720715A2ABD367D82E3D40949A7A66BE9F8366E47A8DD
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:US/Eastern) $TZData(:America/New_York)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):186
                                                    Entropy (8bit):4.88075715646936
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG2fWGYFeyXHAIgObT2fWKARL/ioMN75nUDH2fWWv:SlSWB9vsM3yc6e8SHAIgOb6eKAN/ioER
                                                    MD5:C0475756CFEC302F737967468804846E
                                                    SHA1:85C13CA0A908C69B8BBB6040FC502AFF96B8F8C7
                                                    SHA-256:529BB43EFDA6C1584FEAEA789B590CEF1397E33457AB3845F3101B1FC126E0FB
                                                    SHA-512:D3FF374443344E8438D50803872E8A8EA077B2299B38C1BD155386B4D2C6008BBD0C0B0B26DE9680812D4AFC9A187B644BDCCB04C23880337228BCEC06D5D61B
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:US/Hawaii) $TZData(:Pacific/Honolulu)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):206
                                                    Entropy (8bit):4.87340978435866
                                                    Encrypted:false
                                                    SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/iGIfh4903GKT:MByMY3GKDp3GKItiBfh4903GKT
                                                    MD5:00AAFD60A0B1146274981FAB6336AFD9
                                                    SHA1:20AD47ED52874202585C90FE362663F060E064D3
                                                    SHA-256:5827B6A6D50CF0FB75D6BA6E36282591AD25E1F0BE636DCFC5D09BDA29A107FD
                                                    SHA-512:61113AB72B7D671D7B429106709E73DB57D5B8A382680BA37A54126C7F54BC2D6B47A2584177CE6B434793546DA7EB9B8B7DF9163816DBFC67C83D9930D6A158
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:US/Indiana-Starke) $TZData(:America/Indiana/Knox)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.83459089067994
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06FQGFfXHAIg206FQJARL/iHaMCELMr4IAcGE6FQB:SlSWB9vsM3y74PFPHAIgp4KAN/iHaMHs
                                                    MD5:D955A5A943B203DC4B87A91ED196B82A
                                                    SHA1:C7ACC48AB2033C372C60C741F68B12FFAEA147DE
                                                    SHA-256:B4E4269C4FEBFEFF26750B297A590226C0A6872519A6BFDE36F6DC3F6F756349
                                                    SHA-512:445DC9A50487A4BA0A7F79078441696DCAA31F9988E5B515B5A827AC9275776B22DE303040900C1726EB99CABA8AD09E57AA674F798EA3FDEBC580E4B87D9439
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Detroit)]} {.. LoadTimeZoneFile America/Detroit..}..set TZData(:US/Michigan) $TZData(:America/Detroit)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):182
                                                    Entropy (8bit):4.892777905787396
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/iBOlLo/4IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/iBY8/49Z
                                                    MD5:E53EDD55E6448C624DD03A8A100EF5AF
                                                    SHA1:1D266553CAFA23A3375CFAF7AFE6636553CC7B70
                                                    SHA-256:3763BF520D3C97148C34DCFBDF70DEC2636D4E38241555900C058EFEE3BD1256
                                                    SHA-512:B7FCF01DBB4231F30FEFA77C339B2CD7D984D6E6182F3BD15D6B64AC9525994E7CBF90C3F1F520FD22B54E19831B3CBAE1C22F04F60244C0C60A1809942422A4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:US/Mountain) $TZData(:America/Denver)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):196
                                                    Entropy (8bit):4.932311644026309
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0ydJg4o3vXHAIg20ydJPyHRL/iP+e2IAcGEydJgov:SlSWB9vsM3y7DvPHAIgp5N/ip290Dy
                                                    MD5:37AF94FAB52D80AF32C766644892E36D
                                                    SHA1:03CE96A3B3EBFC16C9ED192DD2127FB265A7ED49
                                                    SHA-256:54E5F126D4E7CC13555841A61FF66C0350621C089F475638A393930B3FB4918C
                                                    SHA-512:405A7F414FA0864111E5E9F06FCA675BF4EF11FE0F82F5438416273BEF820A030A50E4D43E4E522ED79C08C0C243E9DD3692971DC912C9ADFB1BEABEB935CDDC
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:US/Pacific) $TZData(:America/Los_Angeles)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):200
                                                    Entropy (8bit):4.977247045064076
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0ydJg4o3vXHAIg20ydJPyHRL/iP+yoQIAcGEydJgy:SlSWB9vsM3y7DvPHAIgp5N/i0Q90Dy
                                                    MD5:870946B6C9C7C48EDDFDC7FEA5A303F5
                                                    SHA1:F4E86423BD0EDFFD07B69B6D8834E28890A433BF
                                                    SHA-256:B14C515D5823E7F6E4C67892FA376D54DB748FAB139C4D40DB50F22D113BAE4F
                                                    SHA-512:36071FA97BD1052FB0425FDA7239F55728B3A6ACDF78A7A8F92D080DA25C0DF432F6C2B0CE9BD296B0C814451C5D7922E1318B004D9089E934B9C81B5E6077D6
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:US/Pacific-New) $TZData(:America/Los_Angeles)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):188
                                                    Entropy (8bit):4.838968615416201
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/i6A5nUDHurKeTyn:SlSWB9vsM3yciemHAIgObiecN/idXevn
                                                    MD5:509CF35F5F7C9567FD19CC5C137DC070
                                                    SHA1:AA5F27D36BC617A6A4107E3CA0CB0C10A71A1D9E
                                                    SHA-256:E51FC51C65FFEAB514D7636271157EE8941BDACF602CBC380F5D60B5FA674E87
                                                    SHA-512:E23633A16F11015F3FE2F4E675B5A60B4FDC61F8CF152FDB9BA7ED4C213B8897117721A78C5470296DAFB0FD4F0DDC019DD0DB8C28C1F1B2BE0D3A289F53D5B3
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:US/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):153
                                                    Entropy (8bit):4.844017562912325
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iLB5h8RFB:SlSWB9vsM3yzTHAIgm6N/iLfh8RX
                                                    MD5:3402C8784654C24F7E956731866B833F
                                                    SHA1:C34F3CCA074A50E6564B8C78683C8763B37A3002
                                                    SHA-256:DEE28FF84E3FC495ED3547D5E5E9FAFDACC36A67329E747D434248ED45BF1755
                                                    SHA-512:FBA2840B0FA0F084EE9840BCF56E497F8A7ABF509FA10FA66FB26BA3D80079C4F9A363577A453CD68557080EAF9DD7F1F7B5AF957B64BDA2A897B1E08C85DD19
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UTC) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):159
                                                    Entropy (8bit):4.879221007428352
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iL7DJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iL7VMr8RX
                                                    MD5:5F24A249884C241D1E03D758C2641675
                                                    SHA1:63AAC15A68659006F8A14FEC3F2A66B55A8AC398
                                                    SHA-256:B7B0B82F471D64704E1D6F84646E6B7B2BD9CAB793FAD00F9C9B0595143C0AB7
                                                    SHA-512:A7AB5E26A2C23BA296942D7C524C6EE6708A9A38CDD88022EA92E2180BC3CCFE930758FC20A24A0D271AD70733EB924B0E530FBF83CC0FC49EAD411B28503CC0
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Universal) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):172
                                                    Entropy (8bit):4.999171213761279
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVwTwWXHAIgoqzTbNOARL/gIuyQauTgvn:SlSWB9vsM3ymSHAIgoXAN/gXy5n
                                                    MD5:5444E85070CA2E7A52D38D6D53216B88
                                                    SHA1:0F9A4FB1156312EBD0B9C81DA2164E89D21878E1
                                                    SHA-256:F7DA75B585F45AB501B2889E272FF47B1C4A1D668E40AED7463EB0E8054028C2
                                                    SHA-512:BBC94F98C84641392D3A4B67C152E92EDB3011DA329319ADB2485DBEAFD44DED328D80FBCA89E58687E1F0EB6BED8580BBB0075CA42284B6206A8641D76F2DE5
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Moscow)]} {.. LoadTimeZoneFile Europe/Moscow..}..set TZData(:W-SU) $TZData(:Europe/Moscow)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6945
                                                    Entropy (8bit):3.7806395604065135
                                                    Encrypted:false
                                                    SSDEEP:96:v6PgDGfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:rQbkIaFF1w0us4qE3+sSGjT
                                                    MD5:1EC38B05B53ECF2DD3A90164C4693934
                                                    SHA1:00900F0ADDB7526C63C67CA1662C038E95A79245
                                                    SHA-256:7E6E2369C19DD19A41BE27BB8AD8DF5BE8B0096ED045C8B2C2D2F0916D494079
                                                    SHA-512:47A8DAAB1B891FF09A94AF01B6673213392F70C6C1EE53D95A59D6E238FD06B0E80FA21C7279A9ADA891F5CA5B86E4D6B696EE8CFE14BFEF0ACCC9759AF1419A
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:WET) {.. {-9223372036854775808 0 0 WET}.. {228877200 3600 1 WEST}.. {243997200 0 0 WET}.. {260326800 3600 1 WEST}.. {276051600 0 0 WET}.. {291776400 3600 1 WEST}.. {307501200 0 0 WET}.. {323830800 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):154
                                                    Entropy (8bit):4.8800842076244715
                                                    Encrypted:false
                                                    SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/taFBURFB:SlSWB9vsM3yzTHAIgm6N/YFaRX
                                                    MD5:DDB6F69CA4F0EF6A708481F53F95EAB9
                                                    SHA1:A63E900A9257E9D73B4BB4BACBA8133C3D1DC41B
                                                    SHA-256:A06E8CCCF97CC8FB545DFDB4C89B5E5C8EDF0360547BDC1823B4AC47B1556C31
                                                    SHA-512:C8EA1039BE001F5EF52662B28DBF46D02E4848F08F05923850DEA1994732037B4C8D6030B742D97FA4276AF5FEE3F17C47C7DDA4F44DD23244F9976A076D5CC4
                                                    Malicious:false
                                                    Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Zulu) $TZData(:Etc/UTC)..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5030
                                                    Entropy (8bit):4.838527643033185
                                                    Encrypted:false
                                                    SSDEEP:96:HgTQWiZuhdFQJmuldFQofsGP3R1hF9Dl19arB0E9Dl1YoaEhHe2Gu/q1ZFyJRpqk:8iZUroxvR197ABr971h5GIqrmbqIc+b/
                                                    MD5:70450A0CF04EF273EFF2B070053FCFA6
                                                    SHA1:47974D6C0FC986EE1273C4E13DDB9E1288CEF0FF
                                                    SHA-256:678F891615E2209A8ECBA17857922A9723E78709ADB983032E89CA706000C44D
                                                    SHA-512:AFD3E47324D1497CC46AC6141191FCEB843977D0B0285C807FF8985DCC56FDE10977F57D503D986CD2C1EDC6C62F01E405A0EB483340B247B129FC8D6D9FE689
                                                    Malicious:false
                                                    Preview:# word.tcl --..#..# This file defines various procedures for computing word boundaries in..# strings. This file is primarily needed so Tk text and entry widgets behave..# properly for different platforms...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998 Scritpics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# The following variables are used to determine which characters are..# interpreted as white space.....if {$::tcl_platform(platform) eq "windows"} {.. # Windows style - any but a unicode space char.. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\S}.. }.. if {![info exists ::tcl_nonwordchars]} {...set ::tcl_nonwordchars {\s}.. }..} else {.. # Motif style - any unicode word char (number, letter, or underscore).. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\w}.. }.. if {![info exists ::tcl_nonwordchar
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1542552
                                                    Entropy (8bit):6.177696167346554
                                                    Encrypted:false
                                                    SSDEEP:24576:q1Bvnu8AyQD9FLi543GLUKuPO6EinYTVAiueFoC+vMvE58aVJkwd98ydeyRP/oAT:qIyQD9FU43GLUKuPO6EinYTVAFSvESaN
                                                    MD5:499FA3DEA045AF56EE5356C0CE7D6CE2
                                                    SHA1:0444B7D4ECD25491245824C17B84916EE5B39F74
                                                    SHA-256:20139F4C327711BAF18289584FA0C8112F7BB3BA55475BDED21F3D107672ED94
                                                    SHA-512:D776749EFFA241BA1415B28D2FCFF1D64ED903569A8C4E56DFDDD672A53B2F44119734B1959B72A9B3F4060BB2C67B7DEA959CC2D4A8E9F781F17009C6840FC1
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A...f...f...f..W....f..W....f..W....f..W....f.......f......f....&..f.......f...f..Lg.....f......f...J..f......f..Rich.f..........PE..d......b.........." .........~......|...............................................q.....`.............................................L@...[..|........{... .......j.......`...A...-...............................-..8...............8............................text...X........................... ..`.rdata...l.......n..................@..@.data................j..............@....pdata....... ......................@..@.rsrc....{.......|..................@..@.reloc...A...`...B...(..............@..B........................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8806
                                                    Entropy (8bit):4.863085192885279
                                                    Encrypted:false
                                                    SSDEEP:192:RpwYLapGk1BlM4UBIHpJFVUXUziMJ5Kxyk55qxUr7Vdk5vNR:RuYfvMdOXyj+01f
                                                    MD5:C5E9A2E32AE83A79DF422D1145B692DF
                                                    SHA1:08350F930FB97A95970122920C91FB9CED8329E9
                                                    SHA-256:8822365EE279BEBF7A36CFDEDBA1114762F894781F4635170CC5D85FF5B17923
                                                    SHA-512:71420E15A3D63329560074F6FFAD42CB464401284BC29D0DC8E34D83F8F77079F26BB4C5703E656A48E6931C3DBF6B873756FB212D0860483E0301B29EDE1212
                                                    Malicious:false
                                                    Preview:# bgerror.tcl --..#..#.Implementation of the bgerror procedure. It posts a dialog box with..#.the error message and gives the user a chance to see a more detailed..#.stack trace, and possible do something more interesting with that..#.trace (like save it to a log). This is adapted from work done by..#.Donal K. Fellows...#..# Copyright (c) 1998-2000 by Ajuba Solutions...# Copyright (c) 2007 by ActiveState Software Inc...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::dialog::error {.. namespace import -force ::tk::msgcat::*.. namespace export bgerror.. option add *ErrorDialog.function.text [mc "Save To Log"] \...widgetDefault.. option add *ErrorDialog.function.command [namespace code SaveToLog].. option add *ErrorDialog*Label.font TkCaptionFont widgetDefault.. if {[tk windowingsystem] eq "aqua"} {...option add *ErrorDialog*background systemAlertBackgroundActi
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21612
                                                    Entropy (8bit):4.947590677310969
                                                    Encrypted:false
                                                    SSDEEP:384:Tv7cBCAsj9oqlFFSsB3VfRt+lMpWaNwJgzCHarc6gAsj9oqlFFSsB3VlRtYlMpBz:TvweHBBTfIZxHBnZWqbJPBFIaVlCj26+
                                                    MD5:AEB53F7F1506CDFDFE557F54A76060CE
                                                    SHA1:EBB3666EE444B91A0D335DA19C8333F73B71933B
                                                    SHA-256:1F5DD8D81B26F16E772E92FD2A22ACCB785004D0ED3447E54F87005D9C6A07A5
                                                    SHA-512:ACDAD4DF988DF6B2290FC9622E8EACCC31787FECDC98DCCA38519CB762339D4D3FB344AE504B8C7918D6F414F4AD05D15E828DF7F7F68F363BEC54B11C9B7C43
                                                    Malicious:false
                                                    Preview:# button.tcl --..#..# This file defines the default bindings for Tk label, button,..# checkbutton, and radiobutton widgets and provides procedures..# that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 2002 ActiveState Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for buttons...#-------------------------------------------------------------------------....if {[tk windowingsystem] eq "aqua"} {.... bind Radiobutton <Enter> {...tk::ButtonEnter %W.. }.. bind Radiobutton <1> {...tk::ButtonDown %W.. }.. bind Radiobutton <ButtonRelease-1> {...tk::ButtonUp %W.. }.. bind Checkbutton <Enter> {...tk::ButtonEnter %W
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Nim source code, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9960
                                                    Entropy (8bit):4.802555950168837
                                                    Encrypted:false
                                                    SSDEEP:192:HKOdkMpU9YUp8UIhMYYicln9Die0luVZat3pIp5Y3sF1P8Bg8p6trIOzvKsOiCLU:HyMm9J8wPx70luex4C8Fygq6tohef+0J
                                                    MD5:818E4F0112931F12B4FAC4CAD262814C
                                                    SHA1:AC7060DF952F9DB52C3687B8F5E6AA4ADF06992E
                                                    SHA-256:35B208E8570B0D1E0CA1C911D4FE02EE3B0CFE5667CF1BDEC006CF9D043122BA
                                                    SHA-512:0C535B6621BC83412B7A64CB6AC2BA526B8E49BB5F6BC5EBEDA41D223D68DEB031DB9C8A31F8671BC5F327D720942E7FDAE3328334B0B550AC991191F96909D6
                                                    Malicious:false
                                                    Preview:# choosedir.tcl --..#..#.Choose directory dialog implementation for Unix/Mac...#..# Copyright (c) 1998-2000 by Scriptics Corporation...# All rights reserved.....# Make sure the tk::dialog namespace, in which all dialogs should live, exists..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}....# Make the chooseDir namespace inside the dialog namespace..namespace eval ::tk::dialog::file::chooseDir {.. namespace import -force ::tk::msgcat::*..}....# ::tk::dialog::file::chooseDir:: --..#..#.Implements the TK directory selection dialog...#..# Arguments:..#.args..Options parsed by the procedure...#..proc ::tk::dialog::file::chooseDir:: {args} {.. variable ::tk::Priv.. set dataName __tk_choosedir.. upvar ::tk::dialog::file::$dataName data.. Config $dataName $args.... if {$data(-parent) eq "."} {.. set w .$dataName.. } else {.. set w $data(-parent).$dataName.. }.... # (re)create the dialog box if necessary.. #.. if {![winfo exis
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):22112
                                                    Entropy (8bit):5.032169196169179
                                                    Encrypted:false
                                                    SSDEEP:384:lJGidpe3JQDUd6hgp6EQstzQf+a9DPbJ43/H//cO802UeeVnZmM6BA0kyVJv9Qpu:Gep6JCwQDPbWPaRCzTdMAe
                                                    MD5:89C6CABEB68B1A5318D88DD8444C3DE3
                                                    SHA1:C19C58EEC7FB5105A609C0896EDCC336C00E7F9E
                                                    SHA-256:E7AA73828A731DCC9541308AA53FF3CF550A0952FD42C4D86D831F87FB47CDCF
                                                    SHA-512:A49A96A2BFC0D1A8E4003526E7836B9968DAF2B4DA727B23B7E180B5472DD187AB409D2FDF233F2557BD0DC2B4FE57AA2DD57BC2BDCE90DD2B603F4BB74CF22D
                                                    Malicious:false
                                                    Preview:# clrpick.tcl --..#..#.Color selection dialog for platforms that do not support a..#.standard color selection dialog...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# ToDo:..#..#.(1): Find out how many free colors are left in the colormap and..#. don't allocate too many colors...#.(2): Implement HSV color selection...#....# Make sure namespaces exist..namespace eval ::tk {}..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::color {.. namespace import ::tk::msgcat::*..}....# ::tk::dialog::color:: --..#..#.Create a color dialog and let the user choose a color. This function..#.should not be called directly. It is called by the tk_chooseColor..#.function when a native color selector widget does not exist..#..proc ::tk::dialog::color:: {args} {.. variable ::tk::Priv.. set dataName __tk__color.. upvar ::tk::dialog::color::$da
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8690
                                                    Entropy (8bit):5.098389551322902
                                                    Encrypted:false
                                                    SSDEEP:192:u4R7+/gFw/MEN55fO7eyjt4bjC+gR8e3vwLln/+LVtUw0tXK4jA:u4l+/gFeMI55Xyjt4bjC+gOe3Ih/+LV1
                                                    MD5:ABF277E4F62423F4345B6AD65640B8C2
                                                    SHA1:E66A4E37D51C7827C9ACA449A42E0966AACBC8C8
                                                    SHA-256:C7DA292CCF5F413E599C3491C331FFD58CF273F8477FACB097E6F36CF1F32A08
                                                    SHA-512:AA9F75D7C5C915B5FCD2F454856D080D186AB9BA149DC139FEAF7F4AC3DC51E6769E138E3B1BE45B3FEC3AE744189DE44DB2B748F0628FF13E4E733B9CD68BD5
                                                    Malicious:false
                                                    Preview:# comdlg.tcl --..#..#.Some functions needed for the common dialog boxes. Probably need to go..#.in a different file...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# tclParseConfigSpec --..#..#.Parses a list of "-option value" pairs. If all options and..#.values are legal, the values are stored in..#.$data($option). Otherwise an error message is returned. When..#.an error happens, the data() array may have been partially..#.modified, but all the modified members of the data(0 array are..#.guaranteed to have valid values. This is different than..#.Tk_ConfigureWidget() which does not modify the value of a..#.widget record if any error occurs...#..# Arguments:..#..# w = widget record to modify. Must be the pathname of a widget...#..# specs = {..# {-commandlineswitch resourceName ResourceClass defaultValue verifier}..# {....}..# }..#..# flags
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):33942
                                                    Entropy (8bit):4.953820376776617
                                                    Encrypted:false
                                                    SSDEEP:384:jMpwGUC0zCLemVueuR3fS8X4rqU9ykVBjG+FUHyOnmTTRV+po2mBh6S5mDjbHqzG:jMpdUFzCLpCrI3vVBhjnD2jVfV/
                                                    MD5:B927A17A86D5E43606C93CC6F90A5A4A
                                                    SHA1:03C1005EA8FABA9055591D095674D85F64E5C154
                                                    SHA-256:9D023DBF3B0FCD25E13502B34F8BE63F64DA592FA612EBD31C08AF4AC27338D6
                                                    SHA-512:B4443C72A28A172B0E113089085EC5D663A84384EB31B56BE23E507B285065E8D8EAB4A1306352A01843C13D1B5B15FF05D7956B89BCF693363D68C5B8B48864
                                                    Malicious:false
                                                    Preview:# console.tcl --..#..# This code constructs the console window for an application. It..# can be used by non-unix systems that do not have built-in support..# for shells...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 2007-2008 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# TODO: history - remember partially written command....namespace eval ::tk::console {.. variable blinkTime 500 ; # msecs to blink braced range for.. variable blinkRange 1 ; # enable blinking of the entire braced range.. variable magicKeys 1 ; # enable brace matching and proc/var recognition.. variable maxLines 600 ; # maximum # of lines buffered in console.. variable showMatches 1 ; # show multiple expand matches.. variable useFontchooser [llength [info command ::tk::fontchooser]
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5988
                                                    Entropy (8bit):4.829498876074983
                                                    Encrypted:false
                                                    SSDEEP:96:qFR55woFFEciKwKClFEOTIhDHWyzaoj9zza7v0J7:qL55jiKwKCzTIhDbzaojhSG7
                                                    MD5:B2B3AA971D42FDBF92F13B45111EE1D3
                                                    SHA1:A74F2C2707463D6E209D0E0C96D75083AC6920A5
                                                    SHA-256:1C977052C1D8293CC5FE4198A538BECA9BC821AF85E76E4EEFBFB75B33CE8BED
                                                    SHA-512:146F658DA3E6E9176FA51C9836D7C1DCFC14E148A26B224155F6493C195A7FB20C2DC4EE21994E5A193B8DA8561C75374E830304F94F0C844E52AD829F6810D5
                                                    Malicious:false
                                                    Preview:# dialog.tcl --..#..# This file defines the procedure tk_dialog, which creates a dialog..# box containing a bitmap, a message, and one or more buttons...#..# Copyright (c) 1992-1993 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#..# ::tk_dialog:..#..# This procedure displays a dialog box, waits for a button in the dialog..# to be invoked, then returns the index of the selected button. If the..# dialog somehow gets destroyed, -1 is returned...#..# Arguments:..# w -..Window to use for dialog top-level...# title -.Title to display in dialog's decorative frame...# text -.Message to display in dialog...# bitmap -.Bitmap to display in dialog (empty string means none)...# default -.Index of button that is to display the default ring..#..(-1 means none)...# args -.One or more strings to display in buttons
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):18401
                                                    Entropy (8bit):4.982139840696722
                                                    Encrypted:false
                                                    SSDEEP:384:mDfyRIlBk3yrt8qLjtpa+qh+rA4rsWRWrrMUtCPnkKYNlPp64ZnCD:mDfyRIlBk3yJ8mtpaplcp6o
                                                    MD5:F109865C52D1FD602E2D53E559E56C22
                                                    SHA1:5884A3BB701C27BA1BF35C6ADD7852E84D73D81F
                                                    SHA-256:AF1DE90270693273B52FC735DA6B5CD5CA794F5AFD4CF03FFD95147161098048
                                                    SHA-512:B2F92B0AC03351CDB785D3F7EF107B61252398540B5F05F0CC9802B4D28B882BA6795601A68E88D3ABC53F216B38F07FCC03660AB6404CF6685F6D80CC4357FC
                                                    Malicious:false
                                                    Preview:# entry.tcl --..#..# This file defines the default bindings for Tk entry widgets and provides..# procedures that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#...start dragging out a selection)...# pressX -..X-coordinate at which the mouse button was pressed...# selectMode -..The style of selection currently underway:..#...char, word
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5035
                                                    Entropy (8bit):4.819523401259934
                                                    Encrypted:false
                                                    SSDEEP:96:J3MRZZ7HWb/6OgRKjtS6Mn9GRZZ7HWb2Y6aO6R5nh76SMoB2kd82KtTpsi2D0DSn:CRZdPul1RZdFaRf0XoB2gZKZpsi2pn
                                                    MD5:63B219BE9AFF1DE7DE2BAF0E941CAE38
                                                    SHA1:A2FEBB31380E12FF01E6F641FE8B4F815941462F
                                                    SHA-256:8872F236D7E824AEC0ACD4BACC00FDD7EC9BC5534814ECF2160610C10647B7C5
                                                    SHA-512:057700F8FDE4B7C3D7AB7CEFD6C531060BF2B1B3B727CAD6A37ECD42EBC557765D94B83ADD438BD5AFA1F6F919D80AE755A8D98918981167B871F31AD42FDF5E
                                                    Malicious:false
                                                    Preview:# focus.tcl --..#..# This file defines several procedures for managing the input..# focus...#..# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_focusNext --..# This procedure returns the name of the next window after "w" in..# "focus order" (the window that should receive the focus next if..# Tab is typed in w). "Next" is defined by a pre-order search..# of a top-level and its non-top-level descendants, with the stacking..# order determining the order of siblings. The "-takefocus" options..# on windows determine whether or not they should be skipped...#..# Arguments:..# w -..Name of a window.....proc ::tk_focusNext w {.. set cur $w.. while {1} {.....# Descend to just before the first child of the current widget......set parent $cur...set children [winfo children $cur]...set i -1.....# Look for the next sibling that isn't a top-leve
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16467
                                                    Entropy (8bit):4.795270290870865
                                                    Encrypted:false
                                                    SSDEEP:384:aUcEQ2Mq56jP/oVR6EcW0i9cWHKVo8q5F2Zsb9M:aUcEQ2Mq56jP/oVR6Ec5i9hKSxFC
                                                    MD5:A11F7D5F858E28D67F5391454401CAE8
                                                    SHA1:8ACAE04BE25249A3B7524B2C4AC03BF9FCF081D7
                                                    SHA-256:48C6D9EABB028A57291C009E1B02756D1EA6A18F9ACA7066C59BC3C5D881D3A6
                                                    SHA-512:E8D9B11208642C62166C62AF605341EC7BEEF4E178DD3FCC9E72E4436BE1F4E5D1952B78C5FA206D85D61693922FE26ACAF9267725387F2A7A56EE2D95A6D69A
                                                    Malicious:false
                                                    Preview:# fontchooser.tcl -..#..#.A themeable Tk font selection dialog. See TIP #324...#..# Copyright (C) 2008 Keith Vetter..# Copyright (C) 2008 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::fontchooser {.. variable S.... set S(W) .__tk__fontchooser.. set S(fonts) [lsort -dictionary [font families]].. set S(styles) [list \...[::msgcat::mc "Regular"] \...[::msgcat::mc "Italic"] \...[::msgcat::mc "Bold"] \...[::msgcat::mc "Bold Italic"] \.. ].... set S(sizes) {8 9 10 11 12 14 16 18 20 22 24 26 28 36 48 72}.. set S(strike) 0.. set S(under) 0.. set S(first) 1.. set S(sampletext) [::msgcat::mc "AaBbYyZz01"].. set S(-parent) ... set S(-title) [::msgcat::mc "Font"].. set S(-command) "".. set S(-font) TkDefaultFont..}....proc ::tk::fontchooser::Setup {} {.. variable S.... # Canonical versions of f
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):17421
                                                    Entropy (8bit):4.954921304048498
                                                    Encrypted:false
                                                    SSDEEP:384:FNP8nO9Wo8k5NfQH8EsOy8WMVbcfNCvJshPOw7jW:FNf8uNfQH89Z8WMVY15DW
                                                    MD5:4FDE770E3DFF8B95295FB887F510534B
                                                    SHA1:5356BA885D61910A34756188D676FACD0353ED8A
                                                    SHA-256:C8B4B2130C6AD658331C59F41D8BDBAB44E0011781214A0B0BE78C4920536B2E
                                                    SHA-512:30BF50137F18643FC3622EAA195EC7E0F21B77980C16DB54CCA1B7AEFA17CA4CE8E6F82D6C8F4A0DFB6DD78D4F115D3A5D8DA7573A928AF9C1A92727BD4F0691
                                                    Malicious:false
                                                    Preview:# iconlist.tcl..#..#.Implements the icon-list megawidget used in the "Tk" standard file..#.selection dialog boxes...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...# Copyright (c) 2009 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# API Summary:..#.tk::IconList <path> ?<option> <value>? .....#.<path> add <imageName> <itemList>..#.<path> cget <option>..#.<path> configure ?<option>? ?<value>? .....#.<path> deleteall..#.<path> destroy..#.<path> get <itemIndex>..#.<path> index <index>..#.<path> invoke..#.<path> see <index>..#.<path> selection anchor ?<int>?..#.<path> selection clear <first> ?<last>?..#.<path> selection get..#.<path> selection includes <item>..#.<path> selection set <first> ?<last>?.....package require Tk....::tk::Megawidget create ::tk::IconList ::tk::FocusableWidget {.. variable w canvas sbar accel accelCB fill font index \...itemList itemsPerColumn list
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):11037
                                                    Entropy (8bit):6.048349526382653
                                                    Encrypted:false
                                                    SSDEEP:192:0nEPytJLl1S47T3YqN5/vkJpnhXqBB4aw2rqZiygTtYTpOq/pc75Mk:xqLz7F5KTqBBLuZ1gTSsqhk
                                                    MD5:995A0A8F7D0861C268AEAD5FC95A42EA
                                                    SHA1:21E121CF85E1C4984454237A646E58EC3C725A72
                                                    SHA-256:1264940E62B9A37967925418E9D0DC0BEFD369E8C181B9BAB3D1607E3CC14B85
                                                    SHA-512:DB7F5E0BC7D5C5F750E396E645F50A3E0CDE61C9E687ADD0A40D0C1AA304DDFBCEEB9F33AD201560C6E2B051F2EDED07B41C43D00F14EE435CDEEE73B56B93C7
                                                    Malicious:false
                                                    Preview:# icons.tcl --..#..#.A set of stock icons for use in Tk dialogs. The icons used here..#.were provided by the Tango Desktop project which provides a..#.unified set of high quality icons licensed under the..#.Creative Commons Attribution Share-Alike license..#.(https://creativecommons.org/licenses/by-sa/3.0/)..#..#.See http://tango.freedesktop.org/Tango_Desktop_Project..#..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::icons {}....image create photo ::tk::icons::warning -data {.. iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABHNCSVQICAgIfAhkiAAABSZJREFU.. WIXll1toVEcYgL+Zc87u2Yu7MYmrWRuTJuvdiMuqiJd4yYKXgMQKVkSjFR80kFIVJfWCWlvpg4h9.. 8sXGWGof8iKNICYSo6JgkCBEJRG8ImYThNrNxmaTeM7pQ5IlJkabi0/9YZhhZv7///4z/8zPgf+7.. KCNRLgdlJijXwRyuDTlcxV9hbzv8nQmxMjg+XDtiOEplkG9PSfkztGmTgmFQd+FCVzwa3fYN/PHZ.. AcpBaReicW5xcbb64IEQqko8Lc26d/58cxS+/BY6hmJvyEfQBoUpwWCmW1FErKaGWHU13uRk4QkE.. UtxQNFR7QwIoB4eiKD9PWbVKbb10CZmaCqmpxCormRYO26QQx85B0mcD+AeK0
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):329
                                                    Entropy (8bit):4.3973643486226655
                                                    Encrypted:false
                                                    SSDEEP:6:nVxpJFBmHdeA1xNZgk0dIf3Ju4dFi6/XWrWhr3W7FxmVFraazmVAJFKyVQR7icr8:nj5Bqf1fZgp6A4FDG6dm7FUGAJVVMRmn
                                                    MD5:921245A21F7E783997DC7B859AF1B65B
                                                    SHA1:2EFE3C8F70CF18621006890BF21CC097770D140D
                                                    SHA-256:C6DB098EBD8A622164D37D4AB0A8C205DB1A83AC3065D5CDE3CB5FB61925D283
                                                    SHA-512:CAD823FF3D13A64C00825961E75B5133690556FB1F622834F8B1DF316A9E75BABB63B9F5148DAE7B1391123B4C8D55B4B8B2EB6F8E6E1DA9DE02A5BD7AC0FD6F
                                                    Malicious:false
                                                    Preview:README - images directory....This directory includes images for the Tcl Logo and the Tcl Powered..Logo. Please feel free to use the Tcl Powered Logo on any of your..products that employ the use of Tcl or Tk. The Tcl logo may also be..used to promote Tcl in your product documentation, web site or other..places you so desire...
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                    Category:dropped
                                                    Size (bytes):34991
                                                    Entropy (8bit):5.248845410801251
                                                    Encrypted:false
                                                    SSDEEP:768:0YrY6a0v4uIqYMEKjodQKOfRXMLcSqDGpfTKFVm3AsanMEDzzBHWzaw7XUbTJjoB:0YrY6aeIqYMEKjouzfRXMLcSqDGpfTKo
                                                    MD5:23C4EDED40DEC065F99E6653AEE1BB31
                                                    SHA1:3175E261BE198731DEDB07264CCB84C8DEDF7967
                                                    SHA-256:76207D8DFDE189A29DC0E76ADB7EAAA606B96BC6C1C831F34D1C85B1C5B51DD3
                                                    SHA-512:BA139A64BE72BB681040924C4294E2726BA5AB243E805E60A854D2D23E154705E2431D1AB2DE732BFA393747FD30D8A5C913895CBE1463DBF50CC23CAE5B0454
                                                    Malicious:false
                                                    Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL/TK LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:58 PM)..%%BoundingBox: 251 331 371 512..%%HiResBoundingBox: 251.3386 331.5616 370.5213 511.775..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%DocumentCustomColors: (TCL RED)..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 90 576 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe Illustrator
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 68 x 100
                                                    Category:dropped
                                                    Size (bytes):2341
                                                    Entropy (8bit):6.9734417899888665
                                                    Encrypted:false
                                                    SSDEEP:48:qF/mIXn3l7+ejbL/4nZEsKPKer1OPQqVRqJbPpRRKOv/UVO47f:81nHL4T0KorxvRKkc847f
                                                    MD5:FF04B357B7AB0A8B573C10C6DA945D6A
                                                    SHA1:BCB73D8AF2628463A1B955581999C77F09F805B8
                                                    SHA-256:72F6B34D3C8F424FF0A290A793FCFBF34FD5630A916CD02E0A5DDA0144B5957F
                                                    SHA-512:10DFE631C5FC24CF239D817EEFA14329946E26ED6BCFC1B517E2F9AF81807977428BA2539AAA653A89A372257D494E8136FD6ABBC4F727E6B199400DE05ACCD5
                                                    Malicious:false
                                                    Preview:GIF89aD.d...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....D.d........H......*\...z..Ht@Q...92.p...z.$.@@.E..u.Y.2..0c..q.cB.,[..... ..1..qbM.2~*].....s...S.@.L.j..#..\......h..........].D(..m......@.Z....oO...3=.c...G".(..pL...q]..%....[...#...+...X.h....^.....
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 43 x 64
                                                    Category:dropped
                                                    Size (bytes):1670
                                                    Entropy (8bit):6.326462043862671
                                                    Encrypted:false
                                                    SSDEEP:48:PF/mIXn3l7+ejbL/4xsgq4sNC6JYp6s/pmp76F:/1nHL404raM/op2
                                                    MD5:B226CC3DA70AAB2EBB8DFFD0C953933D
                                                    SHA1:EA52219A37A140FD98AEA66EA54685DD8158D9B1
                                                    SHA-256:138C240382304F350383B02ED56C69103A9431C0544EB1EC5DCD7DEC7A555DD9
                                                    SHA-512:3D043F41B887D54CCADBF9E40E48D7FFF99B02B6FAF6B1DD0C6C6FEF0F8A17630252D371DE3C60D3EFBA80A974A0670AF3747E634C59BDFBC78544D878D498D4
                                                    Malicious:false
                                                    Preview:GIF89a+.@...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....+.@........H. .z..(tp......@...92....#. A.......C.\.%...)Z..1a.8s..W/..@....3..C...y$.GW.....5.FU..j..;.F(Pc+W.-..X.D-[.*g....F..`.:mkT...Lw...A/.....u.7p..a..9P.....q2..Xg..G....3}AKv.\.d..yL.>..1.#
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 354 x 520
                                                    Category:dropped
                                                    Size (bytes):11000
                                                    Entropy (8bit):7.88559092427108
                                                    Encrypted:false
                                                    SSDEEP:192:d+nY6zludc/We/yXy9JHBUoIMSapQdrGlapzmyNMK1vbXkgMmgFW/KxIq3NhZe:YnY6p4c/OCHyowaGUaCcMK1vbXNwFW/l
                                                    MD5:45D9B00C4CF82CC53723B00D876B5E7E
                                                    SHA1:DDD10E798AF209EFCE022E97448E5EE11CEB5621
                                                    SHA-256:0F404764D07A6AE2EF9E1E0E8EAAC278B7D488D61CF1C084146F2F33B485F2ED
                                                    SHA-512:6E89DACF2077E1307DA05C16EF8FDE26E92566086346085BE10A7FD88658B9CDC87A3EC4D17504AF57D5967861B1652FA476B2DDD4D9C6BCFED9C60BB2B03B6F
                                                    Malicious:false
                                                    Preview:GIF89ab.................f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....b..........H......*\....#J.H....3j.... '.;p....(.8X..^.0c.I...z8O.\.....:....$..Fu<8`...P.>%I.gO.C.h-..+.`....@..h....dJ.?...K...H.,U.._.#...g..[.*^.x.....J.L.!.'........=+eZ..i..ynF.8...].y|..m.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 87a, 120 x 181
                                                    Category:dropped
                                                    Size (bytes):3889
                                                    Entropy (8bit):7.425138719078912
                                                    Encrypted:false
                                                    SSDEEP:48:9qqbIh+cE4C8ric/jxK5mxsFBu3/0GIJ6Qap1Y5uMiR8pw5rB/SgijDb+TOh:hy+mnZ7xK5IsTwDQmkdiiG5rB/BE+6h
                                                    MD5:BD12B645A9B0036A9C24298CD7A81E5A
                                                    SHA1:13488E4F28676F1E0CE383F80D13510F07198B99
                                                    SHA-256:4D0BD3228AB4CC3E5159F4337BE969EC7B7334E265C99B7633E3DAF3C3FCFB62
                                                    SHA-512:F62C996857CA6AD28C9C938E0F12106E0DF5A20D1B4B0B0D17F6294A112359BA82268961F2A054BD040B5FE4057F712206D02F2E668675BBCF6DA59A4DA0A1BB
                                                    Malicious:false
                                                    Preview:GIF87ax............................................................................z.....{..o.....m..b...`{.X....vy...hk.Um.N...I`.D..Z^.LP.?R.;!....?C.5C.3#.l..,6.*&.15...`..#(.If.y.....l...._..#/...Hm.>_.y..4R.k..#6..._......w..*K.^.."<.....G{.w..3_."C.Q..F....v..!K...v.2m.)_.[..!R.u.1t.g..)f. X.O..E..1z.g. _.Z..D..:..0..Z.. f.D..0..'z..m.N..C../.z.svC.q/.m.ze7.\..P..I..1%.,...............................................................................................................................................................................................................................................................................................................................................................................................,....x..........H.......D..!...7.PAQ...._l8.... C.<.a...*.x....0q.. ..M.%.<.HBe.@.....Q..7..XC..P..<z3..X...P.jA.%'@.J.lV.......R.,..+....t....7h.....(..a...+^.'..7..L.....V...s..$....a.....8`.9..}K......
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                    Category:dropped
                                                    Size (bytes):29706
                                                    Entropy (8bit):5.33387357427899
                                                    Encrypted:false
                                                    SSDEEP:768:0warY6a0v4uIqYMEKjodQKOfRtMLcSqDGpf88KFVmlhEtOI/eE7U0a1:03rY6aeIqYMEKjouzfRtMLcSqDGpfbKc
                                                    MD5:4AE11820D4D592D02CDE458E6F8CE518
                                                    SHA1:A2E8D3D6191B336D43E48A65C3AE6485B07D93C6
                                                    SHA-256:87FD9E46DBB5F2BF1529AFB411182C9FB9C58E23D830C66A233AF0C256BB8EFF
                                                    SHA-512:E0AD4ED570D414BF00931B0F5BBB61FEF981ABDB22ECC42F8E9841905D38874CDFE38F22EDB17ACD0F7539B2932F9C4A865FA73A49BB1458CE05EE10A78BE357
                                                    Malicious:false
                                                    Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL PWRD LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:59 PM)..%%BoundingBox: 242 302 377 513..%%HiResBoundingBox: 242.0523 302.5199 376.3322 512.5323..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (PANTONE Warm Red CV)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 102 564 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe I
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 64 x 100
                                                    Category:dropped
                                                    Size (bytes):1615
                                                    Entropy (8bit):7.461273815456419
                                                    Encrypted:false
                                                    SSDEEP:48:aE45BzojC3r1WAQ+HT2gAdKhPFZ/ObchgB8:V5Gb1WN+yfcObmgW
                                                    MD5:DBFAE61191B9FADD4041F4637963D84F
                                                    SHA1:BD971E71AE805C2C2E51DD544D006E92363B6C0C
                                                    SHA-256:BCC0E6458249433E8CBA6C58122B7C0EFA9557CBC8FB5F9392EED5D2579FC70B
                                                    SHA-512:ACEAD81CC1102284ED7D9187398304F21B8287019EB98B0C4EC7398DD8B5BA8E7D19CAA891AA9E7C22017B73D734110096C8A7B41A070191223B5543C39E87AF
                                                    Malicious:false
                                                    Preview:GIF89a@.d.............................f.................f...ff.f3.f..33.3.........f..ff.f3.33.3.f..f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....@.d....@.pH,..E.... ..(...H$..v..j....K....q..5L......^).3.Y7..r..u.v|g..om...\iHl..p...`G..\~....fn[q...P.g.Z.l....y...\.l......f.Z.g...%%....e...e...)....O.f..e. ....O..qf..%..(.H.u..]..&....#4.......@.).....u!.M..2. ..PJ..#..T..a.....P.Gi... <Hb....x..z.3.X.O..f.........].Bt..lB.Q.r...9pP....&...L. ..,`[.....E6.Q.....?.#L......|g........N....[.._........."4......b....G6.........m.zI].....I.@.......I.9...glew...2.B..c>./..2....x.....<...{...7;.....y.I.....4G.Qj0..7..%.W.V...?!..[...X..=..k.h..[Q<.....0.B....(P.x.,.......8O*Z.8P!.$....u.c..Ea!..eC....CB.. .H..E..#..C..E...z..&.Nu........c.0..#.T.M.U........l.p @..s.|..pf!..&.......8.#.8.....*..J>. .t..h6(........#..0.A...*!..)...x..u.Z....*%..H.....*.......`......|.....1.......&.....T*...f.l...
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 97 x 150
                                                    Category:dropped
                                                    Size (bytes):2489
                                                    Entropy (8bit):7.708754027741608
                                                    Encrypted:false
                                                    SSDEEP:48:/Ev7JJ+3uvz/Hwbcp7igaIwjBui7qFxIIOdJXcI+Ks:M9oWz/7pZAV7qPIImJXtXs
                                                    MD5:711F4E22670FC5798E4F84250C0D0EAA
                                                    SHA1:1A1582650E218B0BE6FFDEFFD64D27F4B9A9870F
                                                    SHA-256:5FC25C30AEE76477F1C4E922931CC806823DF059525583FF5705705D9E913C1C
                                                    SHA-512:220C36010208A87D0F674DA06D6F5B4D6101D196544ABCB4EE32378C46C781589DB1CE7C7DFE6471A8D8E388EE6A279DB237B18AF1EB9130FF9D0222578F1589
                                                    Malicious:false
                                                    Preview:GIF89aa...............................f.................f...ff.f3.f..33.3............f..ff.f3.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....a......@.pH,...r.l:..TB.T..V..z..H.j..h...&.......t"....F...d..gN~Y...g....}..r....g.....o...g.......Y.w..W......N....Z....W....f...tL.~.f....New............W.M.r.........O.q........W-./i.*...`..z..F9.../9..-.......$6..G..S...........zB.,nw.64...e4.......HOt......f.....)..OX..C.eU.(.Qh.....T..<Q.Y.P.L.YxT....2........ji..3.^)zz..O.a..6 ...TZ........^...7.....>|P.....w$...k.ZF.\R.u....F.]Z.--(v+)[Y....=.!.W..+.]..]._.....&..../Ap...j...!..b.:...{.^.=.`...U.....@Hf..\?.(..Lq@.........0..L...a...&.!.....]#..]G \..q...A.H.X[...(.W......,...1a..B...W(.t.8.AdG.)..(P=...Uu.u..A.KM\...'r.R./.W..d2a.0..G...?...B......#H........1Q.0...R....%+...0.I..{.<......QV.tz'.yn.E.p..0i.I.g......L....%....K...A.l.ph.Q.1e...Z....g..2e...smU&d;.J..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 113 x 175
                                                    Category:dropped
                                                    Size (bytes):2981
                                                    Entropy (8bit):7.758793907956808
                                                    Encrypted:false
                                                    SSDEEP:48:AmEwM8ioQoHJQBTThKVI7G78NLL120GFBBFXJRxlu+BmO/5lNqm7Eq:B57QoHJQt4II8BZ+jxluZO/5lNqm7Eq
                                                    MD5:DA5FB10F4215E9A1F4B162257972F9F3
                                                    SHA1:8DB7FB453B79B8F2B4E67AC30A4BA5B5BDDEBD3B
                                                    SHA-256:62866E95501C436B329A15432355743C6EFD64A37CFB65BCECE465AB63ECF240
                                                    SHA-512:990CF306F04A536E4F92257A07DA2D120877C00573BD0F7B17466D74E797D827F6C127E2BEAADB734A529254595918C3A5F54FDBD859BC325A162C8CD8F6F5BE
                                                    Malicious:false
                                                    Preview:GIF89aq...............................f.................f...ff.f3.f..33.3............f..ff.f3.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3................................................................!.. -dl-.!.......,....q......@.pH,...r.l:....A}H...v..R......D.VF..,%M....^.....fyzU.P..f...i.....t..Uqe..N..Z..i......~....g......u.....g......\...h.....P...h.....Q..g....Z..h......]......\...M...[..s...c2.+R.$. ......#.....)v..4....MO.b.....9......[.M.........h'..<-..=.....HQD....D?.~......W7. ..V.W0..l....*0p}..KP?c.\@KW.S(..M..B.....-q...S2...*.,..P.{....F..._MAn ....i.Y3............zh.y.j@...a876...ui.i..;K.........p...`.,}w....tv.m...Y..........;.;.e).e&.......-.NC.*4..(........*..F........[,w....f......E....h..a3.T.^.........)...C.N8.h\T...+&.z....g]H..B..#.t6..Z.....j.-..N......TI....A........M?..Q&V'...Mb.f.x...h.$r.U .9..Ci. ].4.Zb..@...X....%..<..b)V!........Y)x......T.....h.p.d..h..(........]@.**J.M.U.Jf...Y.:....F..g:..d..6q.-..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 130 x 200
                                                    Category:dropped
                                                    Size (bytes):3491
                                                    Entropy (8bit):7.790611381196208
                                                    Encrypted:false
                                                    SSDEEP:96:ROGuxkQ9mcV7RXcECEtqCa+6GK8WseNXhewFIp9ZmL4u:ROGwpVOEbqCrWsUhtIk4u
                                                    MD5:A5E4284D75C457F7A33587E7CE0D1D99
                                                    SHA1:FA98A0FD8910DF2EFB14EDAEC038B4E391FEAB3C
                                                    SHA-256:BAD9116386343F4A4C394BDB87146E49F674F687D52BB847BD9E8198FDA382CC
                                                    SHA-512:4448664925D1C1D9269567905D044BBA48163745646344E08203FCEF5BA1524BA7E03A8903A53DAF7D73FE0D9D820CC9063D4DA2AA1E08EFBF58524B1D69D359
                                                    Malicious:false
                                                    Preview:GIF89a................................f.................f...ff.f3.f..33.3............f..ff.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,...........@.pH,...r.l:..T..F$XIe..V$.x..V.Z.z..F.pxd~..........{....o....l..{.b...hi[}P.k...y.....y.f.._R.\...............m.....y.....x......^.Q...j.....\S.....^.......l......]...[.......).....{....7...`..<...`..">..i.?/..@............>..Z.z@....0B..r...j.V.I.@..;%R...*...J.p.A.t.*..$A*...>`.....@g5BP.A..p.x.............q..8...... ...(.Q..#..@...F..YSK..M..#o.....D.m..-.....k}...BT..V......'.....`.d..~;..9+..6...<b.eZ..y^0]0..I...=.6.....}.0<.Z...M...Y1*35.e.....b...U0F~.-.HT......l2.s.q`-....y...e....dPZ....~.zT.M.... "r.E/k. ...*..Lj@'........Pcd&.(..mxF_w.."K..x!..--Y`..A.....Be.jH.A..\..j.....du#.....]^...>......].i.FMO..].9n1",Y...F...EW.9.....0TY.T...Cv!i`%...Hz@.]..U.!Y...#Dv&pi.z(.mn.A....@Q.0.%...&.4.v.cw(.`cd'|..M9..."...,*.......
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 48 x 75
                                                    Category:dropped
                                                    Size (bytes):1171
                                                    Entropy (8bit):7.289201491091023
                                                    Encrypted:false
                                                    SSDEEP:24:DOfHIzP8hqiF+oyPOmp3XHhPBlMVvG0ffWLpfc:DGoPM+o0OmZXHhOv5WRc
                                                    MD5:7013CFC23ED23BFF3BDA4952266FA7F4
                                                    SHA1:E5B1DED49095332236439538ECD9DD0B1FD4934B
                                                    SHA-256:462A8FF8FD051A8100E8C6C086F497E4056ACE5B20B44791F4AAB964B010A448
                                                    SHA-512:A887A5EC33B82E4DE412564E86632D9A984E8498F02D8FE081CC4AC091A68DF6CC1A82F4BF99906CFB6EA9D0EF47ADAC2D1B0778DCB997FB24E62FC7A6D77D41
                                                    Malicious:false
                                                    Preview:GIF89a0.K.............................f.................f...ff.f3.f..33.3.........f..ff.f3.3f.33.3.f..ff.ff.f3ff333f.3f.33.33f.3......................................................................!.. -dl-.!.......,....0.K....@.pH,...GD.<:..%SR.Z......<.V.$l.....z......:.. .|v[D..f...z.W.G.Vr...NgsU.yl..qU..`.......`fe`.......Fg....(.&...g.Y.. .."..q.V.$.'.Ez.W....y...Y.U...(#Xrf.........Xux.U..........(U.4...X....G.B..t..1S...R..Y. ...l ..".>.h......,%K....A.....<s....#..8.iK.....a.y$h..DQh.PE)....6.....MyL.qzF..... ."..Y0..a......2..*t..Ma..b...M..R.....\..st..=....Q......,>s`....Qt.,..B.R.....!.$..%.....(...s...B.T...`,".h(. D....8..dC..\Q.p.......x.#A.....:..du..(D.XV......7....S.#n8a....2`...f.:G,...==(......`!..$...t....b..../N|...f..J.x... P&.|.d._!N...].1w.3D.0!....@o&H...N.B.J....pz8..w.i....=r.............@5.-!.......H."..[.j.AB<..p....h...V.D..6.h...ab1F.g...I !.V~.H..V.........:.G..|c...,.....TD5..c[.W.....LC.....FJ..71[..lH.M.....8.:$......
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:GIF image data, version 89a, 100 x 100
                                                    Category:dropped
                                                    Size (bytes):5473
                                                    Entropy (8bit):7.754239979431754
                                                    Encrypted:false
                                                    SSDEEP:96:+EqG96vSGfyJZ26G6U1LI7nTD2enhjc+2VBnOqcUERVIim:+46KcyJI6G6uU7/LhjlkhQR7m
                                                    MD5:048AFE69735F6974D2CA7384B879820C
                                                    SHA1:267A9520C4390221DCE50177E789A4EBD590F484
                                                    SHA-256:E538F8F4934CA6E1CE29416D292171F28E67DA6C72ED9D236BA42F37445EA41E
                                                    SHA-512:201DA67A52DADA3AE7C533DE49D3C08A9465F7AA12317A0AE90A8C9C04AA69A85EC00AF2D0069023CD255DDA8768977C03C73516E4848376250E8D0D53D232CB
                                                    Malicious:false
                                                    Preview:GIF89ad.d...................RJJ...B99.......RBB..B11ZBB!....R991!!...)....{{B!!R)).JJ.ss.ZZ.BB.kk.RR.JJ.BB9...JJR!!.ZZ.BB.11.99.{s.sk.kc.cZ.ZR.JB.ZR.JB.JB.RJ.B9.91.B9...{.JB.91.B9.B9.1){)!.)!.9)..ZR.JB{91.cR{1).ZJ.ZJ.RB.J9.B1.B1.9).1!....{B9.{k.scc1).kZZ)!c)!.9).B1.9).9).1!.1!.1!.B).9!.9!.1..).....{.sZ1)R)!.B1.B1.ZBR!..9).ZB.9).R9.R9.1!.J1.J1.B).B).9!.9!.1..1..).....sZ.J9.ZB.cJJ!.{1!.B).9!{)..9!.J).B!.B!.9..R1).kJ)!.B1{9).R9.cB.Z9.Z9.B).Z9.B).R1.9!.R1.J).J).B!.1..9....{.s.J9.{Z.ZB.sR.kJk1!.cB.cB.R1.R).1..B!.J!.B.....R91.J1).c.kJ.J).Z1.B!.B!..9!..{R.sJ.Z9.R1{9!..s.R9.Z...J91Z9){B)...............B91..1)!..............................RJR............B)1......R19........BJ.9B..{..s{......!.......,....d.d.@............0@PHa....*.p...7.8.y...C.s6Z.%Q.#s.`:B.N....4jd.K.0..|y....F@.......1~ ......'Y.B"C&R.V.R.4$k.3...D.......Ef*Y3..M........BDV._.....\..).]..>s..$H\%y0WL...d.......D..'..v..1Kz.Zp$;S
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2307
                                                    Entropy (8bit):5.135743409565932
                                                    Encrypted:false
                                                    SSDEEP:48:XU/zAcKT6yOCaDBfsHLk32s3J5w83KDyP1BXy3JQz7yuC:XNc+92sg3A8uyDXy3JQnDC
                                                    MD5:F090D9B312C16489289FD39813412164
                                                    SHA1:1BEC6668F6549771DADC67D153B89B8F77DCD4B9
                                                    SHA-256:0D1E4405F6273F091732764ED89B57066BE63CE64869BE6C71EA337DC4F2F9B5
                                                    SHA-512:57B323589C5A8D9CBB224416731D8CE65C4B94146DF15CE30885DF63B1D0B3F709093B65390A911F84F20B7C5DE3C0AF9B4D7D531742BE046EDA6E8C3432EF6E
                                                    Malicious:false
                                                    Preview:This software is copyrighted by the Regents of the University of..California, Sun Microsystems, Inc., Scriptics Corporation, ActiveState..Corporation, Apple Inc. and other parties. The following terms apply to..all files associated with the software unless explicitly disclaimed in..individual files.....The authors hereby grant permission to use, copy, modify, distribute,..and license this software and its documentation for any purpose, provided..that existing copyright notices are retained in all copies and that this..notice is included verbatim in any distributions. No written agreement,..license, or royalty fee is required for any of the authorized uses...Modifications to this software may be copyrighted by their authors..and need not follow the licensing terms described here, provided that..the new terms are clearly indicated on the first page of each file where..they apply.....IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY..FOR DIRECT, INDIRECT, SPECIAL, INCI
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):15255
                                                    Entropy (8bit):4.9510475386072095
                                                    Encrypted:false
                                                    SSDEEP:384:apDYV5Yupn5OcckwBv3HCpg2J8JvJBfWeZhXkz+WkHGowv:aPPkevB2JuvJ9D3XmSc
                                                    MD5:804E6DCE549B2E541986C0CE9E75E2D1
                                                    SHA1:C44EE09421F127CF7F4070A9508F22709D06D043
                                                    SHA-256:47C75F9F8348BF8F2C086C57B97B73741218100CA38D10B8ABDF2051C95B9801
                                                    SHA-512:029426C4F659848772E6BB1D8182EB03D2B43ADF68FCFCC1EA1C2CC7C883685DEDA3FFFDA7E071912B9BDA616AD7AF2E1CB48CE359700C1A22E1E53E81CAE34B
                                                    Malicious:false
                                                    Preview:# listbox.tcl --..#..# This file defines the default bindings for Tk listbox widgets..# and provides procedures that help in implementing those bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....#--------------------------------------------------------------------------..# tk::Priv elements used in this file:..#..# afterId -..Token returned by "after" for autoscanning...# listboxPrev -.The last element to be selected or deselected..#...during a selection operation...# listboxSelection -.All of the items that were selected before the..#...current selection operation (such as a mouse..#...drag) started; used to cancel an operation...#--------------------------------------------------------------------------....#--------------
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9862
                                                    Entropy (8bit):4.786615174847384
                                                    Encrypted:false
                                                    SSDEEP:192:mvEEVwjVwqOpOLbkVAg/vyKEZ25YbKZbwrmQ:mvEEVwJwpALPgnyx25YGZkr3
                                                    MD5:D83ED6AC2912900040530528A0237AB3
                                                    SHA1:2D18E42A8B96C3D71C1C6701010FDF75C1E6D5D8
                                                    SHA-256:848258B946C002E2696CA3815A1589C8120AF5CC41FBC11BBD9A3F5754CC21AF
                                                    SHA-512:00B4CD0D58029FC37820C163A4AE1DEAD22FB5C767BDC118659EACE26D449C362189611DFB3FAB1AC129FABFEC2CE853EA2C10D418FAE5AEB91DDC9330FF782D
                                                    Malicious:false
                                                    Preview:# megawidget.tcl..#..#.Basic megawidget support classes. Experimental for any use other than..#.the ::tk::IconList megawdget, which is itself only designed for use in..#.the Unix file dialogs...#..# Copyright (c) 2009-2010 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....package require Tk.....::oo::class create ::tk::Megawidget {.. superclass ::oo::class.. method unknown {w args} {...if {[string match .* $w]} {... [self] create $w {*}$args... return $w...}...next $w {*}$args.. }.. unexport new unknown.. self method create {name superclasses body} {...next $name [list \....superclass ::tk::MegawidgetClass {*}$superclasses]\;$body.. }..}....::oo::class create ::tk::MegawidgetClass {.. variable w hull options IdleCallbacks.. constructor args {...# Extract the "widget name" from the object name...set w [namespace tail [self]].....# Configure things...
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):39499
                                                    Entropy (8bit):4.928671503514817
                                                    Encrypted:false
                                                    SSDEEP:768:NKJsO5OhIzOQjJwxzire5pKVjriecYyq4Cp5Zn2:NKJsO5LOQizire54lriecYf4V
                                                    MD5:078782CD05209012A84817AC6EF11450
                                                    SHA1:DBA04F7A6CF34C54A961F25E024B6A772C2B751D
                                                    SHA-256:D1283F67E435AAB0BDBE9FDAA540A162043F8D652C02FE79F3843A451F123D89
                                                    SHA-512:79A031F7732AEE6E284CD41991049F1BB715233E011562061CD3405E5988197F6A7FB5C2BBDDD1FB9B7024047F6003A2BF161FC0EC04876EFF5335C3710D9562
                                                    Malicious:false
                                                    Preview:# menu.tcl --..#..# This file defines the default bindings for Tk menus and menubuttons...# It also implements keyboard traversal of menus and implements a few..# other utility procedures related to menus...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# cursor -..Saves the -cursor option for the posted menubutton...# focus -..Saves the focus during a menu selection operation...#...Focus gets restored here when the menu is unposted...# grabGlobal -..Used in conjunction with tk::Priv(oldGrab): if..#...tk::Priv(oldGrab) is non
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):30840
                                                    Entropy (8bit):5.142909056222569
                                                    Encrypted:false
                                                    SSDEEP:768:+c4g8rSnBGzHsGK83Ch0x/0kmSq6O4+rNfPCpM2sEmqKys3pCJxi5dEaY:+c4g8OnBGzBK83Ch0x/0FSq6OnrGM2h3
                                                    MD5:983C7B78F1A0EBACAB8006D391A01FCD
                                                    SHA1:7EA37474EA039ED7A37BFDD7D76EAE673E666283
                                                    SHA-256:C5BDCA3ABA671F03DC4624AB5FD260490F5002491D6C619142CCF5A1A744528A
                                                    SHA-512:A006EF9B7213E572F6FC540D1512A52C52FEC44E3A07846DE09662AE32B7191C5CF639798531847B39E4076BF9DD6314B6F5373065C04F4FEF221185B39C3117
                                                    Malicious:false
                                                    Preview:# mkpsenc.tcl --..#..# This file generates the postscript prolog used by Tk.....namespace eval ::tk {.. # Creates Postscript encoding vector for ISO-8859-1 (could theoretically.. # handle any 8-bit encoding, but Tk never generates characters outside.. # ASCII)... #.. proc CreatePostscriptEncoding {} {...variable psglyphs...# Now check for known. Even if it is known, it can be other than we...# need. GhostScript seems to be happy with such approach...set result "\[\n"...for {set i 0} {$i<256} {incr i 8} {... for {set j 0} {$j<8} {incr j} {....set enc [encoding convertfrom "iso8859-1" \.....[format %c [expr {$i+$j}]]]....catch {.... set hexcode {}.... set hexcode [format %04X [scan $enc %c]]....}....if {[info exists psglyphs($hexcode)]} {.... append result "/$psglyphs($hexcode)"....} else {.... append result "/space"....}... }... append result "\n"...}...append result "\]"...return $result.. }.... # List of adobe glyph names. Converted from glyph
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:xbm image (32x, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16786
                                                    Entropy (8bit):4.717927930017041
                                                    Encrypted:false
                                                    SSDEEP:192:+haZOxBpK8uxGe4V88/wxY3Fxqipz4zz4zxxFzxT4OcErDxqdRRZeuC/Vj2CoopC:+hRWRG3FFjvsfCoopwITHzLHFHHAABs
                                                    MD5:217087AB6B2A8F9D7252E311D69C3769
                                                    SHA1:09AEB2BC5B7C7F4AB3DE4211D786C519AE0970F6
                                                    SHA-256:A07E3A3809CED3C6C9C1E171DCA5AD1F28357734CD41B2B9DD9F58085B3D2842
                                                    SHA-512:6E57633C924BFC16D380C014C20DD24D5727E70D4843FCEC4D7995B4DB21941EA8F2A5FD6E5386DF3364B6905D4D66B2B9595DC8FC70CFF40A2D49A92A1B6FBA
                                                    Malicious:false
                                                    Preview:# msgbox.tcl --..#..#.Implements messageboxes for platforms that do not have native..#.messagebox support...#..# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# Ensure existence of ::tk::dialog namespace..#..namespace eval ::tk::dialog {}....image create bitmap ::tk::dialog::b1 -foreground black \..-data "#define b1_width 32\n#define b1_height 32..static unsigned char q1_bits[] = {.. 0x00, 0xf8, 0x1f, 0x00, 0x00, 0x07, 0xe0, 0x00, 0xc0, 0x00, 0x00, 0x03,.. 0x20, 0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x08, 0x08, 0x00, 0x00, 0x10,.. 0x04, 0x00, 0x00, 0x20, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x04, 0x00,
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4235
                                                    Entropy (8bit):4.789130604359491
                                                    Encrypted:false
                                                    SSDEEP:48:nlw9Twd+j3gLhokqwX+hTnJgNanPNcgRhgP+5QPwJJENL:nlw9TjjwI3hTnJgNaRhgP75L
                                                    MD5:5A8B46B85DCCBF74E2B5B820E1A7B9D1
                                                    SHA1:980F4FC5BABA82BA0FE02F9BD03A23DF6D565BB1
                                                    SHA-256:4DFFBEEDBF0D66D84B13088016D1A782CEAAD4DED27BE1E38842F8969C0E533F
                                                    SHA-512:2D81FC06CF3C20E4F6314BD13AF81FDE38A9B06510584C84C6A0C8C36314F980F77D02BD8056E7EE5DE599A0620E0C0349124147334B9C141145270046B19D90
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset cs "&Abort" "&P\u0159eru\u0161it".. ::msgcat::mcset cs "&About..." "&O programu...".. ::msgcat::mcset cs "All Files" "V\u0161echny soubory".. ::msgcat::mcset cs "Application Error" "Chyba programu".. ::msgcat::mcset cs "Bold Italic".. ::msgcat::mcset cs "&Blue" "&Modr\341".. ::msgcat::mcset cs "Cancel" "Zru\u0161it".. ::msgcat::mcset cs "&Cancel" "&Zru\u0161it".. ::msgcat::mcset cs "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nemohu zm\u011bnit atku\341ln\355 adres\341\u0159 na \"%1\$s\".\nP\u0159\355stup odm\355tnut.".. ::msgcat::mcset cs "Choose Directory" "V\375b\u011br adres\341\u0159e".. ::msgcat::mcset cs "Cl&ear" "Sma&zat".. ::msgcat::mcset cs "&Clear Console" "&Smazat konzolu".. ::msgcat::mcset cs "Color" "Barva".. ::msgcat::mcset cs "Console" "Konzole".. ::msgcat::mcset cs "&Copy" "&Kop\355rovat".. ::msgcat::mcset cs "Cu&t" "V&y\u0159\355znout".. ::msgcat::mcset cs "&
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3987
                                                    Entropy (8bit):4.651948695787255
                                                    Encrypted:false
                                                    SSDEEP:48:nRZ2uDMr05sIEzs2KkrT+XuTKN0FjDDP9:nRZzDy4kBKkrT+QpP9
                                                    MD5:227B0F255F854460E8E5146ED7A17B85
                                                    SHA1:99A080CAD631F21963C51A5B254BDAD3724DC866
                                                    SHA-256:FEEF8F8AD33BB3362C845A25D6ED273C398051047D899B31790474614C7AFD2D
                                                    SHA-512:36A4B48831316CC29686CC76DA00110EB078EC56F55A960D11AE427AA3D913C340C1E3805BF2AD40C1A8A92FC6587DA5D2C245E7501289FC3E228BE14FE49598
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset da "&Abort" "&Afbryd".. ::msgcat::mcset da "&About..." "&Om...".. ::msgcat::mcset da "All Files" "Alle filer".. ::msgcat::mcset da "Application Error" "Programfejl".. ::msgcat::mcset da "&Blue" "&Bl\u00E5".. ::msgcat::mcset da "Cancel" "Annuller".. ::msgcat::mcset da "&Cancel" "&Annuller".. ::msgcat::mcset da "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ikke skifte til katalog \"%1\$s\".\nIngen rettigheder.".. ::msgcat::mcset da "Choose Directory" "V\u00E6lg katalog".. ::msgcat::mcset da "Cl&ear" "&Ryd".. ::msgcat::mcset da "&Clear Console" "&Ryd konsolen".. ::msgcat::mcset da "Color" "Farve".. ::msgcat::mcset da "Console" "Konsol".. ::msgcat::mcset da "&Copy" "&Kopier".. ::msgcat::mcset da "Cu&t" "Kli&p".. ::msgcat::mcset da "&Delete" "&Slet".. ::msgcat::mcset da "Details >>" "Detailer".. ::msgcat::mcset da "Directory \"%1\$s\" does not exist." "Katalog \"%1\$s\" finde
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4914
                                                    Entropy (8bit):4.6221938909259475
                                                    Encrypted:false
                                                    SSDEEP:96:nxLEpatioUqGBLbz4ME/XKKVN9R7S/0oYr9:epY3MkXKKxRu2r9
                                                    MD5:2203F65BCDA61BC15AEAC4F868C6D94A
                                                    SHA1:C4CC3975679D23892406E4E8971359A0775B1B86
                                                    SHA-256:C0F574B14068A049E93421C73873D750C98DE28B7B77AA42FE72CBE0270A4186
                                                    SHA-512:79F134FDAD3B12524D43BF9F59D3C04CAE30A95F591A51B82C8DF7CC8563BEA5D464AEECC457D9F60C04365E30459C447ED537AFC832BA25E1815DE06C2B81E5
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset de "&Abort" "&Abbruch".. ::msgcat::mcset de "&About..." "&\u00dcber...".. ::msgcat::mcset de "All Files" "Alle Dateien".. ::msgcat::mcset de "Application Error" "Applikationsfehler".. ::msgcat::mcset de "&Apply" "&Anwenden".. ::msgcat::mcset de "Bold" "Fett".. ::msgcat::mcset de "Bold Italic" "Fett kursiv".. ::msgcat::mcset de "&Blue" "&Blau".. ::msgcat::mcset de "Cancel" "Abbruch".. ::msgcat::mcset de "&Cancel" "&Abbruch".. ::msgcat::mcset de "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kann nicht in das Verzeichnis \"%1\$s\" wechseln.\nKeine Rechte vorhanden.".. ::msgcat::mcset de "Choose Directory" "W\u00e4hle Verzeichnis".. ::msgcat::mcset de "Cl&ear" "&R\u00fccksetzen".. ::msgcat::mcset de "&Clear Console" "&Konsole l\u00f6schen".. ::msgcat::mcset de "Color" "Farbe".. ::msgcat::mcset de "Console" "Konsole".. ::msgcat::mcset de "&Copy" "&Kopieren".. ::msgcat::mcset de "
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with very long lines (355), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8784
                                                    Entropy (8bit):4.334043617395095
                                                    Encrypted:false
                                                    SSDEEP:48:tVj/F+oxBHbkI8+xTqFt2zPJ0k63fRGIUvPXrfBNnzc+zIF7meUOT7GC8MO07S0g:fj9+AHlLoozHn7fBFrMVmehCAGb
                                                    MD5:780F863903BBDAA6C371EC0D3C7E6D59
                                                    SHA1:DF5D435E132BEE4C076A7FC577C8C275A8B68CD5
                                                    SHA-256:3F6F155864FE59A341BFD869735E54DD21CEE21BBD038433D9B271AD77BA3F7E
                                                    SHA-512:091965EE912513AE1943BE840A2E757188FBA6F760F7C47BE80D06313D59B051F183E3A29D4B1CEDE1F9E54CA3CA23D75FF2C3A3672A4E71FB56F0FA76F7FA0D
                                                    Malicious:false
                                                    Preview:## Messages for the Greek (Hellenic - "el") language...## Please report any changes/suggestions to:..## petasis@iit.demokritos.gr....namespace eval ::tk {.. ::msgcat::mcset el "&Abort" "\u03a4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03cc\u03c2".. ::msgcat::mcset el "About..." "\u03a3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac...".. ::msgcat::mcset el "All Files" "\u038c\u03bb\u03b1 \u03c4\u03b1 \u0391\u03c1\u03c7\u03b5\u03af\u03b1".. ::msgcat::mcset el "Application Error" "\u039b\u03ac\u03b8\u03bf\u03c2 \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae\u03c2".. ::msgcat::mcset el "&Blue" "\u039c\u03c0\u03bb\u03b5".. ::msgcat::mcset el "&Cancel" "\u0391\u03ba\u03cd\u03c1\u03c9\u03c3\u03b7".. ::msgcat::mcset el \.."Cannot change to the directory \"%1\$s\".\nPermission denied." \.."\u0394\u03b5\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03ae \u03b7 \u03b1\u03bb\u03bb\u03b1\u03b3\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3377
                                                    Entropy (8bit):4.279601088621442
                                                    Encrypted:false
                                                    SSDEEP:24:sQ7dw5bO0V3gqmCNyoKJ6iwp/uvENv4SKEcET2hsHFjr:n7dwNOc3RmOKJQcvEl4SK1ET2hYFjr
                                                    MD5:D48CFC9EC779085E8F6AAA7B1C40C89A
                                                    SHA1:0CF6253BFF39F40CA0991F9B06D3394BFEA21ED2
                                                    SHA-256:4A33B44B2E220E28EAAE7FAC407CAFE43D97C270DA58FA5F3B699A1760BFB2A4
                                                    SHA-512:C00EC0CFB48ABE621EF625C51952BCF177CE3BC7F0DEC5276EF84C9A97C7E014806B106EA8DEE202C43F8DD54ED7261A8D899E3EE12E3F37A90C387D864463AE
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset en "&Abort".. ::msgcat::mcset en "&About...".. ::msgcat::mcset en "All Files".. ::msgcat::mcset en "Application Error".. ::msgcat::mcset en "&Apply".. ::msgcat::mcset en "Bold".. ::msgcat::mcset en "Bold Italic".. ::msgcat::mcset en "&Blue".. ::msgcat::mcset en "Cancel".. ::msgcat::mcset en "&Cancel".. ::msgcat::mcset en "Cannot change to the directory \"%1\$s\".\nPermission denied.".. ::msgcat::mcset en "Choose Directory".. ::msgcat::mcset en "Cl&ear".. ::msgcat::mcset en "&Clear Console".. ::msgcat::mcset en "Color".. ::msgcat::mcset en "Console".. ::msgcat::mcset en "&Copy".. ::msgcat::mcset en "Cu&t".. ::msgcat::mcset en "&Delete".. ::msgcat::mcset en "Details >>".. ::msgcat::mcset en "Directory \"%1\$s\" does not exist.".. ::msgcat::mcset en "&Directory:".. ::msgcat::mcset en "&Edit".. ::msgcat::mcset en "Effects".. ::msgcat::mcset en "Error: %1\$s".. ::msgcat::mcs
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):66
                                                    Entropy (8bit):4.262228832346611
                                                    Encrypted:false
                                                    SSDEEP:3:fEGp6fRyv//mGoW8vMKEQXyVn:sooyv//xoQOOn
                                                    MD5:3D41FC47CD9936F817EF9645D73A77ED
                                                    SHA1:E62BBE094B71CAF4A389DE3ECD84D2EEFBA33827
                                                    SHA-256:01238293356E82F1D298896491F8B299BB7DC9C34F299C9E756254C736DA612B
                                                    SHA-512:B92582C32C4D7CD9DE6571CBB6B93DD693A8B5A80645468E2D02B80C339BE2B95D5B4878A0DA9AFFE9E2F98A6C38AAE9CC1FF2440146D0ED128FE8C9A92EECDB
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset en_gb Color Colour..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3991
                                                    Entropy (8bit):4.605712650627941
                                                    Encrypted:false
                                                    SSDEEP:48:n680lhrzes/QEkFH+nl0WXqQ+pISIKU/ujHMytuXcFSpxvy:n680XeqfkFelPXqVpISIKUWgRTy
                                                    MD5:E44F82EAF651D065CA1A2D5FA3C91C25
                                                    SHA1:F0EA1C39DED47232B21D0DCDD5179071C5717C55
                                                    SHA-256:37FC66686349A955935CB24B0BD524E91823D2A631E63D54FDF17733C7502CBE
                                                    SHA-512:A2ECA0A1C06406158CA8D2066639C0C6B582969D5F01C0559838E93A3AEFFFC50EB54B26328DAA81742016650FC790B1F81841E40EFE4F885626902D82989DD7
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset eo "&Abort" "&\u0108esigo".. ::msgcat::mcset eo "&About..." "Pri...".. ::msgcat::mcset eo "All Files" "\u0108ioj dosieroj".. ::msgcat::mcset eo "Application Error" "Aplikoerraro".. ::msgcat::mcset eo "&Blue" "&Blua".. ::msgcat::mcset eo "Cancel" "Rezignu".. ::msgcat::mcset eo "&Cancel" "&Rezignu".. ::msgcat::mcset eo "Cannot change to the directory \"%1\$s\".\nPermission denied." "Neeble \u0109angi al dosierulon \"%1\$s\".\nVi ne rajtas tion.".. ::msgcat::mcset eo "Choose Directory" "Elektu Dosierujo".. ::msgcat::mcset eo "Cl&ear" "&Klaru".. ::msgcat::mcset eo "&Clear Console" "&Klaru konzolon".. ::msgcat::mcset eo "Color" "Farbo".. ::msgcat::mcset eo "Console" "Konzolo".. ::msgcat::mcset eo "&Copy" "&Kopiu".. ::msgcat::mcset eo "Cu&t" "&Enpo\u015digu".. ::msgcat::mcset eo "&Delete" "&Forprenu".. ::msgcat::mcset eo "Details >>" "Detaloj >>".. ::msgcat::mcset eo "Directory \"%1\$s\" does not ex
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4024
                                                    Entropy (8bit):4.536517819515934
                                                    Encrypted:false
                                                    SSDEEP:48:nN0T1Lt8ZYSih/aiik148aFscyTzoixccUTqjcg60Dx/H5:nN0BLSQUXy/o8re055
                                                    MD5:4765F3C055742530E4644771EBC6C69F
                                                    SHA1:8BEA722AC00522DEAA5B380AEEF4CA57D7A271BD
                                                    SHA-256:D2842B80F1B521EFF2D2656A69274B5F2A8F4F5831AF2E8EE73E3C37389F981F
                                                    SHA-512:9CA247F22797A1A1FCA42B5CDABF58262ED95EECDDD321CEB1440A60A4375923E0F511238F360D159EB5EED6F82CBBE0B8907A07CC77DB831BF97082932CD0FD
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset es "&Abort" "&Abortar".. ::msgcat::mcset es "&About..." "&Acerca de ...".. ::msgcat::mcset es "All Files" "Todos los archivos".. ::msgcat::mcset es "Application Error" "Error de la aplicaci\u00f3n".. ::msgcat::mcset es "&Blue" "&Azul".. ::msgcat::mcset es "Cancel" "Cancelar".. ::msgcat::mcset es "&Cancel" "&Cancelar".. ::msgcat::mcset es "Cannot change to the directory \"%1\$s\".\nPermission denied." "No es posible acceder al directorio \"%1\$s\".\nPermiso denegado.".. ::msgcat::mcset es "Choose Directory" "Elegir directorio".. ::msgcat::mcset es "Cl&ear" "&Borrar".. ::msgcat::mcset es "&Clear Console" "&Borrar consola".. ::msgcat::mcset es "Color".. ::msgcat::mcset es "Console" "Consola".. ::msgcat::mcset es "&Copy" "&Copiar".. ::msgcat::mcset es "Cu&t" "Cor&tar".. ::msgcat::mcset es "&Delete" "&Borrar".. ::msgcat::mcset es "Details >>" "Detalles >>".. ::msgcat::mcset es "Directory \"%1\$s\"
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3877
                                                    Entropy (8bit):4.630737553723335
                                                    Encrypted:false
                                                    SSDEEP:48:nByEWs/3lHFB9FamsIfSAzZ2eaISAxh0BRc3jC:nByEWaRNzsSSWonMAv
                                                    MD5:E279E5FFF03E1B8E9063ABC8A499A6BD
                                                    SHA1:80910911F6B4830BA4DCBA9A9EAD12C9F802DDC9
                                                    SHA-256:3F2CEB4A33695AB6B56E27F61A4C60C029935BB026497D99CB2C246BCB4A63C4
                                                    SHA-512:8333388E421AC3F342317BEBE352809B0B190EF8B044A0BAE2FE4051974D86008BAFDCB7098E9DC39A8D9E1E08FB87F54B9D3388AF2D0185FF913DB6788C5AB5
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset fr "&Abort" "&Annuler".. ::msgcat::mcset fr "About..." "\u00c0 propos...".. ::msgcat::mcset fr "All Files" "Tous les fichiers".. ::msgcat::mcset fr "Application Error" "Erreur d'application".. ::msgcat::mcset fr "&Blue" "&Bleu".. ::msgcat::mcset fr "Cancel" "Annuler".. ::msgcat::mcset fr "&Cancel" "&Annuler".. ::msgcat::mcset fr "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossible d'acc\u00e9der au r\u00e9pertoire \"%1\$s\".\nPermission refus\u00e9e.".. ::msgcat::mcset fr "Choose Directory" "Choisir r\u00e9pertoire".. ::msgcat::mcset fr "Cl&ear" "Effacer".. ::msgcat::mcset fr "Color" "Couleur".. ::msgcat::mcset fr "Console".. ::msgcat::mcset fr "Copy" "Copier".. ::msgcat::mcset fr "Cu&t" "Couper".. ::msgcat::mcset fr "Delete" "Effacer".. ::msgcat::mcset fr "Details >>" "D\u00e9tails >>".. ::msgcat::mcset fr "Directory \"%1\$s\" does not exist." "Le r\u00e9pertoire \"%1\$s\"
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4678
                                                    Entropy (8bit):4.7955991577265245
                                                    Encrypted:false
                                                    SSDEEP:96:nkCEz2TTrKmA17fzq/Hj+pUva+fQR/a5a/Thn5kU:kTqM17u/8NiMrhb
                                                    MD5:4F1610E0C73DAE668E3F9D9235631152
                                                    SHA1:63EE54A6C1A69B798C65C999D5F80A7AB252B6D8
                                                    SHA-256:E063AD7CA93F37728A65E4CD7C0433950F22607D307949F6CB056446AFEAA4FE
                                                    SHA-512:37F4B8A9CD020A77591C09AF40FBC2FA82107B2596D31B5F30CE6ECAA225417CF7A5C62FB7A93539B0D7E930D0A44F9BF2EE6BE113F831B0A72B229444672AFD
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset hu "&Abort" "&Megszak\u00edt\u00e1s".. ::msgcat::mcset hu "&About..." "N\u00e9vjegy...".. ::msgcat::mcset hu "All Files" "Minden f\u00e1jl".. ::msgcat::mcset hu "Application Error" "Alkalmaz\u00e1s hiba".. ::msgcat::mcset hu "&Blue" "&K\u00e9k".. ::msgcat::mcset hu "Cancel" "M\u00e9gsem".. ::msgcat::mcset hu "&Cancel" "M\u00e9g&sem".. ::msgcat::mcset hu "Cannot change to the directory \"%1\$s\".\nPermission denied." "A k\u00f6nyvt\u00e1rv\u00e1lt\u00e1s nem siker\u00fclt: \"%1\$s\".\nHozz\u00e1f\u00e9r\u00e9s megtagadva.".. ::msgcat::mcset hu "Choose Directory" "K\u00f6nyvt\u00e1r kiv\u00e1laszt\u00e1sa".. ::msgcat::mcset hu "Cl&ear" "T\u00f6rl\u00e9s".. ::msgcat::mcset hu "&Clear Console" "&T\u00f6rl\u00e9s Konzol".. ::msgcat::mcset hu "Color" "Sz\u00edn".. ::msgcat::mcset hu "Console" "Konzol".. ::msgcat::mcset hu "&Copy" "&M\u00e1sol\u00e1s".. ::msgcat::mcset hu "Cu&t" "&Kiv\u00e1g\u00e1s".. ::ms
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3765
                                                    Entropy (8bit):4.49679862548805
                                                    Encrypted:false
                                                    SSDEEP:48:nmU4xnonTjwUE5Xs6ZrT8BpXAg+Wr+u92C8t7mU9nUSs:nZ4FonFE58HBpXjr+fBJs
                                                    MD5:B74C54666A5A431A782DB691B4CA3315
                                                    SHA1:2BC63982C14BBA8A4C451CE31540181F40CE2216
                                                    SHA-256:806930F283FD097195C7850E3486B3815D1564529B4F8E5FA6D26F3175183BC1
                                                    SHA-512:8120E2FFD14E0A992E254796ADDC0DC995C921BE31688C0995D7A36FE82609D78791FEF73EAF5B14E2F0D40AD256AB8DAAA07C18E6950362B28E40B71E47C0B6
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset it "&Abort" "&Interrompi".. ::msgcat::mcset it "&About..." "Informazioni...".. ::msgcat::mcset it "All Files" "Tutti i file".. ::msgcat::mcset it "Application Error" "Errore dell' applicazione".. ::msgcat::mcset it "&Blue" "&Blu".. ::msgcat::mcset it "Cancel" "Annulla".. ::msgcat::mcset it "&Cancel" "&Annulla".. ::msgcat::mcset it "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossibile accedere alla directory \"%1\$s\".\nPermesso negato.".. ::msgcat::mcset it "Choose Directory" "Scegli una directory".. ::msgcat::mcset it "Cl&ear" "Azzera".. ::msgcat::mcset it "&Clear Console" "Azzera Console".. ::msgcat::mcset it "Color" "Colore".. ::msgcat::mcset it "Console".. ::msgcat::mcset it "&Copy" "Copia".. ::msgcat::mcset it "Cu&t" "Taglia".. ::msgcat::mcset it "Delete" "Cancella".. ::msgcat::mcset it "Details >>" "Dettagli >>".. ::msgcat::mcset it "Directory \"%1\$s\" does not ex
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4557
                                                    Entropy (8bit):4.524344068436489
                                                    Encrypted:false
                                                    SSDEEP:48:nucQswBju0x0M4U2z9KSSOzZL5KhWTqGGIrlxXvhYbL/ZO5NT+T4kiLzzdDf1SDM:nLGa0x0Mp2KSHKSv2bL/ZO5u6nRfAXU9
                                                    MD5:E56229BAC5A8ABB90C4DD8EE3F9FF9F8
                                                    SHA1:7527D6C3C6C84BFF0E683FFA86A21C58458EB55D
                                                    SHA-256:0914FBA42361227D14FA281E8A9CBF57C16200B4DA1E61CC3402EF0113A512C7
                                                    SHA-512:13649DDB06DB4BA9E39BEAF828211086A519444DA9AB5CBDD1B88B29208388189A5141F75AD94B56A348EDDE534FFADE8B19B557CB988EA4ECC9A84B135D36C1
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset nl "&Abort" "&Afbreken".. ::msgcat::mcset nl "&About..." "Over...".. ::msgcat::mcset nl "All Files" "Alle Bestanden".. ::msgcat::mcset nl "Application Error" "Toepassingsfout".. ::msgcat::mcset nl "&Apply" "Toepassen".. ::msgcat::mcset nl "Bold" "Vet".. ::msgcat::mcset nl "Bold Italic" "Vet Cursief".. ::msgcat::mcset nl "&Blue" "&Blauw".. ::msgcat::mcset nl "Cancel" "Annuleren".. ::msgcat::mcset nl "&Cancel" "&Annuleren".. ::msgcat::mcset nl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan niet naar map \"%1\$s\" gaan.\nU heeft hiervoor geen toestemming.".. ::msgcat::mcset nl "Choose Directory" "Kies map".. ::msgcat::mcset nl "Cl&ear" "Wissen".. ::msgcat::mcset nl "&Clear Console" "&Wis Console".. ::msgcat::mcset nl "Color" "Kleur".. ::msgcat::mcset nl "Console".. ::msgcat::mcset nl "&Copy" "Kopi\u00ebren".. ::msgcat::mcset nl "Cu&t" "Knippen".. ::msgcat::mcset nl "&Dele
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4932
                                                    Entropy (8bit):4.799369674927008
                                                    Encrypted:false
                                                    SSDEEP:48:nXra9E310fwNCeVsvSmy6MZv8lWBTDGdZ3tojTyrEQmAUCIx4wBxZ:n7a9Q0fyw5MQWgP3uoZChB3
                                                    MD5:8CFA2E38822303FDCB55AE3277F0B81B
                                                    SHA1:447F28A5064FCEA019C60B3F9B6D50CD43C2D0E3
                                                    SHA-256:EACEB1F08DE0863CCF726881E07FE5B135EA09646C5253E0CBF7DDB987EB0D92
                                                    SHA-512:E38BA9059AFF55C2B22A4AE24D6A76149C76DBA8BF8646AE81D6E07D7ED490D0605034B29D9AC848E6685C8EC26A3DBE5B2EAF462B14D96376E80076FBE7082A
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset pl "&Abort" "&Przerwij".. ::msgcat::mcset pl "&About..." "O programie...".. ::msgcat::mcset pl "All Files" "Wszystkie pliki".. ::msgcat::mcset pl "Application Error" "B\u0142\u0105d w programie".. ::msgcat::mcset pl "&Apply" "Zastosuj".. ::msgcat::mcset pl "Bold" "Pogrubienie".. ::msgcat::mcset pl "Bold Italic" "Pogrubiona kursywa".. ::msgcat::mcset pl "&Blue" "&Niebieski".. ::msgcat::mcset pl "Cancel" "Anuluj".. ::msgcat::mcset pl "&Cancel" "&Anuluj".. ::msgcat::mcset pl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nie mo\u017cna otworzy\u0107 katalogu \"%1\$s\".\nOdmowa dost\u0119pu.".. ::msgcat::mcset pl "Choose Directory" "Wybierz katalog".. ::msgcat::mcset pl "Cl&ear" "&Wyczy\u015b\u0107".. ::msgcat::mcset pl "&Clear Console" "&Wyczy\u015b\u0107 konsol\u0119".. ::msgcat::mcset pl "Color" "Kolor".. ::msgcat::mcset pl "Console" "Konsola".. ::msgcat::mcset pl "&Copy" "&Kopiu
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3987
                                                    Entropy (8bit):4.63232183429232
                                                    Encrypted:false
                                                    SSDEEP:48:nHOT1mM5qHHxiBHb3joTjtcp2UqMxweo6VvilCMKKXx9vjM:nHOT1mMQnwB/otcUUpGX6VPVoLjM
                                                    MD5:4018686F2A8E299D86BDB1478BC97896
                                                    SHA1:0EECE3D57F2EA5EECE8157B06F3AFB97E1F2551A
                                                    SHA-256:D687F71F0432BB0D02EFDF576E526D2C19D4136F76C41A3224A2F034168F3F34
                                                    SHA-512:4D730068B2A21E1D6004205B10A9D0D5EE9683FEB03B6FB673E8B9B94ED6BE468086A52DFE97C4DBF35A07CBB2C5E276DF0952A06C78E029D53D796CB6FCC8DF
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset pt "&Abort" "&Abortar".. ::msgcat::mcset pt "About..." "Sobre ...".. ::msgcat::mcset pt "All Files" "Todos os arquivos".. ::msgcat::mcset pt "Application Error" "Erro de aplica\u00e7\u00e3o".. ::msgcat::mcset pt "&Blue" "&Azul".. ::msgcat::mcset pt "Cancel" "Cancelar".. ::msgcat::mcset pt "&Cancel" "&Cancelar".. ::msgcat::mcset pt "Cannot change to the directory \"%1\$s\".\nPermission denied." "N\u00e3o foi poss\u00edvel mudar para o diret\u00f3rio \"%1\$s\".\nPermiss\u00e3o negada.".. ::msgcat::mcset pt "Choose Directory" "Escolha um diret\u00f3rio".. ::msgcat::mcset pt "Cl&ear" "Apagar".. ::msgcat::mcset pt "&Clear Console" "Apagar Console".. ::msgcat::mcset pt "Color" "Cor".. ::msgcat::mcset pt "Console".. ::msgcat::mcset pt "&Copy" "Copiar".. ::msgcat::mcset pt "Cu&t" "Recortar".. ::msgcat::mcset pt "&Delete" "Excluir".. ::msgcat::mcset pt "Details >>" "Detalhes >>".. ::msgcat::mcset pt "D
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7289
                                                    Entropy (8bit):4.396417984959623
                                                    Encrypted:false
                                                    SSDEEP:96:n9MEBG2T4YHCIxqEMk0Y2xX6wKl9zFAWS2yuV9cDcPRjnHQuNFNfz5hVV9aWTRcD:dreFqN1T+oRR/F1RHR6
                                                    MD5:803E0F9930828B103B03B55EDA173CB8
                                                    SHA1:429A30A7546123B1895C4317C65A97EBCBD16F35
                                                    SHA-256:8715E9927BA925AE8099EDF71A3D701FE396FC0E4DF039CEA7DC84120E101F47
                                                    SHA-512:379739A2C84E35C1AC70EFA9F704D3D1455741FEB60F4A1D9B0E0FD6CC3279F66A0C63C0FADFD861498D3FE13AB9E633F2C1BB05E76B3206DECEA253FFB8E33C
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset ru "&Abort" "&\u041e\u0442\u043c\u0435\u043d\u0438\u0442\u044c".. ::msgcat::mcset ru "&About..." "\u041f\u0440\u043e...".. ::msgcat::mcset ru "All Files" "\u0412\u0441\u0435 \u0444\u0430\u0439\u043b\u044b".. ::msgcat::mcset ru "Application Error" "\u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435".. ::msgcat::mcset ru "&Blue" " &\u0413\u043e\u043b\u0443\u0431\u043e\u0439".. ::msgcat::mcset ru "Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "&Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "Cannot change to the directory \"%1\$s\".\nPermission denied." \....."\u041d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \"%1\$s\".\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3908
                                                    Entropy (8bit):4.658068191079967
                                                    Encrypted:false
                                                    SSDEEP:48:nT8A5cbwKmtI1sE9xt6BDyepTr2iiK/yGqXZlBp9:nD5cb2extDepTCnVpJ9
                                                    MD5:1D085A672A6FCDECEF5D7D876E4C74A3
                                                    SHA1:1A40C03F15A6926359CA3E5C0A809485CAD28AEE
                                                    SHA-256:A6821A13D34FB31F1827294B82C4BF9586BB255CA14F78C3ACE11181F42EF211
                                                    SHA-512:981EDEEF5E4C915BB8F10044096B412D1855CAD08F98A448C6C0A49A54222945EBD102DDCB9525535E0FB19313C319155FA59384605B2C36CC8B4A58693D57E7
                                                    Malicious:false
                                                    Preview:namespace eval ::tk {.. ::msgcat::mcset sv "&Abort" "&Avsluta".. ::msgcat::mcset sv "&About..." "&Om...".. ::msgcat::mcset sv "All Files" "Samtliga filer".. ::msgcat::mcset sv "Application Error" "Programfel".. ::msgcat::mcset sv "&Blue" "&Bl\u00e5".. ::msgcat::mcset sv "Cancel" "Avbryt".. ::msgcat::mcset sv "&Cancel" "&Avbryt".. ::msgcat::mcset sv "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ej n\u00e5 mappen \"%1\$s\".\nSaknar r\u00e4ttigheter.".. ::msgcat::mcset sv "Choose Directory" "V\u00e4lj mapp".. ::msgcat::mcset sv "Cl&ear" "&Radera".. ::msgcat::mcset sv "&Clear Console" "&Radera konsollen".. ::msgcat::mcset sv "Color" "F\u00e4rg".. ::msgcat::mcset sv "Console" "Konsoll".. ::msgcat::mcset sv "&Copy" "&Kopiera".. ::msgcat::mcset sv "Cu&t" "Klipp u&t".. ::msgcat::mcset sv "&Delete" "&Radera".. ::msgcat::mcset sv "Details >>" "Detaljer >>".. ::msgcat::mcset sv "Directory \"%1\$s\" does not exist." "Mapp
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5772
                                                    Entropy (8bit):5.038729016734604
                                                    Encrypted:false
                                                    SSDEEP:96:onzxtm7EMgdMjwPqeuAmz9LD1kFIQETZqoIK/RLf7w:ozxtm7qUwi79l0sZqoBJLDw
                                                    MD5:FC9E03823BEB08DAF7681C09D106DF7D
                                                    SHA1:7D06FC8F98140E0FFAA2571BD522FC772E58DE54
                                                    SHA-256:540EEECBA17207A56290BAFFDAE882BBD4F88364791204AD5D14C7BEDD022CCC
                                                    SHA-512:2B5BAD311A703A0FE2ED67ACE311BAD4C767BCD23DFC3D9ABDF5C3604146A6A15D6BD13A14BDEFCDB2B602C708AACFAB404E96FCBA7C546AD0DAECD4BE2EB34A
                                                    Malicious:false
                                                    Preview:# obsolete.tcl --..#..# This file contains obsolete procedures that people really shouldn't..# be using anymore, but which are kept around for backward compatibility...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# The procedures below are here strictly for backward compatibility with..# Tk version 3.6 and earlier. The procedures are no longer needed, so..# they are no-ops. You should not use these procedures anymore, since..# they may be removed in some future release.....proc tk_menuBar args {}..proc tk_bindForTraversal args {}....# ::tk::classic::restore --..#..# Restore the pre-8.5 (Tk classic) look as the widget defaults for classic..# Tk widgets...#..# The value following an 'option add' call is the new 8.5 value...#..namespace eval ::tk::classic {.. # This may need t
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1629
                                                    Entropy (8bit):4.784780799273752
                                                    Encrypted:false
                                                    SSDEEP:48:g2hBuOrlkBytcqYXRE5fvvXq1EhJPqOj6Wf0cVlN:gQ6q4E5HCqhBqOhcaD
                                                    MD5:9B7A8FD2C6B538FF31BDC380452C6DE3
                                                    SHA1:3F915BFE85CED9F6C7E9A352718770E9F14F098E
                                                    SHA-256:40CA505C9784B0767D4854485C5C311829594A4FCBDFD7251E60E6BB7EA74FD1
                                                    SHA-512:43937152B844BE1E597E99DA1270E54AB1D572AE89CB759E6D41C18C9C8044CCC15A6925F9C5AF617AE9EC1404E78C2733231F4D5C6CFE4D23C546387B1FC328
                                                    Malicious:false
                                                    Preview:# optMenu.tcl --..#..# This file defines the procedure tk_optionMenu, which creates..# an option button and its associated menu...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_optionMenu --..# This procedure creates an option button named $w and an associated..# menu. Together they provide the functionality of Motif option menus:..# they can be used to select one of many values, and the current value..# appears in the global variable varName, as well as in the text of..# the option menubutton. The name of the menu is returned as the..# procedure's result, so that the caller can use it to change configuration..# options on the menu or otherwise manipulate it...#..# Arguments:..# w -...The name to use for the menubutton...# varName -..Global variable to hold the currently
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8418
                                                    Entropy (8bit):4.964814946573677
                                                    Encrypted:false
                                                    SSDEEP:192:HWh/x+hFMyTA/CTzxFoUuliRLDm8pQrQlENPyF3o48M6C:HWL+MyTA/CTzvAiRqyEw3ok
                                                    MD5:4CE08A10CD9AE941654B8C679DF669F3
                                                    SHA1:F1288BABCA698FD18C3BD221E6AE6C02F2975AAE
                                                    SHA-256:849B4C57E4644E51BEAEAEB3AE59B7FF067E582ECD10F1B2CAF6B6E72F11F506
                                                    SHA-512:0F37539DA3540E9B1DA7B0377E3BBB359B71DB4271D63BC9501E95931B4E609E8CB91DC2F7B08A6452598D4A0D58C6A2034049A215000EEF0F93A9963D003632
                                                    Malicious:false
                                                    Preview:# palette.tcl --..#..# This file contains procedures that change the color palette used..# by Tk...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_setPalette --..# Changes the default color scheme for a Tk application by setting..# default colors in the option database and by modifying all of the..# color options for existing widgets that have the default value...#..# Arguments:..# The arguments consist of either a single color name, which..# will be used as the new background color (all other colors will..# be computed from this) or an even number of values consisting of..# option names and values. The name for an option is the one used..# for the option database, such as activeForeground, not -activeforeground.....proc ::tk_setPalette {args} {.. if {[winfo depth .] == 1} {...# Just return on monochrome displays, otherwise errors
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5370
                                                    Entropy (8bit):4.979530133775421
                                                    Encrypted:false
                                                    SSDEEP:96:ssAXzkTQ9w5fLQYkJLZkRXKUXfwyZTq2sz8j2Em3YKhrYK:jAXgE0DQpJLGR6UXfpqnzG3m3YKhrYK
                                                    MD5:286C01A1B12261BC47F5659FD1627ABD
                                                    SHA1:4CA36795CAB6DFE0BBBA30BB88A2AB71A0896642
                                                    SHA-256:AA4F87E41AC8297F51150F2A9F787607690D01793456B93F0939C54D394731F9
                                                    SHA-512:D54D5A89B7408A9724A1CA1387F6473BDAD33885194B2EC5A524C7853A297FD65CE2A57F571C51DB718F6A00DCE845DE8CF5F51698F926E54ED72CDC81BCFE54
                                                    Malicious:false
                                                    Preview:# panedwindow.tcl --..#..# This file defines the default bindings for Tk panedwindow widgets and..# provides procedures that help in implementing those bindings.....bind Panedwindow <Button-1> { ::tk::panedwindow::MarkSash %W %x %y 1 }..bind Panedwindow <Button-2> { ::tk::panedwindow::MarkSash %W %x %y 0 }....bind Panedwindow <B1-Motion> { ::tk::panedwindow::DragSash %W %x %y 1 }..bind Panedwindow <B2-Motion> { ::tk::panedwindow::DragSash %W %x %y 0 }....bind Panedwindow <ButtonRelease-1> {::tk::panedwindow::ReleaseSash %W 1}..bind Panedwindow <ButtonRelease-2> {::tk::panedwindow::ReleaseSash %W 0}....bind Panedwindow <Motion> { ::tk::panedwindow::Motion %W %x %y }....bind Panedwindow <Leave> { ::tk::panedwindow::Leave %W }....# Initialize namespace..namespace eval ::tk::panedwindow {}....# ::tk::panedwindow::MarkSash --..#..# Handle marking the correct sash for possible dragging..#..# Arguments:..# w..the widget..# x..widget local x coord..# y..widget local y coord..# proxy.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):376
                                                    Entropy (8bit):5.040809246948068
                                                    Encrypted:false
                                                    SSDEEP:6:CsUgabAOgjDnzJNBc6ynID/cL4RpncleXN17MQ9PQqBIQ08hof7MQ9PQqBIQei:lGbyntNO6LYZliPBIUhkPBIFi
                                                    MD5:3367CE12A4BA9BAAF7C5127D7412AA6A
                                                    SHA1:865C775BB8F56C3C5DFC8C71BFAF9EF58386161D
                                                    SHA-256:3F2539E85E2A9017913E61FE2600B499315E1A6F249A4FF90E0B530A1EEB8898
                                                    SHA-512:F5D858F17FE358762E8FDBBF3D78108DBA49BE5C5ED84B964143C0ADCE76C140D904CD353646EC0831FF57CD0A0AF864D1833F3946A235725FFF7A45C96872EB
                                                    Malicious:false
                                                    Preview:if {![package vsatisfies [package provide Tcl] 8.6.0]} return..if {($::tcl_platform(platform) eq "unix") && ([info exists ::env(DISPLAY)]...|| ([info exists ::argv] && ("-display" in $::argv)))} {.. package ifneeded Tk 8.6.12 [list load [file join $dir .. .. bin libtk8.6.dll]]..} else {.. package ifneeded Tk 8.6.12 [list load [file join $dir .. .. bin tk86t.dll]]..}..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7632
                                                    Entropy (8bit):4.891666209090638
                                                    Encrypted:false
                                                    SSDEEP:192:Eet0t8bm9Z+Yjo+j/YKOtOUOtk8XKUal320:EetG8biZZs+bIAUoxX0d
                                                    MD5:21A3AC11146EC26784C0E729D8D644D0
                                                    SHA1:C7E0918E8692C42C1D1DD1BBCBFFF22A85979B69
                                                    SHA-256:579701605669AADFFBCDB7E3545C68442495428EE6E93C2D3A3133583BCD3D33
                                                    SHA-512:724ED83B989AD9033BEC4211EE50E4C9E85B51054C518CDF7E02D0ED0416F636B9F38C0B0D29F8F4F7F465B77C7D2E01D0918D2C2C3FEC4C7739EA982302FA2E
                                                    Malicious:false
                                                    Preview:# safetk.tcl --..#..# Support procs to use Tk in safe interpreters...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# see safetk.n for documentation....#..#..# Note: It is now ok to let untrusted code being executed..# between the creation of the interp and the actual loading..# of Tk in that interp because the C side Tk_Init will..# now look up the parent interp and ask its safe::TkInit..# for the actual parameters to use for it's initialization (if allowed),..# not relying on the child state...#....# We use opt (optional arguments parsing)..package require opt 0.4.1;....namespace eval ::safe {.... # counter for safe toplevels.. variable tkSafeId 0..}....#..# tkInterpInit : prepare the child interpreter for tk loading..# most of the real job is done by loadTk..# returns the child name (tkInterpInit
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8056
                                                    Entropy (8bit):4.979589163397994
                                                    Encrypted:false
                                                    SSDEEP:96:GSusE8YOdpO4aDtao+QYa6t2jooB6ajpaqa5xQz9MUKOC9dLrVx:KsbYQO48t+QYa+NkFjpaQz5KX9dLrVx
                                                    MD5:857ADD6060A986063B0ED594F6B0CD26
                                                    SHA1:B1981D33DDEA81CFFFA838E5AC80E592D9062E43
                                                    SHA-256:0DA2DC955FFD71062A21C3B747D9D59D66A5B09A907B9ED220BE1B2342205A05
                                                    SHA-512:7D9829565EFC8CDBF9249913DA95B02D8DADFDB3F455FD3C10C5952B5454FE6E54D95C07C94C1E0D7568C9742CAA56182B3656E234452AEC555F0FCB76A59FB1
                                                    Malicious:false
                                                    Preview:# scale.tcl --..#..# This file defines the default bindings for Tk scale widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for entries...#-------------------------------------------------------------------------....# Standard Motif bindings:....bind Scale <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. tk::ScaleActivate %W %x %y..}..bind Scale <Motion> {.. tk::ScaleActivate %W %x %y..}..bind Scale <Leave> {.. if {$tk_strictMotif} {...%W configure -activebackground
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):13188
                                                    Entropy (8bit):5.063842571848725
                                                    Encrypted:false
                                                    SSDEEP:192:Gf7RV8ei32PHKT8H2wwucyRlXn+kl1nBKp4nu5FCyK:2mei3qHKT8WPurnXn+I1nBg4nu5MyK
                                                    MD5:5249CD1E97E48E3D6DEC15E70B9D7792
                                                    SHA1:612E021BA25B5E512A0DFD48B6E77FC72894A6B9
                                                    SHA-256:EEC90404F702D3CFBFAEC0F13BF5ED1EBEB736BEE12D7E69770181A25401C61F
                                                    SHA-512:E4E0AB15EB9B3118C30CD2FF8E5AF87C549EAA9B640FFD809A928D96B4ADDEFB9D25EFDD1090FBD0019129CDF355BB2F277BC7194001BA1D2ED4A581110CEAFC
                                                    Malicious:false
                                                    Preview:# scrlbar.tcl --..#..# This file defines the default bindings for Tk scrollbar widgets...# It also provides procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for scrollbars...#-------------------------------------------------------------------------....# Standard Motif bindings:..if {[tk windowingsystem] eq "x11" || [tk windowingsystem] eq "aqua"} {....bind Scrollbar <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. %W activate [%W identify %x %y]..}..bind Scrollbar <Motion> {.. %W activate [%
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16526
                                                    Entropy (8bit):5.033807343600737
                                                    Encrypted:false
                                                    SSDEEP:384:IMpfy/Ku9TzD0E8+9T1wqBaQKpiqQr7E32fnzXfWJU:IMpfy/Ku9Tx8WODTp2zPP
                                                    MD5:77DFE1BACCD165A0C7B35CDEAA2D1A8C
                                                    SHA1:426BA77FC568D4D3A6E928532E5BEB95388F36A0
                                                    SHA-256:2FF791A44406DC8339C7DA6116E6EC92289BEE5FC1367D378F48094F4ABEA277
                                                    SHA-512:E56DB85296C8661AB2EA0A56D9810F1A4631A9F9B41337560CBE38CCDF7DD590A3E65C22B435CE315EFF55EE5B8E49317D4E1B7577E25FC3619558015DD758EB
                                                    Malicious:false
                                                    Preview:# spinbox.tcl --..#..# This file defines the default bindings for Tk spinbox widgets and provides..# procedures that help in implementing those bindings. The spinbox builds..# off the entry widget, so it can reuse Entry bindings and procedures...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1999-2000 Jeffrey Hobbs..# Copyright (c) 2000 Ajuba Solutions..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#.
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):20523
                                                    Entropy (8bit):4.786929402401609
                                                    Encrypted:false
                                                    SSDEEP:384:eeVL0UI9Ms++J7VT/hc+ISyNsATbOan/uW/UFQ1gs1gxtKZufe2SvdJcmq/YbhEB:eeF0UI9Ms++J7VT/hc+ISyCATbOan2W+
                                                    MD5:9378397DD3DCA9DFB181F6F512B15631
                                                    SHA1:4F95DD6B658B6A912725DC7D6226F8414020D6C7
                                                    SHA-256:B04B1A675572E6FCD12C5FE82C4FD0930395548436FF93D848BF340AE202E7E3
                                                    SHA-512:D28CC3C8F3D0B1B2371CBD9EE29AC6881BABD8A07C762FF8F3284449998EE44FA44752CC8AB0DE47A3492776CE1D13BC8EA18CFDBDF710639D2D62D02CB917A9
                                                    Malicious:false
                                                    Preview:# Tcl autoload index file, version 2.0..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(::tk::dialog::error::Return) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Details) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::SaveToLog) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Destroy) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::ButtonInvoke) [list source [file join $dir button.tcl]]..set auto_index(::tk::ButtonAutoInvoke) [list sou
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5309
                                                    Entropy (8bit):4.74935501162253
                                                    Encrypted:false
                                                    SSDEEP:96:wfQXIqAv6iEwYtKVlPBnXWASbvMsDjXKpQQkK2tTsSZQ7Fowqm2K5r:wf+IqI6iU43PJYbvMsDjXKpsK2tISyZV
                                                    MD5:5F042DE8AD8941C7B9EF6D7BE06C86E4
                                                    SHA1:A4DFCEA2ACCAC2E85EAAA186DC765086D1E3AA3C
                                                    SHA-256:A4A8568633F827B54326640E6D1C3FDE4978EDC9E9FA1FB1D7B58F189DF1B1DC
                                                    SHA-512:E92A00028696A1557666CAB1C25AE6B63F25D75A9811BFAC56DFC069ECC769CC751B71CC81FA85C9CDE8F7FB6D7121EB64B58548CEE8AFE3F6C4A5C243507216
                                                    Malicious:false
                                                    Preview:# tearoff.tcl --..#..# This file contains procedures that implement tear-off menus...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk::TearoffMenu --..# Given the name of a menu, this procedure creates a torn-off menu..# that is identical to the given menu (including nested submenus)...# The new torn-off menu exists as a toplevel window managed by the..# window manager. The return value is the name of the new menu...# The window is created at the point specified by x and y..#..# Arguments:..# w -...The menu to be torn-off (duplicated)...# x -...x coordinate where window is created..# y -...y coordinate where window is created....proc ::tk::TearOffMenu {w {x 0} {y 0}} {.. # Find a unique name to use for the torn-off menu. Find the first.. # ancestor of w that is a
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):34961
                                                    Entropy (8bit):4.958000555615616
                                                    Encrypted:false
                                                    SSDEEP:768:Rp4LaQDlJrqquMwIMyv4Et8avJLgmTGXs1bYMeNnnZl8n6KRD:R/K8aymTGs1b0xncn6KR
                                                    MD5:7C2AC370DE0B941AE13572152419C642
                                                    SHA1:7598CC20952FA590E32DA063BF5C0F46B0E89B15
                                                    SHA-256:4A42AD370E0CD93D4133B49788C0B0E1C7CD78383E88BACB51CB751E8BFDA15E
                                                    SHA-512:8325A33BFD99F0FCE4F14ED5DC6E03302F6FFABCE9D1ABFEFC24D16A09AB3439A4B753CBF06B28D8C95E4DDABFB9082C9B030619E8955A7E656BD6C61B9256C3
                                                    Malicious:false
                                                    Preview:# text.tcl --..#..# This file defines the default bindings for Tk text widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of ::tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# char -..Character position on the line; kept in order..#...to allow moving up or down past short lines while..#...still remembering the desired position...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button we
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:Tcl script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):24266
                                                    Entropy (8bit):5.1375522500072925
                                                    Encrypted:false
                                                    SSDEEP:384:Nuyxt+WaB9USY15gSgC3DbTbXLXKr3cIXyDAbK2LMGgtewT+3oFQRyH5bAy59Hmc:NuItNe9USZblXysm7GgteoFQRYMSySL
                                                    MD5:338184E46BD23E508DAEDBB11A4F0950
                                                    SHA1:437DB31D487C352472212E8791C8252A1412CB0E
                                                    SHA-256:0F617D96CBF213296D7A5F7FCFFBB4AE1149840D7D045211EF932E8DD66683E9
                                                    SHA-512:8FB8A353EECD0D19638943F0A9068DCCEBF3FB66D495EA845A99A89229D61A77C85B530F597FD214411202055C1FAA9229B6571C591C9F4630490E1EB30B9CD3
                                                    Malicious:false
                                                    Preview:# tk.tcl --..#..# Initialization script normally executed in the interpreter for each Tk-based..# application. Arranges class bindings for widgets...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....# Verify that we have Tk binary and script components from the same release..package require -exact Tk 8.6.12.....# Create a ::tk namespace..namespace eval ::tk {.. # Set up the msgcat commands.. namespace eval msgcat {...namespace export mc mcmax.. if {[interp issafe] || [catch {package require msgcat}]} {.. # The msgcat package is not available. Supply our own.. # minimal replacement... proc mc {src args} {.. return [format $src {*}$args].. }.. proc mc
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):39613
                                                    Entropy (8bit):5.1830399016984146
                                                    Encrypted:false
                                                    SSDEEP:768:+oj+AqE9cn9eJNgDN0/vsKulXgx65Eh6pSb:+6+ZM/gAEdix65Ehpb
                                                    MD5:47635811AAA1CEB26EDA3930D91C8855
                                                    SHA1:F071757BED525AF8CA21BFA0FCA89EC3F95AA278
                                                    SHA-256:595A0B05EB2CBD4CF489E57624B509FC3B4885E6410CA6416E7521D23694373D
                                                    SHA-512:A374126EC28E70C89EE247A591C2168DF55E110F260664F46F470C53CDA3A2411C3775391FC8FD575CEE69CD1768512E68CDDCB335204D00B9EB81906AC79344
                                                    Malicious:false
                                                    Preview:# tkfbox.tcl --..#..#.Implements the "TK" standard file selection dialog box. This dialog..#.box is used on the Unix platforms whenever the tk_strictMotif flag is..#.not set...#..#.The "TK" standard file selection dialog box is similar to the file..#.selection dialog box on Win95(TM). The user can navigate the..#.directories by clicking on the folder icons or by selecting the..#."Directory" option menu. The user can select files by clicking on the..#.file icons or by entering a filename in the "Filename:" entry...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {.. namespace import -force ::tk::msgcat::*.. variable showHiddenBtn 0.. variable showHiddenVar 1.... # Create the images if they did not already exist... if {![info exists ::tk::Priv(updirImage)]} {...s
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3713
                                                    Entropy (8bit):4.915055696129498
                                                    Encrypted:false
                                                    SSDEEP:48:InrWdo3L7Fe5qusQGdrMNnQbfIxEOxE0kFgG0FgGouox9FrGVuwg3kNcT+z5UlEr:UWdsOBn/1i+pqxwNjKs
                                                    MD5:01F28512E10ACBDDF93AE2BB29E343BC
                                                    SHA1:C9CF23D6315218B464061F011E4A9DC8516C8F1F
                                                    SHA-256:AE0437FB4E0EBD31322E4EACA626C12ABDE602DA483BB39D0C5EE1BC00AB0AF4
                                                    SHA-512:FE3BAE36DDB67F6D7A90B7A91B6EC1A009CF26C0167C46635E5A9CEAEC9083E59DDF74447BF6F60399657EE9604A2314B170F78A921CF948B2985DDF02A89DA6
                                                    Malicious:false
                                                    Preview:#..# Ttk widget set: Alternate theme..#....namespace eval ttk::theme::alt {.... variable colors.. array set colors {...-frame .."#d9d9d9"...-window.."#ffffff"...-darker ."#c3c3c3"...-border.."#414141"...-activebg ."#ececec"...-disabledfg."#a3a3a3"...-selectbg."#4a6984"...-selectfg."#ffffff"...-altindicator."#aaaaaa".. }.... ttk::style theme settings alt {.....ttk::style configure "." \... -background .$colors(-frame) \... -foreground .black \... -troughcolor.$colors(-darker) \... -bordercolor.$colors(-border) \... -selectbackground .$colors(-selectbg) \... -selectforeground .$colors(-selectfg) \... -font ..TkDefaultFont \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)] ;...ttk::style map "." -foreground [list disabled $colors(-disabledfg)] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -padding "1 1" \... -reli
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3838
                                                    Entropy (8bit):4.940737732832436
                                                    Encrypted:false
                                                    SSDEEP:48:WdbclJFvlyLi+8OWXgQahpvAdNutdHrFBlCFBK2tdHkFBlhKgY1geAWUWeFVvtdp:C8EQPNeWgFeqdXj
                                                    MD5:F07A3A86362E9E253BE91F59714FE134
                                                    SHA1:84DE1AB2EAE62E4B114F0E613BD94955AFA9E6C7
                                                    SHA-256:E199CC9C429B35A09721D0A22543C3729E2B8462E68DFA158C0CEC9C70A0D79D
                                                    SHA-512:324EAF9F857076CA4FECB26D8DF76F8BB1D3F15EAE55D6B6C9689BF1682B306AC7A3592B6A518D23F9FE4DC21EFB6ACF1ECA948F889FA1ADFFA0E12C0BEAB57F
                                                    Malicious:false
                                                    Preview:#..# Aqua theme (OSX native look and feel)..#....namespace eval ttk::theme::aqua {.. ttk::style theme settings aqua {.....ttk::style configure . \... -font TkDefaultFont \... -background systemWindowBackgroundColor \... -foreground systemLabelColor \... -selectbackground systemSelectedTextBackgroundColor \... -selectforeground systemSelectedTextColor \... -selectborderwidth 0 \... -insertwidth 1.....ttk::style map . \... -foreground {....disabled systemDisabledControlTextColor....background systemLabelColor} \... -selectbackground {....background systemSelectedTextBackgroundColor....!focus systemSelectedTextBackgroundColor} \... -selectforeground {....background systemSelectedTextColor....!focus systemSelectedTextColor}.....# Button...ttk::style configure TButton -anchor center -width -6 \... -foreground systemControlTextColor...ttk::style map TButton \... -foreground {....pressed white... {alternate !pressed !background} white}...ttk::styl
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3014
                                                    Entropy (8bit):4.917794267131833
                                                    Encrypted:false
                                                    SSDEEP:48:A5N+EqJWR1eTC01cG61ELLgrDgk1JgQ6TQGvhV5giT6TUP+3JWMHTeJ:kN+RQfccG61ooDgQ6dNT6TUP+PHO
                                                    MD5:D4BF1AF5DCDD85E3BD11DBF52EB2C146
                                                    SHA1:B1691578041319E671D31473A1DD404855D2038B
                                                    SHA-256:E38A9D1F437981AA6BF0BDD074D57B769A4140C0F7D9AFF51743FE4ECC6DFDDF
                                                    SHA-512:25834B4B231F4FF1A88EEF67E1A102D1D0546EC3B0D46856258A6BE6BBC4B381389C28E2EB60A01FF895DF24D6450CD16CA449C71F82BA53BA438A4867A47DCD
                                                    Malicious:false
                                                    Preview:#..# Bindings for Buttons, Checkbuttons, and Radiobuttons...#..# Notes: <Button1-Leave>, <Button1-Enter> only control the "pressed"..# state; widgets remain "active" if the pointer is dragged out...# This doesn't seem to be conventional, but it's a nice way..# to provide extra feedback while the grab is active...# (If the button is released off the widget, the grab deactivates and..# we get a <Leave> event then, which turns off the "active" state)..#..# Normally, <ButtonRelease> and <ButtonN-Enter/Leave> events are..# delivered to the widget which received the initial <Button>..# event. However, Tk [grab]s (#1223103) and menu interactions..# (#1222605) can interfere with this. To guard against spurious..# <Button1-Enter> events, the <Button1-Enter> binding only sets..# the pressed state if the button is currently active...#....namespace eval ttk::button {}....bind TButton <Enter> ..{ %W instate !disabled {%W state active} }..bind TButton <Leave>..{ %W state !active }..bind TButton <s
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4809
                                                    Entropy (8bit):4.905115353394083
                                                    Encrypted:false
                                                    SSDEEP:48:KrS4se/XhW03cC7TxPp/uo1ZUb0WZvSoetCgV+tMWG3xT3xgNB4x76FAuoxVYuIJ:oS4sSjWwFAGkhiP3xT3xL6B2bbe
                                                    MD5:2B20E7B2E6BDDBEB14F5F63BF38DBF24
                                                    SHA1:43DB48094C4BD7DE3B76AFBC051D887FEFE9887E
                                                    SHA-256:CFFC59931FDD1683AD23895E92522CF49B099128753FCDFF34374024E42CF995
                                                    SHA-512:1EB5EA78D26D18EAD6563AFBF1798F71723001DCC945E7DB3E4368564D0563029BE3565876AD8CB97331CFE34B2A0A313FA1BF252B87049160FE5DCD65434775
                                                    Malicious:false
                                                    Preview:#..# "Clam" theme...#..# Inspired by the XFCE family of Gnome themes...#....namespace eval ttk::theme::clam {.. variable colors.. array set colors {...-disabledfg.."#999999"...-frame .."#dcdad5"...-window .."#ffffff"...-dark..."#cfcdc8"...-darker .."#bab5ab"...-darkest.."#9e9a91"...-lighter.."#eeebe7"...-lightest .."#ffffff"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-altindicator.."#5895bc"...-disabledaltindicator."#a0a0a0".. }.... ttk::style theme settings clam {.....ttk::style configure "." \... -background $colors(-frame) \... -foreground black \... -bordercolor $colors(-darkest) \... -darkcolor $colors(-dark) \... -lightcolor $colors(-lighter) \... -troughcolor $colors(-darker) \... -selectbackground $colors(-selectbg) \... -selectforeground $colors(-selectfg) \... -selectborderwidth 0 \... -font TkDefaultFont \... ;.....ttk::style map "." \... -background [list disabled $colors(-frame) \..... active $colors(-lighter)] \..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3864
                                                    Entropy (8bit):4.935603001745302
                                                    Encrypted:false
                                                    SSDEEP:48:zcJZjdWs+WVB4ULsMF7tnvnuSuqo5DKxiFgG0FgGHx9FrGTtu/3Kt+iW2PbuAk38:zcJZEstB4UoituSm+VtYErY
                                                    MD5:0205663142775F4EF2EB104661D30979
                                                    SHA1:452A0D613288A1CC8A1181C3CC1167E02AA69A73
                                                    SHA-256:424BBA4FB6836FEEBE34F6C176ED666DCE51D2FBA9A8D7AA756ABCBBAD3FC1E3
                                                    SHA-512:FB4D212A73A6F5A8D2774F43D310328B029B52B35BEE133584D8326363B385AB7AA4AE25E98126324CC716962888321E0006E5F6EF8563919A1D719019B2D117
                                                    Malicious:false
                                                    Preview:#..# "classic" Tk theme...#..# Implements Tk's traditional Motif-like look and feel...#....namespace eval ttk::theme::classic {.... variable colors; array set colors {...-frame.."#d9d9d9"...-window.."#ffffff"...-activebg."#ececec"...-troughbg."#c3c3c3"...-selectbg."#c3c3c3"...-selectfg."#000000"...-disabledfg."#a3a3a3"...-indicator."#b03060"...-altindicator."#b05e5e".. }.... ttk::style theme settings classic {...ttk::style configure "." \... -font..TkDefaultFont \... -background..$colors(-frame) \... -foreground..black \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -troughcolor.$colors(-troughbg) \... -indicatorcolor.$colors(-frame) \... -highlightcolor.$colors(-frame) \... -highlightthickness.1 \... -selectborderwidth.1 \... -insertwidth.2 \... ;.....# To match pre-Xft X11 appearance, use:...#.ttk::style configure . -font {Helvetica 12 bold}.....ttk::style map "." -background \... [list disabled
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):12718
                                                    Entropy (8bit):5.063548300335668
                                                    Encrypted:false
                                                    SSDEEP:192:otLzBJ9SfinaXUBLPYXlk7fKiLH+AzIoJdJwGknmyLsxoVEQGITse8g5sarkT32e:wB5aXmLPYXmrKxLL7A
                                                    MD5:F7065D345A4BFB3127C3689BF1947C30
                                                    SHA1:9631C05365B0F5A36E4CA5CBA83628CCD7FCBDE1
                                                    SHA-256:68EED4AF6D2EC5B3EA24B1122A704B040366CBE2F458103137479352FFA1475A
                                                    SHA-512:74B99B9E326680150DD5EC7263192691BCD8A71B2A4EE7F3177DEDDD43E924A7925085C6D372731A70570F96B3924450255B2F54CA3B9C44D1160CA37E715B00
                                                    Malicious:false
                                                    Preview:#..# Combobox bindings...#..# <<NOTE-WM-TRANSIENT>>:..#..#.Need to set [wm transient] just before mapping the popdown..#.instead of when it's created, in case a containing frame..#.has been reparented [#1818441]...#..#.On Windows: setting [wm transient] prevents the parent..#.toplevel from becoming inactive when the popdown is posted..#.(Tk 8.4.8+)..#..#.On X11: WM_TRANSIENT_FOR on override-redirect windows..#.may be used by compositing managers and by EWMH-aware..#.window managers (even though the older ICCCM spec says..#.it's meaningless)...#..#.On OSX: [wm transient] does utterly the wrong thing...#.Instead, we use [MacWindowStyle "help" "noActivates hideOnSuspend"]...#.The "noActivates" attribute prevents the parent toplevel..#.from deactivating when the popdown is posted, and is also..#.necessary for "help" windows to receive mouse events...#."hideOnSuspend" makes the popdown disappear (resp. reappear)..#.when the parent toplevel is deactivated (resp. reactivated)...#.(see [#18147
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4827
                                                    Entropy (8bit):4.843146795750702
                                                    Encrypted:false
                                                    SSDEEP:96:DRYEqfLDxGmxGUz4GUtaPT6t6brv0q3O4Uu0:DWEqTDbxdWaPqe5PUr
                                                    MD5:18EC3E60B8DD199697A41887BE6CE8C2
                                                    SHA1:13FF8CE95289B802A5247B1FD9DEA90D2875CB5D
                                                    SHA-256:7A2ED9D78FABCAFFF16694F2F4A2E36FF5AA313F912D6E93484F3BCD0466AD91
                                                    SHA-512:4848044442EFE75BCF1F89D8450C8ECBD441F38A83949A3CD2A56D9000CACAA2EA440CA1B32C856AB79358ACE9C7E3F70DDF0EC54AA93866223D8FEF76930B19
                                                    Malicious:false
                                                    Preview:#..# Map symbolic cursor names to platform-appropriate cursors...#..# The following cursors are defined:..#..#.standard.-- default cursor for most controls..#.""..-- inherit cursor from parent window..#.none..-- no cursor..#..#.text..-- editable widgets (entry, text)..#.link..-- hyperlinks within text..#.crosshair.-- graphic selection, fine control..#.busy..-- operation in progress..#.forbidden.-- action not allowed..#..#.hresize..-- horizontal resizing..#.vresize..-- vertical resizing..#..# Also resize cursors for each of the compass points,..# {nw,n,ne,w,e,sw,s,se}resize...#..# Platform notes:..#..# Windows doesn't distinguish resizing at the 8 compass points,..# only horizontal, vertical, and the two diagonals...#..# OSX doesn't have resize cursors for nw, ne, sw, or se corners...# We use the Tk-defined X11 fallbacks for these...#..# X11 doesn't have a "forbidden" cursor (usually a slashed circle);..# "pirate" seems to be the conventional cursor for this purpose...#..# Windows has a
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4553
                                                    Entropy (8bit):4.933885986949396
                                                    Encrypted:false
                                                    SSDEEP:96:lNl3u3lCFUeuMGN3xbVJU+N3xbVJh3IwxkxlBqatUrtY:zl3ZUe9GN3NVC+N3NVjqntUZY
                                                    MD5:FC79F42761D63172163C08F0F5C94436
                                                    SHA1:AABAB4061597D0D6DC371F46D14AAA1A859096DF
                                                    SHA-256:49AE8FAF169165BDDAF01D50B52943EBAB3656E9468292B7890BE143D0FCBC91
                                                    SHA-512:F619834A95C9DEB93F8184BCC437D701A961C77E24A831ADBD5C145556D26986BFDA2A6ACB9E8784F8B2380E122D12AC893EB1B6ACF03098922889497E1FF9EA
                                                    Malicious:false
                                                    Preview:#..# Settings for default theme...#....namespace eval ttk::theme::default {.. variable colors.. array set colors {...-frame..."#d9d9d9"...-foreground.."#000000"...-window..."#ffffff"...-text .."#000000"...-activebg.."#ececec"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-darker .."#c3c3c3"...-disabledfg.."#a3a3a3"...-indicator.."#4a6984"...-disabledindicator."#a3a3a3"...-altindicator.."#9fbdd8"...-disabledaltindicator."#c0c0c0".. }.... ttk::style theme settings default {.....ttk::style configure "." \... -borderwidth .1 \... -background .$colors(-frame) \... -foreground .$colors(-foreground) \... -troughcolor .$colors(-darker) \... -font ..TkDefaultFont \... -selectborderwidth.1 \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -insertwidth .1 \... -indicatordiameter.10 \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)]...ttk::style map "."
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):17617
                                                    Entropy (8bit):5.025882547402842
                                                    Encrypted:false
                                                    SSDEEP:384:sca9JzOyzf6yzwO+v+iPT3vKof8q3YIuR13a:sT9JzOy76wiV3YNa
                                                    MD5:89089172393C551CD1668B9C19B88290
                                                    SHA1:0B8667217A4A14289E9F6C1B384DEF5479BCA089
                                                    SHA-256:830CC3009A735E92DB70D53210C4928DD35CAAB5051ED14DEC67E06AE25CBE28
                                                    SHA-512:ABBBE6AA937AAB392BC7DCB8BBFBBEC9EE5ED2C9F10ED982D77258BD98F27EE95AC47FD7CB6761B814885EF0878E1F1557D034C9F4163D9D85B388F2B837683F
                                                    Malicious:false
                                                    Preview:#..# DERIVED FROM: tk/library/entry.tcl r1.22..#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 2004, Joe English..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ttk {.. namespace eval entry {...variable State.....set State(x) 0...set State(selectMode) none...set State(anchor) 0...set State(scanX) 0...set State(scanIndex) 0...set State(scanMoved) 0.....# Button-2 scan speed is (scanNum/scanDen) characters...# per pixel of mouse movement....# The standard Tk entry widget uses the equivalent of...# scanNum = 10, scanDen = average character width....# I don't know why that was chosen....#...set State(scanNum) 1...set State(scanDen) 1...set State(deadband) 3.;# #pixels for mouse-moved deadband... }..}....### Option database settings...#..option add *TEntry.cursor [ttk::cursor text] widg
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5732
                                                    Entropy (8bit):5.001928619185109
                                                    Encrypted:false
                                                    SSDEEP:96:NzEh94ntnVU8Z/1LkAKgW22SeLMQR8hzcksejmOF4ytZm:Sh9ahV3ZWAKgWDfktm
                                                    MD5:80331FCBE4C049FF1A0D0B879CB208DE
                                                    SHA1:4EB3EFDFE3731BD1AE9FD52CE32B1359241F13CF
                                                    SHA-256:B94C319E5A557A5665B1676D602B6495C0887C5BACF7FA5B776200112978BB7B
                                                    SHA-512:A4BD2D91801C121A880225F1F3D0C4E30BF127190CF375F6F7A49EB4239A35C49C44F453D6D3610DF0D6A7B3CB15F4E79BD9C129025CC496CEB856FCC4B6DE87
                                                    Malicious:false
                                                    Preview:#..# Font specifications...#..# This file, [source]d at initialization time, sets up the following..# symbolic fonts based on the current platform:..#..# TkDefaultFont.-- default for GUI items not otherwise specified..# TkTextFont.-- font for user text (entry, listbox, others)..# TkFixedFont.-- standard fixed width font..# TkHeadingFont.-- headings (column headings, etc)..# TkCaptionFont -- dialog captions (primary text in alert dialogs, etc.)..# TkTooltipFont.-- font to use for tooltip windows..# TkIconFont.-- font to use for icon captions..# TkMenuFont.-- used to use for menu items..#..# In Tk 8.5, some of these fonts may be provided by the TIP#145 implementation..# (On Windows and Mac OS X as of Oct 2007)...#..# +++ Platform notes:..#..# Windows:..#.The default system font changed from "MS Sans Serif" to "Tahoma"..# .in Windows XP/Windows 2000...#..#.MS documentation says to use "Tahoma 8" in Windows 2000/XP,..#.although many MS programs still use "MS Sans Serif 8"..#..#.Should use
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6641
                                                    Entropy (8bit):4.923865616450888
                                                    Encrypted:false
                                                    SSDEEP:192:toMcJQkmcE6fNuLyiCpYSmFSRwgppdT3kXdpK3dpKkNf2tOTjvAG:tRc6kFbcz2pyXz+zZ2y
                                                    MD5:4C8D90257D073F263B258F00B2A518C2
                                                    SHA1:7B58859E9B70FB37F53809CD3FFD7CF69AB310D8
                                                    SHA-256:972B13854D0E9B84DE338D6753F0F11F3A8534E7D0E51838796DAE5A1E2E3085
                                                    SHA-512:ED67F41578EE834EE8DB1FDED8AA069C0045E7058E338C451FA8E1ADE52907BED0C95631C21B8E88461571903B3DA2698A29E47F990B7A0F0DD3073E7A1BCADC
                                                    Malicious:false
                                                    Preview:#..# Bindings for Menubuttons...#..# Menubuttons have three interaction modes:..#..# Pulldown: Press menubutton, drag over menu, release to activate menu entry..# Popdown: Click menubutton to post menu..# Keyboard: <space> or accelerator key to post menu..#..# (In addition, when menu system is active, "dropdown" -- menu posts..# on mouse-over. Ttk menubuttons don't implement this)...#..# For keyboard and popdown mode, we hand off to tk_popup and let..# the built-in Tk bindings handle the rest of the interaction...#..# ON X11:..#..# Standard Tk menubuttons use a global grab on the menubutton...# This won't work for Ttk menubuttons in pulldown mode,..# since we need to process the final <ButtonRelease> event,..# and this might be delivered to the menu. So instead we..# rely on the passive grab that occurs on <Button> events,..# and transition to popdown mode when the mouse is released..# or dragged outside the menubutton...#..# ON WINDOWS:..#..# I'm not sure what the hell is going on h
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5825
                                                    Entropy (8bit):4.96378772387536
                                                    Encrypted:false
                                                    SSDEEP:96:RErUhyi5JeUQBWdz6eP8ClR6/u6AsBmPNNiREUkheLY1EVL23sN2JJjQdD:6uyiyDQBP8q6/u6AUREUsNEVq3y2jkdD
                                                    MD5:F811F3E46A4EFA73292F40D1CDDD265D
                                                    SHA1:7FC70A1984555672653A0840499954B854F27920
                                                    SHA-256:22264D8D138E2C0E9A950305B4F08557C5A73F054F8215C0D8CE03854042BE76
                                                    SHA-512:4424B7C687EB9B1804ED3B1C685F19D4D349753B374D9046240F937785C9713E8A760ADA46CB628C15F9C7983CE4A7987691C968330478C9C1A9B74E953E40AC
                                                    Malicious:false
                                                    Preview:#..# Bindings for TNotebook widget..#....namespace eval ttk::notebook {.. variable TLNotebooks ;# See enableTraversal..}....bind TNotebook <Button-1>..{ ttk::notebook::Press %W %x %y }..bind TNotebook <Right>...{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Left>...{ ttk::notebook::CycleTab %W -1; break }..bind TNotebook <Control-Tab>..{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Control-Shift-Tab>.{ ttk::notebook::CycleTab %W -1; break }..catch {..bind TNotebook <Control-ISO_Left_Tab>.{ ttk::notebook::CycleTab %W -1; break }..}..bind TNotebook <Destroy>..{ ttk::notebook::Cleanup %W }....# ActivateTab $nb $tab --..#.Select the specified tab and set focus...#..# Desired behavior:..#.+ take focus when reselecting the currently-selected tab;..#.+ keep focus if the notebook already has it;..#.+ otherwise set focus to the first traversable widget..#. in the newly-selected tab;..#.+ do not leave the focus in a deselected tab...#..proc ttk::notebook::ActivateTab {
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2290
                                                    Entropy (8bit):4.948496148661722
                                                    Encrypted:false
                                                    SSDEEP:48:zVAqE3ZF8b4rXzsqALAXsmCLFeNqkFeNXLz:zLeU4bzNs1h
                                                    MD5:619D8F54EE73AD8A373AB272FBDB94A6
                                                    SHA1:973626B5396B7E786DEDD8159D10E66B4465F9E0
                                                    SHA-256:4D08A7E29EEF731876951EF01DFA51654B6275FA3DAADB1F48FF4BBEAC238EB5
                                                    SHA-512:0D913C7DC9DAEE2B4A2A46663A07B3139D6B8F30D2F942642817504535E85616835EAA7D468851A83723A3DD711B65761376F3DF96A59A933A74EF096E13ACE9
                                                    Malicious:false
                                                    Preview:#..# Bindings for ttk::panedwindow widget...#....namespace eval ttk::panedwindow {.. variable State.. array set State {...pressed 0.. .pressX.-...pressY.-...sash .-...sashPos -.. }..}....## Bindings:..#..bind TPanedwindow <Button-1> ..{ ttk::panedwindow::Press %W %x %y }..bind TPanedwindow <B1-Motion>..{ ttk::panedwindow::Drag %W %x %y }..bind TPanedwindow <ButtonRelease-1> .{ ttk::panedwindow::Release %W %x %y }....bind TPanedwindow <Motion> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Enter> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Leave> ..{ ttk::panedwindow::ResetCursor %W }..# See <<NOTE-PW-LEAVE-NOTIFYINFERIOR>>..bind TPanedwindow <<EnteredChild>>.{ ttk::panedwindow::ResetCursor %W }....## Sash movement:..#..proc ttk::panedwindow::Press {w x y} {.. variable State.... set sash [$w identify $x $y].. if {$sash eq ""} {.. .set State(pressed) 0...return.. }.. set State(pressed) .1.. set State(pressX) .$x.. set
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1138
                                                    Entropy (8bit):4.763501917862434
                                                    Encrypted:false
                                                    SSDEEP:24:nJ8v3O0NSiio0pNFVkIks0ImxlnINgDImSgGINSyWghT:JFqS/o03fkxs0Rn+gD4v+S2F
                                                    MD5:DBF3BF0E8F04E9435E9561F740DFC700
                                                    SHA1:C7619A05A834EFB901C57DCFEC2C9E625F42428F
                                                    SHA-256:697CC0A75AE31FE9C2D85FB25DCA0AFA5D0DF9C523A2DFAD2E4A36893BE75FBA
                                                    SHA-512:D3B323DFB3EAC4A78DA2381405925C131A99C6806AF6FD8041102162A44E48BF166982A4AE4AA142A14601736716F1A628D9587E292FA8E4842BE984374CC192
                                                    Malicious:false
                                                    Preview:#..# Ttk widget set: progress bar utilities...#....namespace eval ttk::progressbar {.. variable Timers.;# Map: widget name -> after ID..}....# Autoincrement --..#.Periodic callback procedure for autoincrement mode..#..proc ttk::progressbar::Autoincrement {pb steptime stepsize} {.. variable Timers.... if {![winfo exists $pb]} {.. .# widget has been destroyed -- cancel timer...unset -nocomplain Timers($pb)...return.. }.... set Timers($pb) [after $steptime \.. .[list ttk::progressbar::Autoincrement $pb $steptime $stepsize] ].... $pb step $stepsize..}....# ttk::progressbar::start --..#.Start autoincrement mode. Invoked by [$pb start] widget code...#..proc ttk::progressbar::start {pb {steptime 50} {stepsize 1}} {.. variable Timers.. if {![info exists Timers($pb)]} {...Autoincrement $pb $steptime $stepsize.. }..}....# ttk::progressbar::stop --..#.Cancel autoincrement mode. Invoked by [$pb stop] widget code...#..proc ttk::progressbar::stop {pb} {.. variabl
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2787
                                                    Entropy (8bit):4.795451191784129
                                                    Encrypted:false
                                                    SSDEEP:48:IKADAzizZIcAlRqucObmn4AzyVN2AJyhAzukPNP:IHIBRqupmLSZkklP
                                                    MD5:F1C33CC2D47115BBECD2E7C2FCB631A7
                                                    SHA1:0123A961242ED8049B37C77C726DB8DBD94C1023
                                                    SHA-256:B909ADD0B87FA8EE08FD731041907212A8A0939D37D2FF9B2F600CD67DABD4BB
                                                    SHA-512:96587A8C3555DA1D810010C10C516CE5CCAB071557A3C8D9BD65C647C7D4AD0E35CBED0788F1D72BAFAC8C84C7E2703FC747F70D9C95F720745A1FC4A701C544
                                                    Malicious:false
                                                    Preview:# scale.tcl - Copyright (C) 2004 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# Bindings for the TScale widget....namespace eval ttk::scale {.. variable State.. array set State {...dragging 0.. }..}....bind TScale <Button-1> { ttk::scale::Press %W %x %y }..bind TScale <B1-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-1> { ttk::scale::Release %W %x %y }....bind TScale <Button-2> { ttk::scale::Jump %W %x %y }..bind TScale <B2-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-2> { ttk::scale::Release %W %x %y }....bind TScale <Button-3> { ttk::scale::Jump %W %x %y }..bind TScale <B3-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-3> { ttk::scale::Release %W %x %y }....## Keyboard navigation bindings:..#..bind TScale <<LineStart>> { %W set [%W cget -from] }..bind TScale <<LineEnd>> { %W set [%W cget -to] }....bind TScale <<PrevChar>> { ttk::scale::Increment %W -1 }..bin
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3285
                                                    Entropy (8bit):4.979174619784594
                                                    Encrypted:false
                                                    SSDEEP:48:tyASEji8RYQ8FGD7BDos9Q1TBfvq/HKTh9lkHv8T/mAezeLEAAFULxZh4x:eIi8qFu2d11XlhfkPcczeLS4Zm
                                                    MD5:3FB31A225CEC64B720B8E579582F2749
                                                    SHA1:9C0151D9E2543C217CF8699FF5D4299A72E8F13C
                                                    SHA-256:6EAA336B13815A7FC18BCD6B9ADF722E794DA2888D053C229044784C8C8E9DE8
                                                    SHA-512:E6865655585E3D2D6839B56811F3FD86B454E8CD44E258BB1AC576AD245FF8A4D49FBB7F43458BA8A6C9DAAC8DFA923A176F0DD8A9976A11BEA09E6E2D17BF45
                                                    Malicious:false
                                                    Preview:#..# Bindings for TScrollbar widget..#....namespace eval ttk::scrollbar {.. variable State.. # State(xPress).--.. # State(yPress).-- initial position of mouse at start of drag... # State(first).-- value of -first at start of drag...}....bind TScrollbar <Button-1> ..{ ttk::scrollbar::Press %W %x %y }..bind TScrollbar <B1-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-1>.{ ttk::scrollbar::Release %W %x %y }....bind TScrollbar <Button-2> ..{ ttk::scrollbar::Jump %W %x %y }..bind TScrollbar <B2-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-2>.{ ttk::scrollbar::Release %W %x %y }....# Redirect scrollwheel bindings to the scrollbar widget..#..# The shift-bindings scroll left/right (not up/down)..# if a widget has both possibilities..set eventList [list <MouseWheel> <Shift-MouseWheel>]..switch [tk windowingsystem] {.. aqua {.. lappend eventList <Option-MouseWheel> <Shift-Option-MouseWheel>.. }.. x11 {..
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2503
                                                    Entropy (8bit):4.830288003879418
                                                    Encrypted:false
                                                    SSDEEP:48:naLvMnAqeYQWYh7FvBrrbnMCfY/aVAbAigWAuFM0PfWAX20:nWQapprPnJY/8A8iRFdPtj
                                                    MD5:DD6A1737B14D3F7B2A0B4F8BE99C30AF
                                                    SHA1:E6B06895317E73CD3DC78234DD74C74F3DB8C105
                                                    SHA-256:E92D77B5CDCA2206376DB2129E87E3D744B3D5E31FDE6C0BBD44A494A6845CE1
                                                    SHA-512:B74AE92EDD53652F8A3DB0D84C18F9CE9069805BCAB0D3C2DBB537D7C241AA2681DA69B699D88A10029798D7B5BC015682F64699BA475AE6A379EEF23B48DAAF
                                                    Malicious:false
                                                    Preview:#..# Sizegrip widget bindings...#..# Dragging a sizegrip widget resizes the containing toplevel...#..# NOTE: the sizegrip widget must be in the lower right hand corner...#....switch -- [tk windowingsystem] {.. x11 -.. win32 {...option add *TSizegrip.cursor [ttk::cursor seresize] widgetDefault.. }.. aqua {.. .# Aqua sizegrips use default Arrow cursor... }..}....namespace eval ttk::sizegrip {.. variable State.. array set State {...pressed .0...pressX ..0...pressY ..0...width ..0...height ..0...widthInc.1...heightInc.1.. resizeX 1.. resizeY 1...toplevel .{}.. }..}....bind TSizegrip <Button-1> ..{ ttk::sizegrip::Press.%W %X %Y }..bind TSizegrip <B1-Motion> ..{ ttk::sizegrip::Drag .%W %X %Y }..bind TSizegrip <ButtonRelease-1> .{ ttk::sizegrip::Release %W %X %Y }....proc ttk::sizegrip::Press {W X Y} {.. variable State.... if {[$W instate disabled]} { return }.... set top [winfo toplevel $W].... # If the toplevel is not resi
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5003
                                                    Entropy (8bit):5.055050310142795
                                                    Encrypted:false
                                                    SSDEEP:96:1qg/+yrjqA/K5ytxm1J1Ve6J1yQLUAzz/S76hrwxGGe2F:N/+yr2Gk1J1Ve6fxUAzDS76hrwxs2F
                                                    MD5:9C2833FAA9248F09BC2E6AB1BA326D59
                                                    SHA1:F13CF048FD706BBB1581DC80E33D1AAD910D93E8
                                                    SHA-256:DF286BB59F471AA1E19DF39AF0EF7AA84DF9F04DC4A439A747DD8BA43C300150
                                                    SHA-512:5FF3BE1E3D651C145950C3FC5B8C2E842211C937D1042173964383D4D59ECF5DD0EC39FF7771D029716F2D895F0B1A72591EF3BF7947FE64D4D6DB5F0B8ABFFB
                                                    Malicious:false
                                                    Preview:#..# ttk::spinbox bindings..#....namespace eval ttk::spinbox { }....### Spinbox bindings...#..# Duplicate the Entry bindings, override if needed:..#....ttk::copyBindings TEntry TSpinbox....bind TSpinbox <Motion>...{ ttk::spinbox::Motion %W %x %y }..bind TSpinbox <Button-1> ..{ ttk::spinbox::Press %W %x %y }..bind TSpinbox <ButtonRelease-1> .{ ttk::spinbox::Release %W }..bind TSpinbox <Double-Button-1> .{ ttk::spinbox::DoubleClick %W %x %y }..bind TSpinbox <Triple-Button-1> .{} ;# disable TEntry triple-click....bind TSpinbox <Up>...{ event generate %W <<Increment>> }..bind TSpinbox <Down> ...{ event generate %W <<Decrement>> }....bind TSpinbox <<Increment>>..{ ttk::spinbox::Spin %W +1 }..bind TSpinbox <<Decrement>> ..{ ttk::spinbox::Spin %W -1 }....ttk::bindMouseWheel TSpinbox ..[list ttk::spinbox::MouseWheel %W]....## Motion --..#.Sets cursor...#..proc ttk::spinbox::Motion {w x y} {.. variable State.. ttk::saveCursor $w State(userConfCursor) [ttk::cursor text].. if { [$w ide
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10180
                                                    Entropy (8bit):4.886259798213254
                                                    Encrypted:false
                                                    SSDEEP:96:FoTvMxHZZ1u2xj7+ZBHxjiXJv9IfwW+vr3UxjXEJDTF/MyLF3JcMzlsra2tYGa5P:mImAkRKYXMH59o4UbS30LWb
                                                    MD5:F705B3A292D02061DA0ABB4A8DD24077
                                                    SHA1:FD75C2250F6F66435444F7DEEF383C6397ED2368
                                                    SHA-256:C88B60FFB0F72E095F6FC9786930ADD7F9ED049EABC713F889F9A7DA516E188C
                                                    SHA-512:09817638DD3D3D5C57FA630C7EDF2F19C3956C9BD264DBF07627FA14A03AECD22D5A5319806E49EF1030204FADEF17C57CE8EAE4378A319AD2093321D9151C8F
                                                    Malicious:false
                                                    Preview:#..# ttk::treeview widget bindings and utilities...#....namespace eval ttk::treeview {.. variable State.... # Enter/Leave/Motion.. #.. set State(activeWidget) .{}.. set State(activeHeading) .{}.... # Press/drag/release:.. #.. set State(pressMode) .none.. set State(pressX)..0.... # For pressMode == "resize".. set State(resizeColumn).#0.... # For pressmode == "heading".. set State(heading) .{}..}....### Widget bindings...#....bind Treeview.<Motion> ..{ ttk::treeview::Motion %W %x %y }..bind Treeview.<B1-Leave>..{ #nothing }..bind Treeview.<Leave>...{ ttk::treeview::ActivateHeading {} {}}..bind Treeview.<Button-1> ..{ ttk::treeview::Press %W %x %y }..bind Treeview.<Double-Button-1> .{ ttk::treeview::DoubleClick %W %x %y }..bind Treeview.<ButtonRelease-1> .{ ttk::treeview::Release %W %x %y }..bind Treeview.<B1-Motion> ..{ ttk::treeview::Drag %W %x %y }..bind Treeview .<Up> ..{ ttk::treeview::Keynav %W up }..bind Treeview .<Down> ..{ ttk::treeview
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4993
                                                    Entropy (8bit):4.954034141173847
                                                    Encrypted:false
                                                    SSDEEP:96:lfxukTy5jPTq8LIgF2diyNTNR6nkrn4ijSSvNigyJ5612HtZG835MSvWOTRsHWU:BM+y5jrq8G/2nkEijSSvNigyJ5612Htw
                                                    MD5:AF45B2C8B43596D1BDECA5233126BD14
                                                    SHA1:A99E75D299C4579E10FCDD59389B98C662281A26
                                                    SHA-256:2C48343B1A47F472D1A6B9EE8D670CE7FB428DB0DB7244DC323FF4C7A8B4F64B
                                                    SHA-512:C8A8D01C61774321778AB149F6CA8DDA68DB69133CB5BA7C91938E4FD564160ECDCEC473222AFFB241304A9ACC73A36B134B3A602FD3587C711F2ADBB64AFA80
                                                    Malicious:false
                                                    Preview:#..# Ttk widget set initialization script...#....### Source library scripts...#....namespace eval ::ttk {.. variable library.. if {![info exists library]} {...set library [file dirname [info script]].. }..}....source -encoding utf-8 [file join $::ttk::library fonts.tcl]..source -encoding utf-8 [file join $::ttk::library cursors.tcl]..source -encoding utf-8 [file join $::ttk::library utils.tcl]....## ttk::deprecated $old $new --..#.Define $old command as a deprecated alias for $new command..#.$old and $new must be fully namespace-qualified...#..proc ttk::deprecated {old new} {.. interp alias {} $old {} ttk::do'deprecate $old $new..}..## do'deprecate --..#.Implementation procedure for deprecated commands --..#.issue a warning (once), then re-alias old to new...#..proc ttk::do'deprecate {old new args} {.. deprecated'warning $old $new.. interp alias {} $old {} $new.. uplevel 1 [linsert $args 0 $new]..}....## deprecated'warning --..#.Gripe about use of deprecated comman
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8624
                                                    Entropy (8bit):5.001791071900077
                                                    Encrypted:false
                                                    SSDEEP:192:e0ebpSp+IZwnmTmpx8xzaHfw8K7LVJWQl8p7M+R5:rw0+WmpWxa/w9nVJHu
                                                    MD5:D98EDC491DA631510F124CD3934F535F
                                                    SHA1:33037A966067C9F5C9074AE5532FF3B51B4082D4
                                                    SHA-256:D58610A34301BB6E61A60BEC69A7CECF4C45C6A034A9FC123977174B586278BE
                                                    SHA-512:23FAED8298E561F490997FE44AB61CD8CCB9F1F63D48BB4CF51FC9E591E463FF9297973622180D6A599CABB541C82B8FE33BF38A82C5D5905BBFA52CA0341399
                                                    Malicious:false
                                                    Preview:#..# Utilities for widget implementations...#....### Focus management...#..# See also: #1516479..#....## ttk::takefocus --..#.This is the default value of the "-takefocus" option..#.for ttk::* widgets that participate in keyboard navigation...#..# NOTES:..#.tk::FocusOK (called by tk_focusNext) tests [winfo viewable]..#.if -takefocus is 1, empty, or missing; but not if it's a..#.script prefix, so we have to check that here as well...#..#..proc ttk::takefocus {w} {.. expr {[$w instate !disabled] && [winfo viewable $w]}..}....## ttk::GuessTakeFocus --..#.This routine is called as a fallback for widgets..#.with a missing or empty -takefocus option...#..#.It implements the same heuristics as tk::FocusOK...#..proc ttk::GuessTakeFocus {w} {.. # Don't traverse to widgets with '-state disabled':.. #.. if {![catch {$w cget -state} state] && $state eq "disabled"} {...return 0.. }.... # Allow traversal to widgets with explicit key or focus bindings:.. #.. if {[regexp {Key|F
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9710
                                                    Entropy (8bit):4.6639701588183895
                                                    Encrypted:false
                                                    SSDEEP:192:BktY1F+qXd95WSZaHFHRE3GRKFh2oaoT/ezKpqvYMHab:V1F+cd95WSZuhRE34KbPmKmY2ab
                                                    MD5:0AA7F8B43C3E07F3A4DA07FC6DF9A1B0
                                                    SHA1:153AFB735B10BBA16CFBE161777232F983845D90
                                                    SHA-256:EC5F203C69DF390E9B99944CF3526D6E77DC6F68E9B1A029F326A41AFED1EF81
                                                    SHA-512:5406553211CD6714C98EF7765ABD46424CCB013343EFF693FDD3AE6E0AAE9B5983446E0E1CC706D6B2C285084BF83D397306D3D52028CBBCFB8F369857C5B69C
                                                    Malicious:false
                                                    Preview:#..# Settings for Microsoft Windows Vista and Server 2008..#....# The Vista theme can only be defined on Windows Vista and above. The theme..# is created in C due to the need to assign a theme-enabled function for..# detecting when themeing is disabled. On systems that cannot support the..# Vista theme, there will be no such theme created and we must not..# evaluate this script.....if {"vista" ni [ttk::style theme names]} {.. return..}....namespace eval ttk::theme::vista {.... ttk::style theme settings vista {.... .ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2865
                                                    Entropy (8bit):4.917847108902527
                                                    Encrypted:false
                                                    SSDEEP:48:b69VhW2gL5FPVWRzQsVqrEuF3yYrf7rfJF8xUqBgLt6g3ktO5jo4+iZ6O2htYtCW:bbXl+CEqZNNSxU0Ht2MR7W
                                                    MD5:769C0719A4044F91E7D132A25291E473
                                                    SHA1:6FB07B0C887D443A43FB15D5728920B578171219
                                                    SHA-256:AE82BCCCE708FF9C303CBCB3D4CC3FF5577A60D5B23822EA79E3E07CCE3CBBD1
                                                    SHA-512:47FED061DDC6B4EB63EF77901D0094FF2EBB1BAFACB3F44FBF13FB59DEA1EC83985B2862086ECF1A7957819A88A0FAA144B35F16BEA9356BBD9775070D42E636
                                                    Malicious:false
                                                    Preview:#..# Settings for 'winnative' theme...#....namespace eval ttk::theme::winnative {.. ttk::style theme settings winnative {.....ttk::style configure "." \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -fieldbackground SystemWindow \... -insertcolor SystemWindowText \... -troughcolor SystemScrollbar \... -font TkDefaultFont \... ;.....ttk::style map "." -foreground [list disabled SystemGrayText] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -relief raised -shiftrelief 1...ttk::style configure TCheckbutton -padding "2 4"...ttk::style configure TRadiobutton -padding "2 4"...ttk::style configure TMenubutton \... -padding "8 4" -arrowsize 3 -relief raised.....ttk::style map TButton -relief {{!disabled pressed} sunken}.....ttk::style configure TEntry \... -padding 2 -select
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2103
                                                    Entropy (8bit):4.9805308941424355
                                                    Encrypted:false
                                                    SSDEEP:48:aaiIu89VhW2gLRWJyO514rf+rfzxTrf/MW+iZ6O2htYtCp:XoXAk21nxQ7p
                                                    MD5:162F30D2716438C75EA16B57E6F63088
                                                    SHA1:3F626FF0496BB16B27106BED7E38D1C72D1E3E27
                                                    SHA-256:AEDB21C6B2909A4BB4686837D2126E521A8CC2B38414A4540387B801EBD75466
                                                    SHA-512:6EBF9648F1381D04F351BB469B6E3A38F3D002189C92EAF80A18D65632037FF37D34EC8814BBF7FAE34553645BFC13985212F24684EE8C4E205729B975C88C97
                                                    Malicious:false
                                                    Preview:#..# Settings for 'xpnative' theme..#....namespace eval ttk::theme::xpnative {.... ttk::style theme settings xpnative {.....ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::style configure TCheckbutton -padding 2...ttk::style configure TMenubutton -padding {8 4}.....ttk::style configure TNotebook -tabmargins {2 2 2 0}...ttk::style map TNotebook.Tab \... -expand [list selected {2 2 2 2}].....ttk::style configure TLabelframe.Label -foreground "#0046d5".....# OR: -padding {3 3 3 6}, which some apps seem to use....ttk::style configure TEntry -padding {2 2 2 4}...ttk::
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10521
                                                    Entropy (8bit):5.0647027375963996
                                                    Encrypted:false
                                                    SSDEEP:192:1Y3uWEXm/swEePmJhRAXd1hTHsHG2ML/9Lm2daM0Hu:8hodMiM0Hu
                                                    MD5:508F7E258C04970FAE526990168CB773
                                                    SHA1:33785204B18C0E0F5CDCB5B49399B5907351FDB8
                                                    SHA-256:B463B366F139DDF7FED31F34C6D2341F9F27845A1A358011DFC801E1333B1828
                                                    SHA-512:A12985B58DD1D46297119CED47B7F44EF4139CED6C36FD028E66DD657E5ED0663B744C679A5BF7A39B39D17A32E1280D2945F6B9AD59AEF20436F68040F6070C
                                                    Malicious:false
                                                    Preview:# unsupported.tcl --..#..# Commands provided by Tk without official support. Use them at your..# own risk. They may change or go away without notice...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# ----------------------------------------------------------------------..# Unsupported compatibility interface for folks accessing Tk's private..# commands and variable against recommended usage...# ----------------------------------------------------------------------....namespace eval ::tk::unsupported {.... # Map from the old global names of Tk private commands to their.. # new namespace-encapsulated names..... variable PrivateCommands.. array set PrivateCommands {...tkButtonAutoInvoke..::tk::ButtonAutoInvoke...tkButtonDown...::tk::ButtonDown...tkButtonEnter...::tk::ButtonEnter...tkButtonInvoke...::tk::ButtonInvoke...tkButtonLeave...::tk::ButtonLeave...tkButtonUp...::tk::ButtonUp...tk
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):27064
                                                    Entropy (8bit):4.967626999005091
                                                    Encrypted:false
                                                    SSDEEP:384:0BLzjXhss64XP8FXm39QJ63nwFiHLgRIdNPCRE5phLtffsNP4XWdxWk+I5oy9jN7:0BvjXoivB3flLCRE5phLCP3xWV8veTod
                                                    MD5:6DFD12DB27069F13957BC963EF5ACAAF
                                                    SHA1:E492F0B60D73CE17C4FA7680BF0087DC5E0CC132
                                                    SHA-256:1ED57E32CE9C419BCE36B483A91410DDF4C997CAF62D20E42048FC350F8C3F60
                                                    SHA-512:32A3E205B4BC3B7D4D6F31E6FD26075EA3FAB7396F7392855D8BD4426CFEE9081482759EFF219038D64B074E2D3D864041E7C37DCA134F2A0C3140AA04D757C2
                                                    Malicious:false
                                                    Preview:# xmfbox.tcl --..#..#.Implements the "Motif" style file selection dialog for the..#.Unix platform. This implementation is used only if the..#."::tk_strictMotif" flag is set...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Scriptics Corporation..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}......# ::tk::MotifFDialog --..#..#.Implements a file dialog similar to the standard Motif file..#.selection box...#..# Arguments:..#.type.."open" or "save"..#.args..Options parsed by the procedure...#..# Results:..#.When -multiple is set to 0, this returns the absolute pathname..#.of the selected file. (NOTE: This is not the same as a single..#.element list.)..#..#.When -multiple is set to > 0, this returns a Tcl list of absolute..# pathnames. The argument for -multiple is ignored, but for consistency..#
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1046080
                                                    Entropy (8bit):6.649151787942547
                                                    Encrypted:false
                                                    SSDEEP:24576:L1foGwlaDT22+Pk+j2ZXCE6cctEMmxvSZX0ypCD3:JfoBR2+PfXWrT
                                                    MD5:4E326FEEB3EBF1E3EB21EEB224345727
                                                    SHA1:F156A272DBC6695CC170B6091EF8CD41DB7BA040
                                                    SHA-256:3C60056371F82E4744185B6F2FA0C69042B1E78804685944132974DD13F3B6D9
                                                    SHA-512:BE9420A85C82EEEE685E18913A7FF152FCEAD72A90DDCC2BCC8AB53A4A1743AE98F49354023C0A32B3A1D919BDA64B5D455F6C3A49D4842BBBA4AA37C1D05D67
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........of...5...5...5..5...5...5&..5...5...5...4...5...4...5...4...5...4...5...4..5...5...5...4...5Rich...5........PE..d....]..........." .....:...........a..............................................4m....`A................................................................. ..........@J..............p........................... f..............................................text... 9.......:.................. ..`.rdata..N....P.......>..............@..@.data....&..........................@....pdata....... ......................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1141016
                                                    Entropy (8bit):5.435086202175289
                                                    Encrypted:false
                                                    SSDEEP:12288:83kYbfjwR6nblonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eD1ol:8UYbMA0IDJcjEwPgPOG6Xyd461ol
                                                    MD5:AA13EE6770452AF73828B55AF5CD1A32
                                                    SHA1:C01ECE61C7623E36A834D8B3C660E7F28C91177E
                                                    SHA-256:8FBED20E9225FF82132E97B4FEFBB5DDBC10C062D9E3F920A6616AB27BB5B0FB
                                                    SHA-512:B2EEB9A7D4A32E91084FDAE302953AAC57388A5390F9404D8DFE5C4A8F66CA2AB73253CF5BA4CC55350D8306230DD1114A61E22C23F42FBCC5C0098046E97E0F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................,...............,.....,.....,.y...,.....Rich..........PE..d......d.........." ...".@..........P*...............................................!....`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):133632
                                                    Entropy (8bit):5.851354810898845
                                                    Encrypted:false
                                                    SSDEEP:3072:HPwB2zC1vwC3XetCf5RlRVFhLaNKPAyymhNYm9b9e:HIB2zkvwGXetCfDlRVlPAyLYm9
                                                    MD5:1D6762B494DC9E60CA95F7238AE1FB14
                                                    SHA1:AA0397D96A0ED41B2F03352049DAFE040D59AD5D
                                                    SHA-256:FAE5323E2119A8F678055F4244177B5806C7B6B171B1945168F685631B913664
                                                    SHA-512:0B561F651161A34C37FF8D115F154C52202F573D049681F8CDD7BBA2E966BB8203780C19BA824B4A693EF12EF1EEEF6AEEEF96EB369E4B6129F1DEB6B26AAA00
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I^.f'..f'..f'......f'...&..f'...#..f'...$..f'.o.&..f'..."..f'...&..f'..f&..g'.o....f'.o.'..f'.o.%..f'.Rich.f'.................PE..d......d.........." .........................................................P............`..........................................................0..\....................@..$....v..T............................<..8............0..........@....................text...$........................... ..`.rdata......0......................@..@.data...x(......."..................@....pdata..............................@..@.rsrc...\....0......................@..@.reloc..$....@......................@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):143360
                                                    Entropy (8bit):5.932597477918974
                                                    Encrypted:false
                                                    SSDEEP:3072:qE4Qd20btj+SwTBt/F42tGzqxfTHsVHetm+y04NosEM2N7pAe0U:qE4Qdrtj9wTBt/F42wzqxfQVW9yxosEB
                                                    MD5:06AFADB12D29F947746DEA813784EFE1
                                                    SHA1:60402C0F3E5BC5A50F220AA98A40060572B8F5CB
                                                    SHA-256:4A9F813DAA23E27C8A1D0915CFCC1C06E4DF10C9EE33A37E215888129501D256
                                                    SHA-512:3032EB20475873D037AB3722596D98841DDC18A698981697DCA85A5D446D0D9985B397EAAC1B91C44527ADBFDD97A6435261B28529ACABE6DD7B4ED59C1162EE
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r!.%6@tv6@tv6@tv?8.v<@tvd5uw2@tvd5qw'@tvd5pw>@tvd5ww5@tv.5uw2@tv"+uw1@tv6@uv"Atv.5}w4@tv.5tw7@tv.5vw7@tvRich6@tv........PE..d......d.........." .....@..........x6.......................................p............`.............................................T...4........P..\....0...............`......x...T..............................8............P...............................text....?.......@.................. ..`.rdata.......P.......D..............@..@.data....'....... ..................@....pdata.......0......................@..@.rsrc...\....P.......(..............@..@.reloc.......`.......,..............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136704
                                                    Entropy (8bit):5.921300454142241
                                                    Encrypted:false
                                                    SSDEEP:1536:wsEpYpxfj4qSvXig4F1UhrbLaXcGKpwjr8LnCUA4RPdaZYQ0HgqFUdPEmU:JEp8L4qSvjaXZiC4RPdaz0HgqFU9fU
                                                    MD5:0007E4004EE357B3242E446AAD090D27
                                                    SHA1:4A26E091CA095699E6D7ECC6A6BFBB52E8135059
                                                    SHA-256:10882E7945BECF3E8F574B61D0209DD7442EFD18AB33E95DCEECECC34148AB32
                                                    SHA-512:170FA5971F201A18183437FC9E97DCD5B11546909D2E47860A62C10BFF513E2509CB4082B728E762F1357145DF84DCEE1797133225536BD15FC87B2345659858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......v.<.2.RB2.RB2.RB;..B:.RB`.SC6.RB`.WC#.RB`.VC:.RB`.QC1.RB.SC6.RB&.SC;.RB2.SB..RB.[C1.RB.RC3.RB.PC3.RBRich2.RB................PE..d......d.........." .....$...................................................p............`.................................................$........P..l....0...............`.........T...........................@...8............@..P............................text....".......$.................. ..`.rdata..L....@.......(..............@..@.data...0 ..........................@....pdata.......0......................@..@.rsrc...l....P......................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):655360
                                                    Entropy (8bit):6.429498330590438
                                                    Encrypted:false
                                                    SSDEEP:12288:Xs/doJlY/OBzRSxUlcUmNNuNkOFIj+fWT0hrHPPoX1yZcG7:mAuOBzRSxUlvFIj+fWIPPM1yZcg
                                                    MD5:4327027D7CB61F547E22C4F668EB7BF7
                                                    SHA1:22F413D03A90D04D571526687E43EB255F427435
                                                    SHA-256:E681900AEB771E57BC063E44B303293E11DF32F1B1FECDCBC00574C00E75626C
                                                    SHA-512:16A2E2E262C0246906D48EA67EE17D38C07712A1B97EB18C4F8F656F39EB187E18DA3EDC6D2FDF49DC9E35B92F6BA6BDE0F00948C3E68E146F7EDCD1E9C9404A
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....)..p..!....p.......p..!....p..!....p..!....p..G....p...p...p..G....p..G....p..G.E..p..G....p..Rich.p..........................PE..d...f.Ae.........." ...#.....`...............................................P............`.............................................\...........0..........|5...........@.......s..............................Pr..@...............8............................text............................... ..`.rdata..............................@..@.data...0...........................@....pdata..|5.......6..................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):524800
                                                    Entropy (8bit):6.43361179692515
                                                    Encrypted:false
                                                    SSDEEP:12288:LhqzrH09USNNSNkUvpMnAp5Oqwj/k6OsoOfu/PYS/O51Y/H:LhqzrH0evpMnApu86OsynYUPv
                                                    MD5:DC08F04C9E03452764B4E228FC38C60B
                                                    SHA1:317BCC3F9C81E2FC81C86D5A24C59269A77E3824
                                                    SHA-256:B990EFBDA8A50C49CD7FDE5894F3C8F3715CB850F8CC4C10BC03FD92E310260F
                                                    SHA-512:FBC24DD36AF658CECE54BE14C1118AF5FDA4E7C5B99D22F99690A1FD625CC0E8AA41FD9ACCD1C74BB4B03D494B6C3571B24F2EE423AAAE9A5AD50ADC583C52F7
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............t...t...t....:..t..S....t.......t..S....t..S....t..S....t..5....t...t..dt..5....t..5....t..5.V..t..5....t..Rich.t..........................PE..d...Z.Ae.........." ...#.....................................................@............`.............................................d...$........ ...........*...........0..d....k...............................j..@............... ............................text............................... ..`.rdata..............................@..@.data...(-.......(..................@....pdata...*.......,..................@..@.rsrc........ ......................@..@.reloc..d....0......................@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\4.7.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):21504
                                                    Entropy (8bit):5.260569281211899
                                                    Encrypted:false
                                                    SSDEEP:384:ic9SCBzS4thX18JwZIJAZBMb2Hcvg92nJjipT:nBzzWJdAZBMbYcpp+
                                                    MD5:2D6AD8F5E8961AD6C19BAC56093C84F0
                                                    SHA1:8060E01378DE33DF80320F3A3C1158C9F61F9FF3
                                                    SHA-256:7892119C9E4B815C07B93D2BC8F7310B16064734A99AFFAE694CA6B81B5EA0B4
                                                    SHA-512:63177B3273CA0687035C7226A70E590AE36385ED5C28E9D793EA393E528685F88496F9F921A39F304AA7F83F9774D33F04F1D49124AC8C50842E76634A389A36
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1..1..1..8...;..7R..!..7R..9..7R..2..7R..7..z...4..1..m..[R..0..[R..3..[R..0..[Rl.0..[R..0..Rich1..........................PE..d....e.........." ...&.$...2.......'....................................................`..........................................U.......V..................................P....J..p...........................pI..@............@..`............................text...E".......$.................. ..`.rdata..V!...@..."...(..............@..@.data...X....p.......J..............@....pdata...............L..............@..@.rsrc................P..............@..@.reloc..P............R..............@..B................................................................................................................................................................................................................................
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):7.996118857266814
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 92.65%
                                                    • Win64 Executable (generic) (12005/4) 5.51%
                                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                                    • DOS Executable Generic (2002/1) 0.92%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:4.7.exe
                                                    File size:16'488'692 bytes
                                                    MD5:d71d9ce33e1d1f7cca026ee9d8a84455
                                                    SHA1:210e8f26480bd6ec8cefb3a0e06b742ea553f468
                                                    SHA256:b0e1e030ad98fe4164d26e7f6a0e6e9a4ecb229b504f816ca7772b119996ad3e
                                                    SHA512:f4b0944a812f9e0ce8291424cf5de4c9ba924e5efb6a5c04337ea29e99cd35d981faf040d0d73f9765738429191c19eaf66976c3796dff9cb5044a0617801ae9
                                                    SSDEEP:393216:+qszf490RQETSTqdvJJaHW8p24e965Af5rXF:Zszfm0RQEWTqdhCW8p2RFJF
                                                    TLSH:BEF6334AA61208E4E59B843BF485C4B5A5B2B06703EAD6CB07FD6CC40DC78D9FD39B61
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................-.....................,.............................................................Rich...........
                                                    Icon Hash:0000000000000000
                                                    Entrypoint:0x14000c540
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x66BA56BF [Mon Aug 12 18:38:55 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:2
                                                    File Version Major:5
                                                    File Version Minor:2
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:2
                                                    Import Hash:f4f2e2b03fe5666a721620fcea3aea9b
                                                    Instruction
                                                    dec eax
                                                    sub esp, 28h
                                                    call 00007FDBBC7E559Ch
                                                    dec eax
                                                    add esp, 28h
                                                    jmp 00007FDBBC7E51BFh
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    dec eax
                                                    sub esp, 28h
                                                    call 00007FDBBC7E5B14h
                                                    test eax, eax
                                                    je 00007FDBBC7E5363h
                                                    dec eax
                                                    mov eax, dword ptr [00000030h]
                                                    dec eax
                                                    mov ecx, dword ptr [eax+08h]
                                                    jmp 00007FDBBC7E5347h
                                                    dec eax
                                                    cmp ecx, eax
                                                    je 00007FDBBC7E5356h
                                                    xor eax, eax
                                                    dec eax
                                                    cmpxchg dword ptr [00034FACh], ecx
                                                    jne 00007FDBBC7E5330h
                                                    xor al, al
                                                    dec eax
                                                    add esp, 28h
                                                    ret
                                                    mov al, 01h
                                                    jmp 00007FDBBC7E5339h
                                                    int3
                                                    int3
                                                    int3
                                                    dec eax
                                                    sub esp, 28h
                                                    test ecx, ecx
                                                    jne 00007FDBBC7E5349h
                                                    mov byte ptr [00034F95h], 00000001h
                                                    call 00007FDBBC7E5921h
                                                    call 00007FDBBC7E5F28h
                                                    test al, al
                                                    jne 00007FDBBC7E5346h
                                                    xor al, al
                                                    jmp 00007FDBBC7E5356h
                                                    call 00007FDBBC7F3EBFh
                                                    test al, al
                                                    jne 00007FDBBC7E534Bh
                                                    xor ecx, ecx
                                                    call 00007FDBBC7E5F38h
                                                    jmp 00007FDBBC7E532Ch
                                                    mov al, 01h
                                                    dec eax
                                                    add esp, 28h
                                                    ret
                                                    int3
                                                    int3
                                                    inc eax
                                                    push ebx
                                                    dec eax
                                                    sub esp, 20h
                                                    cmp byte ptr [00034F5Ch], 00000000h
                                                    mov ebx, ecx
                                                    jne 00007FDBBC7E53A9h
                                                    cmp ecx, 01h
                                                    jnbe 00007FDBBC7E53ACh
                                                    call 00007FDBBC7E5A8Ah
                                                    test eax, eax
                                                    je 00007FDBBC7E536Ah
                                                    test ebx, ebx
                                                    jne 00007FDBBC7E5366h
                                                    dec eax
                                                    lea ecx, dword ptr [00034F46h]
                                                    call 00007FDBBC7F3CB2h
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3e0bc0x78.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x73c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x430000x231c.pdata
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000x758.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x3b4600x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3b3200x140.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x438.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x2afb00x2b00040bf1edebd1304ce1b08c50cb556d4dbFalse0.5458416606104651data6.5002315273868IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x2c0000x12f360x130008e4b2ba1a96e30397b8b13ffe1adbbf2False0.5160875822368421data5.827948014481278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x3f0000x33b80xe00ae0f42b168987b17129506ccc4960b21False0.13392857142857142firmware 32a2 vdf2d (revision 2569732096) \377\377\377\377 , version 256.0.512, 0 bytes or less, at 0xcd5d20d2 1725235199 bytes , at 0 0 bytes , at 0xffffffff 16777216 bytes1.8264700601019173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .pdata0x430000x231c0x2400ffc5390666982cab67e3c9bf8e263bc3False0.4784071180555556data5.382434020909434IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    _RDATA0x460000x1f40x200771f0b097891d31289bb68f0eb426e66False0.529296875data3.713242247775091IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0x470000x73c0x800758f33f0905e8e18a87c21e3a3786ce2False0.39697265625data5.235665537096084IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x480000x7580x8007ecf18b15822e1aa4c79b9a361f07c79False0.546875data5.250941834312499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x470e80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.2702702702702703
                                                    RT_GROUP_ICON0x472100x14data1.1
                                                    RT_MANIFEST0x472240x518XML 1.0 document, ASCII text0.4700920245398773
                                                    DLLImport
                                                    USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                    COMCTL32.dll
                                                    KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, CreateFileW, GetFinalPathNameByHandleW, CloseHandle, GetModuleFileNameW, CreateSymbolicLinkW, GetCPInfo, GetCommandLineW, GetEnvironmentVariableW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, GetProcAddress, GetSystemTimeAsFileTime, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                    ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                    GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 1, 2024 19:14:08.052185059 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.052212000 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.052305937 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.067336082 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.067352057 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.576324940 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.577323914 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.577338934 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.578505993 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.578583002 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.579200983 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.579315901 CEST44349733104.26.1.5192.168.2.4
                                                    Sep 1, 2024 19:14:08.579363108 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.579380989 CEST49733443192.168.2.4104.26.1.5
                                                    Sep 1, 2024 19:14:08.791779995 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:08.791836977 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:08.792556047 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:08.805491924 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:08.805514097 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:09.273628950 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:09.273988008 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:09.274012089 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:09.275166035 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:09.275230885 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:09.275736094 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:09.275871992 CEST44349734162.159.128.233192.168.2.4
                                                    Sep 1, 2024 19:14:09.275878906 CEST49734443192.168.2.4162.159.128.233
                                                    Sep 1, 2024 19:14:09.275933027 CEST49734443192.168.2.4162.159.128.233
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 1, 2024 19:14:08.035460949 CEST5415253192.168.2.41.1.1.1
                                                    Sep 1, 2024 19:14:08.043740988 CEST53541521.1.1.1192.168.2.4
                                                    Sep 1, 2024 19:14:08.741810083 CEST4997253192.168.2.41.1.1.1
                                                    Sep 1, 2024 19:14:08.772602081 CEST53499721.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Sep 1, 2024 19:14:08.035460949 CEST192.168.2.41.1.1.10xce55Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.741810083 CEST192.168.2.41.1.1.10xe87dStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Sep 1, 2024 19:14:08.043740988 CEST1.1.1.1192.168.2.40xce55No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.043740988 CEST1.1.1.1192.168.2.40xce55No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.043740988 CEST1.1.1.1192.168.2.40xce55No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.772602081 CEST1.1.1.1192.168.2.40xe87dNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.772602081 CEST1.1.1.1192.168.2.40xe87dNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.772602081 CEST1.1.1.1192.168.2.40xe87dNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.772602081 CEST1.1.1.1192.168.2.40xe87dNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:08.772602081 CEST1.1.1.1192.168.2.40xe87dNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:15.623512983 CEST1.1.1.1192.168.2.40xd075No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:15.623512983 CEST1.1.1.1192.168.2.40xd075No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Sep 1, 2024 19:14:16.084204912 CEST1.1.1.1192.168.2.40xa832No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                    Sep 1, 2024 19:14:16.084204912 CEST1.1.1.1192.168.2.40xa832No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:13:13:57
                                                    Start date:01/09/2024
                                                    Path:C:\Users\user\Desktop\4.7.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\4.7.exe"
                                                    Imagebase:0x7ff6385e0000
                                                    File size:16'488'692 bytes
                                                    MD5 hash:D71D9CE33E1D1F7CCA026EE9D8A84455
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:13:14:03
                                                    Start date:01/09/2024
                                                    Path:C:\Users\user\Desktop\4.7.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\4.7.exe"
                                                    Imagebase:0x7ff6385e0000
                                                    File size:16'488'692 bytes
                                                    MD5 hash:D71D9CE33E1D1F7CCA026EE9D8A84455
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:13:14:07
                                                    Start date:01/09/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\cmd.exe /c "ver"
                                                    Imagebase:0x7ff6442a0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:13:14:07
                                                    Start date:01/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:11.2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:23.4%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:79
                                                      execution_graph 20657 7ff63860bea9 20658 7ff63860beb8 20657->20658 20659 7ff63860bec2 20657->20659 20661 7ff638601208 LeaveCriticalSection 20658->20661 16432 7ff6385eb5a0 16433 7ff6385eb5ce 16432->16433 16434 7ff6385eb5b5 16432->16434 16434->16433 16437 7ff6385fe3ac 16434->16437 16438 7ff6385fe3f7 16437->16438 16442 7ff6385fe3bb _get_daylight 16437->16442 16440 7ff6385f5cb4 _get_daylight 11 API calls 16438->16440 16439 7ff6385fe3de RtlAllocateHeap 16441 7ff6385eb62c 16439->16441 16439->16442 16440->16441 16442->16438 16442->16439 16443 7ff6386043e0 _get_daylight 2 API calls 16442->16443 16443->16442 16520 7ff638601720 16521 7ff638601744 16520->16521 16524 7ff638601754 16520->16524 16522 7ff6385f5cb4 _get_daylight 11 API calls 16521->16522 16545 7ff638601749 16522->16545 16523 7ff638601a34 16526 7ff6385f5cb4 _get_daylight 11 API calls 16523->16526 16524->16523 16525 7ff638601776 16524->16525 16527 7ff638601797 16525->16527 16675 7ff638601ddc 16525->16675 16528 7ff638601a39 16526->16528 16531 7ff638601809 16527->16531 16532 7ff6386017bd 16527->16532 16537 7ff6386017fd 16527->16537 16530 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16528->16530 16530->16545 16534 7ff6385ff948 _get_daylight 11 API calls 16531->16534 16549 7ff6386017cc 16531->16549 16690 7ff6385fa474 16532->16690 16533 7ff6386018b6 16544 7ff6386018d3 16533->16544 16550 7ff638601925 16533->16550 16538 7ff63860181f 16534->16538 16537->16533 16537->16549 16696 7ff6386081dc 16537->16696 16541 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16538->16541 16540 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16540->16545 16546 7ff63860182d 16541->16546 16542 7ff6386017e5 16542->16537 16552 7ff638601ddc 45 API calls 16542->16552 16543 7ff6386017c7 16547 7ff6385f5cb4 _get_daylight 11 API calls 16543->16547 16548 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16544->16548 16546->16537 16546->16549 16554 7ff6385ff948 _get_daylight 11 API calls 16546->16554 16547->16549 16551 7ff6386018dc 16548->16551 16549->16540 16550->16549 16553 7ff63860422c 40 API calls 16550->16553 16559 7ff6386018e1 16551->16559 16732 7ff63860422c 16551->16732 16552->16537 16555 7ff638601962 16553->16555 16556 7ff63860184f 16554->16556 16557 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16555->16557 16562 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16556->16562 16563 7ff63860196c 16557->16563 16560 7ff638601a28 16559->16560 16566 7ff6385ff948 _get_daylight 11 API calls 16559->16566 16565 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16560->16565 16561 7ff63860190d 16564 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16561->16564 16562->16537 16563->16549 16563->16559 16564->16559 16565->16545 16567 7ff6386019b0 16566->16567 16568 7ff6386019c1 16567->16568 16569 7ff6386019b8 16567->16569 16651 7ff6385fb25c 16568->16651 16570 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16569->16570 16572 7ff6386019bf 16570->16572 16577 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16572->16577 16574 7ff638601a63 16576 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16574->16576 16575 7ff6386019d8 16741 7ff6386082f4 16575->16741 16579 7ff638601a77 16576->16579 16577->16545 16581 7ff638601aa0 16579->16581 16591 7ff638601ab0 16579->16591 16584 7ff6385f5cb4 _get_daylight 11 API calls 16581->16584 16582 7ff638601a20 16585 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16582->16585 16583 7ff6386019ff 16586 7ff6385f5cb4 _get_daylight 11 API calls 16583->16586 16588 7ff638601aa5 16584->16588 16585->16560 16587 7ff638601a04 16586->16587 16589 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16587->16589 16589->16572 16590 7ff638601d93 16593 7ff6385f5cb4 _get_daylight 11 API calls 16590->16593 16591->16590 16592 7ff638601ad2 16591->16592 16594 7ff638601aef 16592->16594 16660 7ff638601ec4 16592->16660 16595 7ff638601d98 16593->16595 16598 7ff638601b63 16594->16598 16599 7ff638601b17 16594->16599 16617 7ff638601b57 16594->16617 16597 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16595->16597 16597->16588 16602 7ff6385ff948 _get_daylight 11 API calls 16598->16602 16614 7ff638601b26 16598->16614 16618 7ff638601b8b 16598->16618 16760 7ff6385fa4b0 16599->16760 16607 7ff638601b7d 16602->16607 16604 7ff6385ff948 _get_daylight 11 API calls 16610 7ff638601bad 16604->16610 16605 7ff638601c16 16611 7ff638601c33 16605->16611 16619 7ff638601c86 16605->16619 16606 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16606->16588 16612 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16607->16612 16608 7ff638601b21 16613 7ff6385f5cb4 _get_daylight 11 API calls 16608->16613 16609 7ff638601b3f 16609->16617 16621 7ff638601ec4 45 API calls 16609->16621 16615 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16610->16615 16616 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16611->16616 16612->16618 16613->16614 16614->16606 16615->16617 16620 7ff638601c3c 16616->16620 16617->16605 16617->16614 16766 7ff63860809c 16617->16766 16618->16604 16618->16614 16618->16617 16619->16614 16622 7ff63860422c 40 API calls 16619->16622 16624 7ff63860422c 40 API calls 16620->16624 16627 7ff638601c42 16620->16627 16621->16617 16623 7ff638601cc4 16622->16623 16625 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16623->16625 16626 7ff638601c6e 16624->16626 16629 7ff638601cce 16625->16629 16630 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16626->16630 16628 7ff638601d87 16627->16628 16632 7ff6385ff948 _get_daylight 11 API calls 16627->16632 16631 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16628->16631 16629->16614 16629->16627 16630->16627 16631->16588 16633 7ff638601d13 16632->16633 16634 7ff638601d24 16633->16634 16635 7ff638601d1b 16633->16635 16637 7ff638601344 _wfindfirst32i64 37 API calls 16634->16637 16636 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16635->16636 16638 7ff638601d22 16636->16638 16639 7ff638601d32 16637->16639 16643 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16638->16643 16640 7ff638601d3a SetEnvironmentVariableW 16639->16640 16641 7ff638601dc7 16639->16641 16644 7ff638601d7f 16640->16644 16645 7ff638601d5e 16640->16645 16642 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16641->16642 16646 7ff638601ddb 16642->16646 16643->16588 16647 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16644->16647 16648 7ff6385f5cb4 _get_daylight 11 API calls 16645->16648 16647->16628 16649 7ff638601d63 16648->16649 16650 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16649->16650 16650->16638 16652 7ff6385fb273 16651->16652 16653 7ff6385fb269 16651->16653 16654 7ff6385f5cb4 _get_daylight 11 API calls 16652->16654 16653->16652 16658 7ff6385fb28e 16653->16658 16655 7ff6385fb27a 16654->16655 16656 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16655->16656 16657 7ff6385fb286 16656->16657 16657->16574 16657->16575 16658->16657 16659 7ff6385f5cb4 _get_daylight 11 API calls 16658->16659 16659->16655 16661 7ff638601f04 16660->16661 16662 7ff638601ee7 16660->16662 16663 7ff6385ff948 _get_daylight 11 API calls 16661->16663 16662->16594 16670 7ff638601f28 16663->16670 16664 7ff638601fac 16666 7ff6385fb2bc __CxxCallCatchBlock 45 API calls 16664->16666 16665 7ff638601f89 16668 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16665->16668 16667 7ff638601fb2 16666->16667 16668->16662 16669 7ff6385ff948 _get_daylight 11 API calls 16669->16670 16670->16664 16670->16665 16670->16669 16671 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16670->16671 16672 7ff638601344 _wfindfirst32i64 37 API calls 16670->16672 16673 7ff638601f98 16670->16673 16671->16670 16672->16670 16674 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16673->16674 16674->16664 16676 7ff638601e11 16675->16676 16677 7ff638601df9 16675->16677 16678 7ff6385ff948 _get_daylight 11 API calls 16676->16678 16677->16527 16685 7ff638601e35 16678->16685 16679 7ff638601eba 16681 7ff6385fb2bc __CxxCallCatchBlock 45 API calls 16679->16681 16680 7ff638601e96 16683 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16680->16683 16682 7ff638601ec0 16681->16682 16683->16677 16684 7ff6385ff948 _get_daylight 11 API calls 16684->16685 16685->16679 16685->16680 16685->16684 16686 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16685->16686 16687 7ff6385fb25c __std_exception_copy 37 API calls 16685->16687 16688 7ff638601ea5 16685->16688 16686->16685 16687->16685 16689 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16688->16689 16689->16679 16691 7ff6385fa484 16690->16691 16692 7ff6385fa48d 16690->16692 16691->16692 16790 7ff6385f9f4c 16691->16790 16692->16542 16692->16543 16697 7ff6386081e9 16696->16697 16698 7ff63860738c 16696->16698 16700 7ff6385f5788 45 API calls 16697->16700 16699 7ff638607399 16698->16699 16705 7ff6386073cf 16698->16705 16701 7ff6385f5cb4 _get_daylight 11 API calls 16699->16701 16720 7ff638607340 16699->16720 16703 7ff63860821d 16700->16703 16704 7ff6386073a3 16701->16704 16702 7ff6386073f9 16706 7ff6385f5cb4 _get_daylight 11 API calls 16702->16706 16707 7ff638608222 16703->16707 16709 7ff638608233 16703->16709 16713 7ff63860824a 16703->16713 16710 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16704->16710 16705->16702 16711 7ff63860741e 16705->16711 16708 7ff6386073fe 16706->16708 16707->16537 16712 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16708->16712 16714 7ff6385f5cb4 _get_daylight 11 API calls 16709->16714 16715 7ff6386073ae 16710->16715 16719 7ff6385f5788 45 API calls 16711->16719 16723 7ff638607409 16711->16723 16712->16723 16717 7ff638608266 16713->16717 16718 7ff638608254 16713->16718 16716 7ff638608238 16714->16716 16715->16537 16721 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16716->16721 16724 7ff638608277 16717->16724 16725 7ff63860828e 16717->16725 16722 7ff6385f5cb4 _get_daylight 11 API calls 16718->16722 16719->16723 16720->16537 16721->16707 16727 7ff638608259 16722->16727 16723->16537 17076 7ff6386073dc 16724->17076 17085 7ff63860a004 16725->17085 16730 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16727->16730 16730->16707 16731 7ff6385f5cb4 _get_daylight 11 API calls 16731->16707 16733 7ff63860424e 16732->16733 16734 7ff63860426b 16732->16734 16733->16734 16735 7ff63860425c 16733->16735 16736 7ff638604275 16734->16736 17125 7ff638608ce8 16734->17125 16737 7ff6385f5cb4 _get_daylight 11 API calls 16735->16737 17132 7ff6386013ac 16736->17132 16739 7ff638604261 memcpy_s 16737->16739 16739->16561 16742 7ff6385f5788 45 API calls 16741->16742 16743 7ff63860835a 16742->16743 16744 7ff638608368 16743->16744 17144 7ff6385ffbd4 16743->17144 17147 7ff6385f5d74 16744->17147 16748 7ff638608454 16751 7ff638608465 16748->16751 16753 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16748->16753 16749 7ff6385f5788 45 API calls 16750 7ff6386083d7 16749->16750 16755 7ff6385ffbd4 5 API calls 16750->16755 16756 7ff6386083e0 16750->16756 16752 7ff6386019fb 16751->16752 16754 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16751->16754 16752->16582 16752->16583 16753->16751 16754->16752 16755->16756 16757 7ff6385f5d74 14 API calls 16756->16757 16758 7ff63860843b 16757->16758 16758->16748 16759 7ff638608443 SetEnvironmentVariableW 16758->16759 16759->16748 16761 7ff6385fa4c0 16760->16761 16762 7ff6385fa4c9 16760->16762 16761->16762 17174 7ff6385f9fc0 16761->17174 16762->16608 16762->16609 16767 7ff6386080a9 16766->16767 16770 7ff6386080d6 16766->16770 16768 7ff6386080ae 16767->16768 16767->16770 16769 7ff6385f5cb4 _get_daylight 11 API calls 16768->16769 16772 7ff6386080b3 16769->16772 16771 7ff63860811a 16770->16771 16774 7ff638608139 16770->16774 16788 7ff63860810e __crtLCMapStringW 16770->16788 16773 7ff6385f5cb4 _get_daylight 11 API calls 16771->16773 16775 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16772->16775 16776 7ff63860811f 16773->16776 16777 7ff638608143 16774->16777 16778 7ff638608155 16774->16778 16779 7ff6386080be 16775->16779 16781 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16776->16781 16782 7ff6385f5cb4 _get_daylight 11 API calls 16777->16782 16780 7ff6385f5788 45 API calls 16778->16780 16779->16617 16783 7ff638608162 16780->16783 16781->16788 16784 7ff638608148 16782->16784 16783->16788 17221 7ff638609bc0 16783->17221 16785 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16784->16785 16785->16788 16788->16617 16789 7ff6385f5cb4 _get_daylight 11 API calls 16789->16788 16791 7ff6385f9f65 16790->16791 16792 7ff6385f9f61 16790->16792 16813 7ff638603440 16791->16813 16792->16692 16805 7ff6385fa2a0 16792->16805 16797 7ff6385f9f83 16839 7ff6385fa030 16797->16839 16798 7ff6385f9f77 16799 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16798->16799 16799->16792 16802 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16803 7ff6385f9faa 16802->16803 16804 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16803->16804 16804->16792 16806 7ff6385fa2c9 16805->16806 16811 7ff6385fa2e2 16805->16811 16806->16692 16807 7ff6385ff948 _get_daylight 11 API calls 16807->16811 16808 7ff6385fa372 16810 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16808->16810 16809 7ff638601640 WideCharToMultiByte 16809->16811 16810->16806 16811->16806 16811->16807 16811->16808 16811->16809 16812 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16811->16812 16812->16811 16814 7ff63860344d 16813->16814 16815 7ff6385f9f6a 16813->16815 16858 7ff6385fbfd4 16814->16858 16819 7ff63860377c GetEnvironmentStringsW 16815->16819 16820 7ff6385f9f6f 16819->16820 16821 7ff6386037ac 16819->16821 16820->16797 16820->16798 16822 7ff638601640 WideCharToMultiByte 16821->16822 16823 7ff6386037fd 16822->16823 16824 7ff638603804 FreeEnvironmentStringsW 16823->16824 16825 7ff6385fe3ac _fread_nolock 12 API calls 16823->16825 16824->16820 16826 7ff638603817 16825->16826 16827 7ff63860381f 16826->16827 16828 7ff638603828 16826->16828 16829 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16827->16829 16830 7ff638601640 WideCharToMultiByte 16828->16830 16831 7ff638603826 16829->16831 16832 7ff63860384b 16830->16832 16831->16824 16833 7ff63860384f 16832->16833 16834 7ff638603859 16832->16834 16835 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16833->16835 16836 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16834->16836 16837 7ff638603857 FreeEnvironmentStringsW 16835->16837 16836->16837 16837->16820 16840 7ff6385fa055 16839->16840 16841 7ff6385ff948 _get_daylight 11 API calls 16840->16841 16842 7ff6385fa08b 16841->16842 16844 7ff6385fa106 16842->16844 16847 7ff6385ff948 _get_daylight 11 API calls 16842->16847 16848 7ff6385fa0f5 16842->16848 16849 7ff6385fb25c __std_exception_copy 37 API calls 16842->16849 16852 7ff6385fa12b 16842->16852 16854 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16842->16854 16855 7ff6385fa093 16842->16855 16843 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16846 7ff6385f9f8b 16843->16846 16845 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16844->16845 16845->16846 16846->16802 16847->16842 17070 7ff6385fa25c 16848->17070 16849->16842 16856 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16852->16856 16853 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16853->16855 16854->16842 16855->16843 16857 7ff6385fa13e 16856->16857 16859 7ff6385fbfe5 FlsGetValue 16858->16859 16860 7ff6385fc000 FlsSetValue 16858->16860 16861 7ff6385fbff2 16859->16861 16862 7ff6385fbffa 16859->16862 16860->16861 16863 7ff6385fc00d 16860->16863 16865 7ff6385fb2bc __CxxCallCatchBlock 45 API calls 16861->16865 16867 7ff6385fbff8 16861->16867 16862->16860 16864 7ff6385ff948 _get_daylight 11 API calls 16863->16864 16866 7ff6385fc01c 16864->16866 16868 7ff6385fc075 16865->16868 16869 7ff6385fc03a FlsSetValue 16866->16869 16870 7ff6385fc02a FlsSetValue 16866->16870 16878 7ff638603114 16867->16878 16872 7ff6385fc058 16869->16872 16873 7ff6385fc046 FlsSetValue 16869->16873 16871 7ff6385fc033 16870->16871 16874 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16871->16874 16875 7ff6385fbcac _get_daylight 11 API calls 16872->16875 16873->16871 16874->16861 16876 7ff6385fc060 16875->16876 16877 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16876->16877 16877->16867 16901 7ff638603384 16878->16901 16880 7ff638603149 16916 7ff638602e14 16880->16916 16883 7ff6385fe3ac _fread_nolock 12 API calls 16884 7ff638603177 16883->16884 16885 7ff63860317f 16884->16885 16887 7ff63860318e 16884->16887 16886 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16885->16886 16900 7ff638603166 16886->16900 16887->16887 16923 7ff6386034bc 16887->16923 16890 7ff63860328a 16891 7ff6385f5cb4 _get_daylight 11 API calls 16890->16891 16892 7ff63860328f 16891->16892 16896 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16892->16896 16893 7ff6386032a4 16895 7ff6386032e5 16893->16895 16897 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16893->16897 16894 7ff63860334c 16899 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16894->16899 16895->16894 16934 7ff638602c44 16895->16934 16896->16900 16897->16895 16899->16900 16900->16815 16902 7ff6386033a7 16901->16902 16903 7ff6386033b1 16902->16903 16949 7ff6386011a8 EnterCriticalSection 16902->16949 16905 7ff638603423 16903->16905 16907 7ff6385fb2bc __CxxCallCatchBlock 45 API calls 16903->16907 16905->16880 16909 7ff63860343b 16907->16909 16911 7ff638603492 16909->16911 16913 7ff6385fbfd4 50 API calls 16909->16913 16911->16880 16914 7ff63860347c 16913->16914 16915 7ff638603114 65 API calls 16914->16915 16915->16911 16950 7ff6385f5788 16916->16950 16919 7ff638602e34 GetOEMCP 16921 7ff638602e5b 16919->16921 16920 7ff638602e46 16920->16921 16922 7ff638602e4b GetACP 16920->16922 16921->16883 16921->16900 16922->16921 16924 7ff638602e14 47 API calls 16923->16924 16925 7ff6386034e9 16924->16925 16926 7ff63860363f 16925->16926 16928 7ff638603526 IsValidCodePage 16925->16928 16933 7ff638603540 memcpy_s 16925->16933 16927 7ff6385ec010 _wfindfirst32i64 8 API calls 16926->16927 16929 7ff638603281 16927->16929 16928->16926 16930 7ff638603537 16928->16930 16929->16890 16929->16893 16931 7ff638603566 GetCPInfo 16930->16931 16930->16933 16931->16926 16931->16933 16982 7ff638602f2c 16933->16982 17069 7ff6386011a8 EnterCriticalSection 16934->17069 16951 7ff6385f57ac 16950->16951 16952 7ff6385f57a7 16950->16952 16951->16952 16953 7ff6385fbf00 __CxxCallCatchBlock 45 API calls 16951->16953 16952->16919 16952->16920 16954 7ff6385f57c7 16953->16954 16958 7ff6385fe734 16954->16958 16959 7ff6385fe749 16958->16959 16961 7ff6385f57ea 16958->16961 16959->16961 16966 7ff638604154 16959->16966 16962 7ff6385fe7a0 16961->16962 16963 7ff6385fe7b5 16962->16963 16964 7ff6385fe7c8 16962->16964 16963->16964 16979 7ff6386034a0 16963->16979 16964->16952 16967 7ff6385fbf00 __CxxCallCatchBlock 45 API calls 16966->16967 16968 7ff638604163 16967->16968 16969 7ff6386041ae 16968->16969 16978 7ff6386011a8 EnterCriticalSection 16968->16978 16969->16961 16980 7ff6385fbf00 __CxxCallCatchBlock 45 API calls 16979->16980 16981 7ff6386034a9 16980->16981 16983 7ff638602f69 GetCPInfo 16982->16983 16992 7ff63860305f 16982->16992 16989 7ff638602f7c 16983->16989 16983->16992 16984 7ff6385ec010 _wfindfirst32i64 8 API calls 16985 7ff6386030fe 16984->16985 16985->16926 16993 7ff638603c90 16989->16993 16992->16984 16994 7ff6385f5788 45 API calls 16993->16994 16995 7ff638603cd2 16994->16995 17013 7ff6386003f0 16995->17013 17015 7ff6386003f9 MultiByteToWideChar 17013->17015 17074 7ff6385fa261 17070->17074 17075 7ff6385fa0fd 17070->17075 17071 7ff6385fa28a 17073 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17071->17073 17072 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17072->17074 17073->17075 17074->17071 17074->17072 17075->16853 17077 7ff638607410 17076->17077 17078 7ff6386073f9 17076->17078 17077->17078 17081 7ff63860741e 17077->17081 17079 7ff6385f5cb4 _get_daylight 11 API calls 17078->17079 17080 7ff6386073fe 17079->17080 17082 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 17080->17082 17083 7ff638607409 17081->17083 17084 7ff6385f5788 45 API calls 17081->17084 17082->17083 17083->16707 17084->17083 17086 7ff6385f5788 45 API calls 17085->17086 17087 7ff63860a029 17086->17087 17090 7ff638609c80 17087->17090 17092 7ff638609cce 17090->17092 17091 7ff6385ec010 _wfindfirst32i64 8 API calls 17093 7ff6386082b5 17091->17093 17094 7ff638609d55 17092->17094 17096 7ff638609d40 GetCPInfo 17092->17096 17099 7ff638609d59 17092->17099 17093->16707 17093->16731 17095 7ff6386003f0 _fread_nolock MultiByteToWideChar 17094->17095 17094->17099 17097 7ff638609ded 17095->17097 17096->17094 17096->17099 17098 7ff6385fe3ac _fread_nolock 12 API calls 17097->17098 17097->17099 17100 7ff638609e24 17097->17100 17098->17100 17099->17091 17100->17099 17101 7ff6386003f0 _fread_nolock MultiByteToWideChar 17100->17101 17102 7ff638609e92 17101->17102 17103 7ff6386003f0 _fread_nolock MultiByteToWideChar 17102->17103 17112 7ff638609f74 17102->17112 17105 7ff638609eb8 17103->17105 17104 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17104->17099 17106 7ff6385fe3ac _fread_nolock 12 API calls 17105->17106 17107 7ff638609ee5 17105->17107 17105->17112 17106->17107 17108 7ff6386003f0 _fread_nolock MultiByteToWideChar 17107->17108 17107->17112 17109 7ff638609f5c 17108->17109 17110 7ff638609f7c 17109->17110 17111 7ff638609f62 17109->17111 17119 7ff6385ffc18 17110->17119 17111->17112 17114 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17111->17114 17112->17099 17112->17104 17114->17112 17116 7ff638609fbb 17116->17099 17118 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17116->17118 17117 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17117->17116 17118->17099 17120 7ff6385ff9c0 __crtLCMapStringW 5 API calls 17119->17120 17121 7ff6385ffc56 17120->17121 17122 7ff6385ffe80 __crtLCMapStringW 5 API calls 17121->17122 17123 7ff6385ffc5e 17121->17123 17124 7ff6385ffcc7 CompareStringW 17122->17124 17123->17116 17123->17117 17124->17123 17126 7ff638608d0a HeapSize 17125->17126 17127 7ff638608cf1 17125->17127 17128 7ff6385f5cb4 _get_daylight 11 API calls 17127->17128 17129 7ff638608cf6 17128->17129 17130 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 17129->17130 17131 7ff638608d01 17130->17131 17131->16736 17133 7ff6386013c1 17132->17133 17134 7ff6386013cb 17132->17134 17135 7ff6385fe3ac _fread_nolock 12 API calls 17133->17135 17136 7ff6386013d0 17134->17136 17142 7ff6386013d7 _get_daylight 17134->17142 17140 7ff6386013c9 17135->17140 17137 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17136->17137 17137->17140 17138 7ff6386013dd 17141 7ff6385f5cb4 _get_daylight 11 API calls 17138->17141 17139 7ff63860140a HeapReAlloc 17139->17140 17139->17142 17140->16739 17141->17140 17142->17138 17142->17139 17143 7ff6386043e0 _get_daylight 2 API calls 17142->17143 17143->17142 17145 7ff6385ff9c0 __crtLCMapStringW 5 API calls 17144->17145 17146 7ff6385ffbf4 17145->17146 17146->16744 17148 7ff6385f5dc2 17147->17148 17149 7ff6385f5d9e 17147->17149 17150 7ff6385f5e1c 17148->17150 17151 7ff6385f5dc7 17148->17151 17153 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17149->17153 17156 7ff6385f5dad 17149->17156 17152 7ff6386003f0 _fread_nolock MultiByteToWideChar 17150->17152 17154 7ff6385f5ddc 17151->17154 17151->17156 17157 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17151->17157 17163 7ff6385f5e38 17152->17163 17153->17156 17158 7ff6385fe3ac _fread_nolock 12 API calls 17154->17158 17155 7ff6385f5e3f GetLastError 17169 7ff6385f5c28 17155->17169 17156->16748 17156->16749 17157->17154 17158->17156 17160 7ff6385f5e7a 17160->17156 17161 7ff6386003f0 _fread_nolock MultiByteToWideChar 17160->17161 17165 7ff6385f5ebe 17161->17165 17163->17155 17163->17160 17164 7ff6385f5e6d 17163->17164 17167 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17163->17167 17168 7ff6385fe3ac _fread_nolock 12 API calls 17164->17168 17165->17155 17165->17156 17166 7ff6385f5cb4 _get_daylight 11 API calls 17166->17156 17167->17164 17168->17160 17170 7ff6385fc078 _get_daylight 11 API calls 17169->17170 17171 7ff6385f5c35 Concurrency::details::SchedulerProxy::DeleteThis 17170->17171 17172 7ff6385fc078 _get_daylight 11 API calls 17171->17172 17173 7ff6385f5c57 17172->17173 17173->17166 17175 7ff6385f9fd9 17174->17175 17186 7ff6385f9fd5 17174->17186 17195 7ff63860388c GetEnvironmentStringsW 17175->17195 17178 7ff6385f9ff2 17202 7ff6385fa140 17178->17202 17179 7ff6385f9fe6 17180 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17179->17180 17180->17186 17183 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17184 7ff6385fa019 17183->17184 17185 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17184->17185 17185->17186 17186->16762 17187 7ff6385fa380 17186->17187 17188 7ff6385fa3a3 17187->17188 17189 7ff6385fa3ba 17187->17189 17188->16762 17189->17188 17190 7ff6385ff948 _get_daylight 11 API calls 17189->17190 17191 7ff6385fa42e 17189->17191 17192 7ff6386003f0 MultiByteToWideChar _fread_nolock 17189->17192 17194 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17189->17194 17190->17189 17193 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17191->17193 17192->17189 17193->17188 17194->17189 17196 7ff6385f9fde 17195->17196 17197 7ff6386038b0 17195->17197 17196->17178 17196->17179 17198 7ff6385fe3ac _fread_nolock 12 API calls 17197->17198 17199 7ff6386038e7 memcpy_s 17198->17199 17200 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17199->17200 17201 7ff638603907 FreeEnvironmentStringsW 17200->17201 17201->17196 17203 7ff6385fa168 17202->17203 17204 7ff6385ff948 _get_daylight 11 API calls 17203->17204 17215 7ff6385fa1a3 17204->17215 17205 7ff6385fa1ab 17206 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17205->17206 17207 7ff6385f9ffa 17206->17207 17207->17183 17208 7ff6385fa225 17209 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17208->17209 17209->17207 17210 7ff6385ff948 _get_daylight 11 API calls 17210->17215 17211 7ff6385fa214 17213 7ff6385fa25c 11 API calls 17211->17213 17212 7ff638601344 _wfindfirst32i64 37 API calls 17212->17215 17214 7ff6385fa21c 17213->17214 17217 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17214->17217 17215->17205 17215->17208 17215->17210 17215->17211 17215->17212 17216 7ff6385fa248 17215->17216 17219 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17215->17219 17218 7ff6385fb6b8 _wfindfirst32i64 17 API calls 17216->17218 17217->17205 17220 7ff6385fa25a 17218->17220 17219->17215 17222 7ff638609be9 __crtLCMapStringW 17221->17222 17223 7ff63860819e 17222->17223 17224 7ff6385ffc18 6 API calls 17222->17224 17223->16788 17223->16789 17224->17223 20102 7ff6385e9d9b 20104 7ff6385e9da1 20102->20104 20103 7ff6385eb850 12 API calls 20105 7ff6385ea656 20103->20105 20104->20103 20104->20105 20741 7ff6385f5b00 20742 7ff6385f5b0b 20741->20742 20750 7ff6385fff54 20742->20750 20763 7ff6386011a8 EnterCriticalSection 20750->20763 20411 7ff6385fbd80 20412 7ff6385fbd85 20411->20412 20413 7ff6385fbd9a 20411->20413 20417 7ff6385fbda0 20412->20417 20418 7ff6385fbde2 20417->20418 20419 7ff6385fbdea 20417->20419 20420 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20418->20420 20421 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20419->20421 20420->20419 20422 7ff6385fbdf7 20421->20422 20423 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20422->20423 20424 7ff6385fbe04 20423->20424 20425 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20424->20425 20426 7ff6385fbe11 20425->20426 20427 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20426->20427 20428 7ff6385fbe1e 20427->20428 20429 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20428->20429 20430 7ff6385fbe2b 20429->20430 20431 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20430->20431 20432 7ff6385fbe38 20431->20432 20433 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20432->20433 20434 7ff6385fbe45 20433->20434 20435 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20434->20435 20436 7ff6385fbe55 20435->20436 20437 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20436->20437 20438 7ff6385fbe65 20437->20438 20443 7ff6385fbc4c 20438->20443 20457 7ff6386011a8 EnterCriticalSection 20443->20457 20764 7ff6385fab00 20767 7ff6385faa80 20764->20767 20774 7ff6386011a8 EnterCriticalSection 20767->20774 20775 7ff638602500 20786 7ff638608494 20775->20786 20787 7ff6386084a1 20786->20787 20788 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20787->20788 20790 7ff6386084bd 20787->20790 20788->20787 20789 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20789->20790 20790->20789 20791 7ff638602509 20790->20791 20792 7ff6386011a8 EnterCriticalSection 20791->20792 20699 7ff63860bc8e 20700 7ff63860bc9e 20699->20700 20703 7ff6385f5b68 LeaveCriticalSection 20700->20703 20594 7ff63860be14 20597 7ff6385f5b68 LeaveCriticalSection 20594->20597 16222 7ff6385fa715 16234 7ff6385fb188 16222->16234 16239 7ff6385fbf00 GetLastError 16234->16239 16240 7ff6385fbf24 FlsGetValue 16239->16240 16241 7ff6385fbf41 FlsSetValue 16239->16241 16242 7ff6385fbf3b 16240->16242 16258 7ff6385fbf31 SetLastError 16240->16258 16243 7ff6385fbf53 16241->16243 16241->16258 16242->16241 16270 7ff6385ff948 16243->16270 16247 7ff6385fbfcd 16251 7ff6385fb2bc __CxxCallCatchBlock 38 API calls 16247->16251 16248 7ff6385fb191 16261 7ff6385fb2bc 16248->16261 16249 7ff6385fbf80 FlsSetValue 16254 7ff6385fbf9e 16249->16254 16255 7ff6385fbf8c FlsSetValue 16249->16255 16250 7ff6385fbf70 FlsSetValue 16253 7ff6385fbf79 16250->16253 16252 7ff6385fbfd2 16251->16252 16277 7ff6385fb700 16253->16277 16283 7ff6385fbcac 16254->16283 16255->16253 16258->16247 16258->16248 16331 7ff6386044a0 16261->16331 16275 7ff6385ff959 _get_daylight 16270->16275 16271 7ff6385ff9aa 16291 7ff6385f5cb4 16271->16291 16272 7ff6385ff98e RtlAllocateHeap 16273 7ff6385fbf62 16272->16273 16272->16275 16273->16249 16273->16250 16275->16271 16275->16272 16288 7ff6386043e0 16275->16288 16278 7ff6385fb705 RtlRestoreThreadPreferredUILanguages 16277->16278 16279 7ff6385fb734 16277->16279 16278->16279 16280 7ff6385fb720 GetLastError 16278->16280 16279->16258 16281 7ff6385fb72d Concurrency::details::SchedulerProxy::DeleteThis 16280->16281 16282 7ff6385f5cb4 _get_daylight 9 API calls 16281->16282 16282->16279 16317 7ff6385fbb84 16283->16317 16294 7ff638604420 16288->16294 16300 7ff6385fc078 GetLastError 16291->16300 16293 7ff6385f5cbd 16293->16273 16299 7ff6386011a8 EnterCriticalSection 16294->16299 16301 7ff6385fc09c 16300->16301 16302 7ff6385fc0b9 FlsSetValue 16300->16302 16301->16302 16315 7ff6385fc0a9 16301->16315 16303 7ff6385fc0cb 16302->16303 16302->16315 16305 7ff6385ff948 _get_daylight 5 API calls 16303->16305 16304 7ff6385fc125 SetLastError 16304->16293 16306 7ff6385fc0da 16305->16306 16307 7ff6385fc0f8 FlsSetValue 16306->16307 16308 7ff6385fc0e8 FlsSetValue 16306->16308 16310 7ff6385fc104 FlsSetValue 16307->16310 16311 7ff6385fc116 16307->16311 16309 7ff6385fc0f1 16308->16309 16313 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16309->16313 16310->16309 16312 7ff6385fbcac _get_daylight 5 API calls 16311->16312 16314 7ff6385fc11e 16312->16314 16313->16315 16316 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16314->16316 16315->16304 16316->16304 16329 7ff6386011a8 EnterCriticalSection 16317->16329 16365 7ff638604458 16331->16365 16370 7ff6386011a8 EnterCriticalSection 16365->16370 20827 7ff6385ec2e0 20828 7ff6385ec2f0 20827->20828 20844 7ff6385fa95c 20828->20844 20830 7ff6385ec2fc 20850 7ff6385ec5d8 20830->20850 20832 7ff6385ec8bc 7 API calls 20834 7ff6385ec395 20832->20834 20833 7ff6385ec314 _RTC_Initialize 20842 7ff6385ec369 20833->20842 20855 7ff6385ec788 20833->20855 20836 7ff6385ec329 20858 7ff6385f9dc8 20836->20858 20842->20832 20843 7ff6385ec385 20842->20843 20845 7ff6385fa96d 20844->20845 20846 7ff6385fa975 20845->20846 20847 7ff6385f5cb4 _get_daylight 11 API calls 20845->20847 20846->20830 20848 7ff6385fa984 20847->20848 20849 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 20848->20849 20849->20846 20851 7ff6385ec5e9 20850->20851 20854 7ff6385ec5ee __scrt_acquire_startup_lock 20850->20854 20852 7ff6385ec8bc 7 API calls 20851->20852 20851->20854 20853 7ff6385ec662 20852->20853 20854->20833 20883 7ff6385ec74c 20855->20883 20857 7ff6385ec791 20857->20836 20859 7ff6385f9de8 20858->20859 20860 7ff6385ec335 20858->20860 20861 7ff6385f9df0 20859->20861 20862 7ff6385f9e06 GetModuleFileNameW 20859->20862 20860->20842 20882 7ff6385ec85c InitializeSListHead 20860->20882 20863 7ff6385f5cb4 _get_daylight 11 API calls 20861->20863 20866 7ff6385f9e31 20862->20866 20864 7ff6385f9df5 20863->20864 20865 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 20864->20865 20865->20860 20898 7ff6385f9d68 20866->20898 20869 7ff6385f9e79 20870 7ff6385f5cb4 _get_daylight 11 API calls 20869->20870 20871 7ff6385f9e7e 20870->20871 20872 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20871->20872 20872->20860 20873 7ff6385f9eb3 20875 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20873->20875 20874 7ff6385f9e91 20874->20873 20876 7ff6385f9edf 20874->20876 20877 7ff6385f9ef8 20874->20877 20875->20860 20878 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20876->20878 20879 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20877->20879 20880 7ff6385f9ee8 20878->20880 20879->20873 20881 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20880->20881 20881->20860 20884 7ff6385ec766 20883->20884 20886 7ff6385ec75f 20883->20886 20887 7ff6385faf9c 20884->20887 20886->20857 20890 7ff6385fabd8 20887->20890 20897 7ff6386011a8 EnterCriticalSection 20890->20897 20899 7ff6385f9db8 20898->20899 20900 7ff6385f9d80 20898->20900 20899->20869 20899->20874 20900->20899 20901 7ff6385ff948 _get_daylight 11 API calls 20900->20901 20902 7ff6385f9dae 20901->20902 20903 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20902->20903 20903->20899 20039 7ff6385eb2dc 20040 7ff6385ea5da 20039->20040 20042 7ff6385ea656 20040->20042 20043 7ff6385eb850 20040->20043 20044 7ff6385eb873 20043->20044 20045 7ff6385eb88f memcpy_s 20043->20045 20046 7ff6385fe3ac 12 API calls 20044->20046 20045->20042 20046->20045 20047 7ff6386004dc 20048 7ff6386006ce 20047->20048 20050 7ff63860051e _isindst 20047->20050 20049 7ff6385f5cb4 _get_daylight 11 API calls 20048->20049 20067 7ff6386006be 20049->20067 20050->20048 20053 7ff63860059e _isindst 20050->20053 20051 7ff6385ec010 _wfindfirst32i64 8 API calls 20052 7ff6386006e9 20051->20052 20068 7ff6386070e4 20053->20068 20058 7ff6386006fa 20060 7ff6385fb6b8 _wfindfirst32i64 17 API calls 20058->20060 20062 7ff63860070e 20060->20062 20065 7ff6386005fb 20065->20067 20093 7ff638607128 20065->20093 20067->20051 20069 7ff6386070f3 20068->20069 20070 7ff6386005bc 20068->20070 20100 7ff6386011a8 EnterCriticalSection 20069->20100 20075 7ff6386064e8 20070->20075 20076 7ff6386064f1 20075->20076 20077 7ff6386005d1 20075->20077 20078 7ff6385f5cb4 _get_daylight 11 API calls 20076->20078 20077->20058 20081 7ff638606518 20077->20081 20079 7ff6386064f6 20078->20079 20080 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 20079->20080 20080->20077 20082 7ff638606521 20081->20082 20084 7ff6386005e2 20081->20084 20083 7ff6385f5cb4 _get_daylight 11 API calls 20082->20083 20085 7ff638606526 20083->20085 20084->20058 20087 7ff638606548 20084->20087 20086 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 20085->20086 20086->20084 20088 7ff638606551 20087->20088 20089 7ff6386005f3 20087->20089 20090 7ff6385f5cb4 _get_daylight 11 API calls 20088->20090 20089->20058 20089->20065 20091 7ff638606556 20090->20091 20092 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 20091->20092 20092->20089 20101 7ff6386011a8 EnterCriticalSection 20093->20101 16444 7ff6385f8670 16445 7ff6385f869e 16444->16445 16446 7ff6385f86d7 16444->16446 16447 7ff6385f5cb4 _get_daylight 11 API calls 16445->16447 16446->16445 16448 7ff6385f86dc FindFirstFileExW 16446->16448 16449 7ff6385f86a3 16447->16449 16450 7ff6385f8745 16448->16450 16451 7ff6385f86fe GetLastError 16448->16451 16452 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16449->16452 16504 7ff6385f88e0 16450->16504 16454 7ff6385f8735 16451->16454 16455 7ff6385f8709 16451->16455 16472 7ff6385f86ae 16452->16472 16456 7ff6385f5cb4 _get_daylight 11 API calls 16454->16456 16455->16454 16459 7ff6385f8725 16455->16459 16460 7ff6385f8713 16455->16460 16456->16472 16458 7ff6385f88e0 _wfindfirst32i64 10 API calls 16463 7ff6385f876b 16458->16463 16461 7ff6385f5cb4 _get_daylight 11 API calls 16459->16461 16460->16454 16464 7ff6385f8718 16460->16464 16461->16472 16462 7ff6385ec010 _wfindfirst32i64 8 API calls 16465 7ff6385f86c2 16462->16465 16466 7ff6385f88e0 _wfindfirst32i64 10 API calls 16463->16466 16467 7ff6385f5cb4 _get_daylight 11 API calls 16464->16467 16468 7ff6385f8779 16466->16468 16467->16472 16511 7ff638601344 16468->16511 16471 7ff6385f87a3 16473 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16471->16473 16472->16462 16474 7ff6385f87b7 16473->16474 16475 7ff6385f87e1 16474->16475 16478 7ff6385f8820 FindNextFileW 16474->16478 16476 7ff6385f5cb4 _get_daylight 11 API calls 16475->16476 16477 7ff6385f87e6 16476->16477 16479 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16477->16479 16480 7ff6385f8870 16478->16480 16481 7ff6385f882f GetLastError 16478->16481 16482 7ff6385f87f1 16479->16482 16483 7ff6385f88e0 _wfindfirst32i64 10 API calls 16480->16483 16484 7ff6385f8863 16481->16484 16485 7ff6385f883a 16481->16485 16490 7ff6385ec010 _wfindfirst32i64 8 API calls 16482->16490 16487 7ff6385f8888 16483->16487 16486 7ff6385f5cb4 _get_daylight 11 API calls 16484->16486 16485->16484 16488 7ff6385f8844 16485->16488 16489 7ff6385f8856 16485->16489 16486->16482 16491 7ff6385f88e0 _wfindfirst32i64 10 API calls 16487->16491 16488->16484 16492 7ff6385f8849 16488->16492 16493 7ff6385f5cb4 _get_daylight 11 API calls 16489->16493 16494 7ff6385f8804 16490->16494 16495 7ff6385f8896 16491->16495 16497 7ff6385f5cb4 _get_daylight 11 API calls 16492->16497 16493->16482 16496 7ff6385f88e0 _wfindfirst32i64 10 API calls 16495->16496 16498 7ff6385f88a4 16496->16498 16497->16482 16499 7ff638601344 _wfindfirst32i64 37 API calls 16498->16499 16500 7ff6385f88c2 16499->16500 16500->16482 16501 7ff6385f88ca 16500->16501 16502 7ff6385fb6b8 _wfindfirst32i64 17 API calls 16501->16502 16503 7ff6385f88de 16502->16503 16505 7ff6385f88fe FileTimeToSystemTime 16504->16505 16506 7ff6385f88f8 16504->16506 16507 7ff6385f890d SystemTimeToTzSpecificLocalTime 16505->16507 16508 7ff6385f8923 16505->16508 16506->16505 16506->16508 16507->16508 16509 7ff6385ec010 _wfindfirst32i64 8 API calls 16508->16509 16510 7ff6385f875d 16509->16510 16510->16458 16512 7ff638601351 16511->16512 16513 7ff63860135b 16511->16513 16512->16513 16518 7ff638601377 16512->16518 16514 7ff6385f5cb4 _get_daylight 11 API calls 16513->16514 16515 7ff638601363 16514->16515 16516 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 16515->16516 16517 7ff6385f8797 16516->16517 16517->16471 16517->16472 16518->16517 16519 7ff6385f5cb4 _get_daylight 11 API calls 16518->16519 16519->16515 20521 7ff6385ea76d 20523 7ff6385ea772 20521->20523 20522 7ff6385ea656 20523->20523 20529 7ff6385ea8da 20523->20529 20530 7ff6385ea443 20523->20530 20531 7ff6385eb960 20523->20531 20524 7ff6385eb850 12 API calls 20524->20522 20526 7ff6385eb960 12 API calls 20527 7ff6385eabe8 20526->20527 20528 7ff6385eb960 12 API calls 20527->20528 20528->20530 20529->20526 20529->20530 20530->20522 20530->20524 20532 7ff6385eb9c0 20531->20532 20533 7ff6385ebefa 20532->20533 20536 7ff6385eb9df 20532->20536 20534 7ff6385ec144 8 API calls 20533->20534 20535 7ff6385ebeff 20534->20535 20537 7ff6385ec010 _wfindfirst32i64 8 API calls 20536->20537 20538 7ff6385ebedc 20537->20538 20538->20529 21040 7ff6385fd2d0 21051 7ff6386011a8 EnterCriticalSection 21040->21051 17225 7ff6385ec3cc 17246 7ff6385ec59c 17225->17246 17228 7ff6385ec518 17350 7ff6385ec8bc IsProcessorFeaturePresent 17228->17350 17229 7ff6385ec3e8 __scrt_acquire_startup_lock 17231 7ff6385ec522 17229->17231 17236 7ff6385ec406 __scrt_release_startup_lock 17229->17236 17232 7ff6385ec8bc 7 API calls 17231->17232 17234 7ff6385ec52d __CxxCallCatchBlock 17232->17234 17233 7ff6385ec42b 17235 7ff6385ec4b1 17252 7ff6385eca04 17235->17252 17236->17233 17236->17235 17339 7ff6385fa8e0 17236->17339 17238 7ff6385ec4b6 17255 7ff6385e1000 17238->17255 17243 7ff6385ec4d9 17243->17234 17346 7ff6385ec720 17243->17346 17247 7ff6385ec5a4 17246->17247 17248 7ff6385ec5b0 __scrt_dllmain_crt_thread_attach 17247->17248 17249 7ff6385ec3e0 17248->17249 17250 7ff6385ec5bd 17248->17250 17249->17228 17249->17229 17250->17249 17357 7ff6385ed1c0 17250->17357 17384 7ff63860b580 17252->17384 17254 7ff6385eca1b GetStartupInfoW 17254->17238 17256 7ff6385e100b 17255->17256 17386 7ff6385e89b0 17256->17386 17258 7ff6385e101d 17393 7ff6385f66e8 17258->17393 17260 7ff6385e39ab 17400 7ff6385e1ea0 17260->17400 17264 7ff6385ec010 _wfindfirst32i64 8 API calls 17265 7ff6385e3b73 17264->17265 17344 7ff6385eca48 GetModuleHandleW 17265->17344 17266 7ff6385e39ca 17337 7ff6385e3ab2 17266->17337 17425 7ff6385e7d70 17266->17425 17268 7ff6385e39ff 17269 7ff6385e3a4b 17268->17269 17271 7ff6385e7d70 61 API calls 17268->17271 17440 7ff6385e8250 17269->17440 17275 7ff6385e3a20 __std_exception_destroy 17271->17275 17272 7ff6385e3a60 17444 7ff6385e1ca0 17272->17444 17275->17269 17279 7ff6385e8250 58 API calls 17275->17279 17276 7ff6385e3b2d 17277 7ff6385e3b8d 17276->17277 17463 7ff6385e8b80 17276->17463 17281 7ff6385e3bdb 17277->17281 17277->17337 17487 7ff6385e8de0 17277->17487 17278 7ff6385e1ca0 121 API calls 17280 7ff6385e3a96 17278->17280 17279->17269 17284 7ff6385e3a9a 17280->17284 17285 7ff6385e3ab7 17280->17285 17501 7ff6385e6ff0 17281->17501 17563 7ff6385e2b10 17284->17563 17285->17276 17576 7ff6385e4060 17285->17576 17287 7ff6385e3bc0 17291 7ff6385e3b53 17287->17291 17292 7ff6385e3bce SetDllDirectoryW 17287->17292 17297 7ff6385e2b10 59 API calls 17291->17297 17292->17281 17296 7ff6385e3ad5 17303 7ff6385e2b10 59 API calls 17296->17303 17297->17337 17300 7ff6385e3bf5 17326 7ff6385e3c27 17300->17326 17608 7ff6385e6800 17300->17608 17301 7ff6385e3b03 17301->17276 17305 7ff6385e3b08 17301->17305 17302 7ff6385e3d11 17505 7ff6385e34a0 17302->17505 17303->17337 17595 7ff6385f097c 17305->17595 17310 7ff6385e3c46 17318 7ff6385e3c88 17310->17318 17644 7ff6385e1ee0 17310->17644 17311 7ff6385e3c29 17316 7ff6385e6a50 FreeLibrary 17311->17316 17314 7ff6385e3cdc 17648 7ff6385e3440 17314->17648 17315 7ff6385e3cb9 PostMessageW GetMessageW 17315->17314 17316->17326 17318->17314 17318->17315 17318->17337 17320 7ff6385e3d2b 17513 7ff6385e81e0 17320->17513 17324 7ff6385e3d3e 17327 7ff6385e7d70 61 API calls 17324->17327 17326->17302 17326->17310 17329 7ff6385e3d4a 17327->17329 17328 7ff6385e3cec 17330 7ff6385e6a50 FreeLibrary 17328->17330 17331 7ff6385e3d7a 17329->17331 17332 7ff6385e3d57 PostMessageW GetMessageW 17329->17332 17330->17337 17520 7ff6385e8290 17331->17520 17332->17331 17337->17264 17340 7ff6385fa918 17339->17340 17341 7ff6385fa8f7 17339->17341 17342 7ff6385fb188 45 API calls 17340->17342 17341->17235 17343 7ff6385fa91d 17342->17343 17345 7ff6385eca59 17344->17345 17345->17243 17347 7ff6385ec731 17346->17347 17348 7ff6385ec4f0 17347->17348 17349 7ff6385ed1c0 7 API calls 17347->17349 17348->17233 17349->17348 17351 7ff6385ec8e2 _wfindfirst32i64 memcpy_s 17350->17351 17352 7ff6385ec901 RtlCaptureContext RtlLookupFunctionEntry 17351->17352 17353 7ff6385ec92a RtlVirtualUnwind 17352->17353 17354 7ff6385ec966 memcpy_s 17352->17354 17353->17354 17355 7ff6385ec998 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17354->17355 17356 7ff6385ec9e6 _wfindfirst32i64 17355->17356 17356->17231 17358 7ff6385ed1d2 17357->17358 17359 7ff6385ed1c8 17357->17359 17358->17249 17363 7ff6385ed564 17359->17363 17364 7ff6385ed573 17363->17364 17365 7ff6385ed1cd 17363->17365 17371 7ff6385ee560 17364->17371 17367 7ff6385ed5d0 17365->17367 17368 7ff6385ed5fb 17367->17368 17369 7ff6385ed5de DeleteCriticalSection 17368->17369 17370 7ff6385ed5ff 17368->17370 17369->17368 17370->17358 17375 7ff6385ee3c8 17371->17375 17376 7ff6385ee40c __vcrt_FlsAlloc 17375->17376 17377 7ff6385ee4b2 TlsFree 17375->17377 17376->17377 17378 7ff6385ee43a LoadLibraryExW 17376->17378 17379 7ff6385ee4f9 GetProcAddress 17376->17379 17383 7ff6385ee47d LoadLibraryExW 17376->17383 17380 7ff6385ee45b GetLastError 17378->17380 17381 7ff6385ee4d9 17378->17381 17379->17377 17380->17376 17381->17379 17382 7ff6385ee4f0 FreeLibrary 17381->17382 17382->17379 17383->17376 17383->17381 17385 7ff63860b570 17384->17385 17385->17254 17385->17385 17387 7ff6385e89cf 17386->17387 17388 7ff6385e89d7 __std_exception_destroy 17387->17388 17389 7ff6385e8a20 WideCharToMultiByte 17387->17389 17390 7ff6385e8a74 WideCharToMultiByte 17387->17390 17391 7ff6385e8ac6 17387->17391 17388->17258 17389->17387 17389->17391 17390->17387 17390->17391 17682 7ff6385e29c0 17391->17682 17396 7ff638600840 17393->17396 17394 7ff638600893 17395 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17394->17395 17399 7ff6386008bc 17395->17399 17396->17394 17397 7ff6386008e6 17396->17397 18013 7ff638600718 17397->18013 17399->17260 17401 7ff6385e1eb5 17400->17401 17403 7ff6385e1ed0 17401->17403 18021 7ff6385e2870 17401->18021 17403->17337 17404 7ff6385e3f00 17403->17404 17405 7ff6385ebfb0 17404->17405 17406 7ff6385e3f0c GetModuleFileNameW 17405->17406 17407 7ff6385e3f55 17406->17407 17408 7ff6385e3f3e 17406->17408 18061 7ff6385e8ef0 17407->18061 17409 7ff6385e29c0 57 API calls 17408->17409 17418 7ff6385e3f51 17409->17418 17412 7ff6385e3f80 18072 7ff6385e40e0 17412->18072 17413 7ff6385e3f70 17415 7ff6385e2b10 59 API calls 17413->17415 17414 7ff6385ec010 _wfindfirst32i64 8 API calls 17417 7ff6385e3fd9 17414->17417 17415->17418 17417->17266 17418->17414 17420 7ff6385e1ee0 49 API calls 17421 7ff6385e3fa5 17420->17421 17421->17418 17422 7ff6385e3fac 17421->17422 18080 7ff6385e4340 17422->18080 17426 7ff6385e7d7a 17425->17426 17427 7ff6385e8de0 57 API calls 17426->17427 17428 7ff6385e7d9c GetEnvironmentVariableW 17427->17428 17429 7ff6385e7db4 ExpandEnvironmentStringsW 17428->17429 17430 7ff6385e7e06 17428->17430 17432 7ff6385e8ef0 59 API calls 17429->17432 17431 7ff6385ec010 _wfindfirst32i64 8 API calls 17430->17431 17433 7ff6385e7e18 17431->17433 17434 7ff6385e7ddc 17432->17434 17433->17268 17434->17430 17435 7ff6385e7de6 17434->17435 18095 7ff6385fb1bc 17435->18095 17438 7ff6385ec010 _wfindfirst32i64 8 API calls 17439 7ff6385e7dfe 17438->17439 17439->17268 17441 7ff6385e8de0 57 API calls 17440->17441 17442 7ff6385e8267 SetEnvironmentVariableW 17441->17442 17443 7ff6385e827f __std_exception_destroy 17442->17443 17443->17272 17445 7ff6385e1cae 17444->17445 17446 7ff6385e1ee0 49 API calls 17445->17446 17447 7ff6385e1ce4 17446->17447 17448 7ff6385e1ee0 49 API calls 17447->17448 17462 7ff6385e1dce 17447->17462 17449 7ff6385e1d0a 17448->17449 17449->17462 18102 7ff6385e1a90 17449->18102 17450 7ff6385ec010 _wfindfirst32i64 8 API calls 17451 7ff6385e1e5c 17450->17451 17451->17276 17451->17278 17455 7ff6385e1dbc 17456 7ff6385e3e80 49 API calls 17455->17456 17456->17462 17457 7ff6385e1d7f 17457->17455 17458 7ff6385e1e24 17457->17458 17459 7ff6385e3e80 49 API calls 17458->17459 17460 7ff6385e1e31 17459->17460 18138 7ff6385e4140 17460->18138 17462->17450 17464 7ff6385e8b95 17463->17464 18180 7ff6385e8860 GetCurrentProcess OpenProcessToken 17464->18180 17467 7ff6385e8860 7 API calls 17468 7ff6385e8bc1 17467->17468 17469 7ff6385e8bf4 17468->17469 17470 7ff6385e8bda 17468->17470 17472 7ff6385e8950 48 API calls 17469->17472 18190 7ff6385e8950 17470->18190 17474 7ff6385e8c07 LocalFree LocalFree 17472->17474 17475 7ff6385e8c23 17474->17475 17477 7ff6385e8c2f 17474->17477 18194 7ff6385e2c30 17475->18194 17478 7ff6385ec010 _wfindfirst32i64 8 API calls 17477->17478 17479 7ff6385e3b4e 17478->17479 17479->17291 17480 7ff6385e14e0 17479->17480 17481 7ff6385e14f6 17480->17481 17482 7ff6385e156f 17480->17482 18398 7ff6385e7b60 17481->18398 17482->17277 17488 7ff6385e8e01 MultiByteToWideChar 17487->17488 17489 7ff6385e8e87 MultiByteToWideChar 17487->17489 17490 7ff6385e8e27 17488->17490 17496 7ff6385e8e4c 17488->17496 17491 7ff6385e8ecf 17489->17491 17492 7ff6385e8eaa 17489->17492 17493 7ff6385e29c0 55 API calls 17490->17493 17491->17287 17494 7ff6385e29c0 55 API calls 17492->17494 17495 7ff6385e8e3a 17493->17495 17497 7ff6385e8ebd 17494->17497 17495->17287 17496->17489 17498 7ff6385e8e62 17496->17498 17497->17287 17499 7ff6385e29c0 55 API calls 17498->17499 17500 7ff6385e8e75 17499->17500 17500->17287 17502 7ff6385e7005 17501->17502 17503 7ff6385e3be0 17502->17503 17504 7ff6385e2870 59 API calls 17502->17504 17503->17326 17599 7ff6385e6ca0 17503->17599 17504->17503 17509 7ff6385e3513 17505->17509 17511 7ff6385e3554 17505->17511 17506 7ff6385ec010 _wfindfirst32i64 8 API calls 17507 7ff6385e35a5 17506->17507 17507->17337 17512 7ff6385e8b50 LocalFree 17507->17512 17509->17511 18716 7ff6385e1700 17509->18716 18758 7ff6385e2d50 17509->18758 17511->17506 17512->17320 17514 7ff6385e8de0 57 API calls 17513->17514 17515 7ff6385e81ff 17514->17515 17516 7ff6385e8de0 57 API calls 17515->17516 17517 7ff6385e820f 17516->17517 17518 7ff6385f8610 38 API calls 17517->17518 17519 7ff6385e821d __std_exception_destroy 17518->17519 17519->17324 17521 7ff6385e82a0 17520->17521 17564 7ff6385e2b30 17563->17564 17565 7ff6385f52b4 49 API calls 17564->17565 17566 7ff6385e2b7b memcpy_s 17565->17566 17567 7ff6385e8de0 57 API calls 17566->17567 17568 7ff6385e2bb0 17567->17568 17569 7ff6385e2bb5 17568->17569 17570 7ff6385e2bed MessageBoxA 17568->17570 17571 7ff6385e8de0 57 API calls 17569->17571 17572 7ff6385e2c07 17570->17572 17573 7ff6385e2bcf MessageBoxW 17571->17573 17574 7ff6385ec010 _wfindfirst32i64 8 API calls 17572->17574 17573->17572 17575 7ff6385e2c17 17574->17575 17575->17337 17577 7ff6385e406c 17576->17577 17578 7ff6385e8de0 57 API calls 17577->17578 17579 7ff6385e4097 17578->17579 17580 7ff6385e8de0 57 API calls 17579->17580 17581 7ff6385e40aa 17580->17581 19235 7ff6385f69e4 17581->19235 17584 7ff6385ec010 _wfindfirst32i64 8 API calls 17585 7ff6385e3acd 17584->17585 17585->17296 17586 7ff6385e84c0 17585->17586 17587 7ff6385e84e4 17586->17587 17588 7ff6385f1004 73 API calls 17587->17588 17593 7ff6385e85bb __std_exception_destroy 17587->17593 17589 7ff6385e84fe 17588->17589 17589->17593 19614 7ff6385f9894 17589->19614 17593->17301 17596 7ff6385f09ac 17595->17596 19629 7ff6385f0758 17596->19629 17600 7ff6385e6cc3 17599->17600 17601 7ff6385e6cda 17599->17601 17600->17601 19640 7ff6385e1590 17600->19640 17601->17300 17603 7ff6385e6ce4 17603->17601 17604 7ff6385e4140 49 API calls 17603->17604 17605 7ff6385e6d45 17604->17605 17606 7ff6385e2b10 59 API calls 17605->17606 17607 7ff6385e6db5 __std_exception_destroy memcpy_s 17605->17607 17606->17601 17607->17300 17611 7ff6385e681a memcpy_s 17608->17611 17609 7ff6385e693f 17612 7ff6385e4140 49 API calls 17609->17612 17611->17609 17613 7ff6385e695b 17611->17613 17616 7ff6385e4140 49 API calls 17611->17616 17617 7ff6385e6920 17611->17617 17625 7ff6385e1700 135 API calls 17611->17625 17626 7ff6385e6941 17611->17626 19664 7ff6385e1940 17611->19664 17615 7ff6385e69b8 17612->17615 17614 7ff6385e2b10 59 API calls 17613->17614 17621 7ff6385e6951 __std_exception_destroy 17614->17621 17618 7ff6385e4140 49 API calls 17615->17618 17616->17611 17617->17609 17619 7ff6385e4140 49 API calls 17617->17619 17620 7ff6385e69e8 17618->17620 17619->17609 17624 7ff6385e4140 49 API calls 17620->17624 17622 7ff6385ec010 _wfindfirst32i64 8 API calls 17621->17622 17623 7ff6385e3c06 17622->17623 17623->17311 17628 7ff6385e6780 17623->17628 17624->17621 17625->17611 17627 7ff6385e2b10 59 API calls 17626->17627 17627->17621 19668 7ff6385e8470 17628->19668 17630 7ff6385e679c 17631 7ff6385e8470 58 API calls 17630->17631 17632 7ff6385e67af 17631->17632 17633 7ff6385e67e5 17632->17633 17635 7ff6385e67c7 17632->17635 17634 7ff6385e2b10 59 API calls 17633->17634 17636 7ff6385e3c14 17634->17636 19672 7ff6385e7100 GetProcAddress 17635->19672 17636->17311 17645 7ff6385e1f05 17644->17645 17646 7ff6385f52b4 49 API calls 17645->17646 17647 7ff6385e1f28 17646->17647 17647->17318 19731 7ff6385e5dd0 17648->19731 17651 7ff6385e348d 17651->17328 17701 7ff6385ebfb0 17682->17701 17685 7ff6385e2a09 17703 7ff6385f52b4 17685->17703 17690 7ff6385e1ee0 49 API calls 17691 7ff6385e2a66 memcpy_s 17690->17691 17692 7ff6385e8de0 54 API calls 17691->17692 17693 7ff6385e2a9b 17692->17693 17694 7ff6385e2aa0 17693->17694 17695 7ff6385e2ad8 MessageBoxA 17693->17695 17696 7ff6385e8de0 54 API calls 17694->17696 17697 7ff6385e2af2 17695->17697 17698 7ff6385e2aba MessageBoxW 17696->17698 17699 7ff6385ec010 _wfindfirst32i64 8 API calls 17697->17699 17698->17697 17700 7ff6385e2b02 17699->17700 17700->17388 17702 7ff6385e29dc GetLastError 17701->17702 17702->17685 17706 7ff6385f530e 17703->17706 17704 7ff6385f5333 17707 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17704->17707 17705 7ff6385f536f 17733 7ff6385f3540 17705->17733 17706->17704 17706->17705 17709 7ff6385f535d 17707->17709 17710 7ff6385ec010 _wfindfirst32i64 8 API calls 17709->17710 17714 7ff6385e2a37 17710->17714 17711 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17711->17709 17713 7ff6385f5418 17715 7ff6385f544c 17713->17715 17717 7ff6385f5421 17713->17717 17721 7ff6385e8770 17714->17721 17715->17711 17716 7ff6385f5470 17716->17715 17718 7ff6385f547a 17716->17718 17719 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17717->17719 17720 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17718->17720 17719->17709 17720->17709 17722 7ff6385e877c 17721->17722 17723 7ff6385e879d FormatMessageW 17722->17723 17724 7ff6385e8797 GetLastError 17722->17724 17725 7ff6385e87d0 17723->17725 17726 7ff6385e87ec WideCharToMultiByte 17723->17726 17724->17723 17727 7ff6385e29c0 54 API calls 17725->17727 17728 7ff6385e8826 17726->17728 17729 7ff6385e87e3 17726->17729 17727->17729 17730 7ff6385e29c0 54 API calls 17728->17730 17731 7ff6385ec010 _wfindfirst32i64 8 API calls 17729->17731 17730->17729 17732 7ff6385e2a3e 17731->17732 17732->17690 17734 7ff6385f357e 17733->17734 17735 7ff6385f356e 17733->17735 17736 7ff6385f35b5 17734->17736 17737 7ff6385f3587 17734->17737 17738 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17735->17738 17736->17735 17740 7ff6385f35ad 17736->17740 17743 7ff6385f3864 17736->17743 17747 7ff6385f3ed0 17736->17747 17773 7ff6385f3b98 17736->17773 17803 7ff6385f3420 17736->17803 17806 7ff6385f50f0 17736->17806 17739 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17737->17739 17738->17740 17739->17740 17740->17713 17740->17715 17740->17716 17740->17717 17744 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17743->17744 17744->17735 17748 7ff6385f3f85 17747->17748 17749 7ff6385f3f12 17747->17749 17752 7ff6385f3fdf 17748->17752 17753 7ff6385f3f8a 17748->17753 17750 7ff6385f3faf 17749->17750 17751 7ff6385f3f18 17749->17751 17830 7ff6385f2480 17750->17830 17760 7ff6385f3f1d 17751->17760 17764 7ff6385f3fee 17751->17764 17752->17750 17752->17764 17771 7ff6385f3f48 17752->17771 17754 7ff6385f3fbf 17753->17754 17755 7ff6385f3f8c 17753->17755 17837 7ff6385f2070 17754->17837 17757 7ff6385f3f2d 17755->17757 17763 7ff6385f3f9b 17755->17763 17772 7ff6385f401d 17757->17772 17812 7ff6385f4834 17757->17812 17760->17757 17761 7ff6385f3f60 17760->17761 17760->17771 17761->17772 17822 7ff6385f4cf0 17761->17822 17763->17750 17766 7ff6385f3fa0 17763->17766 17764->17772 17844 7ff6385f2890 17764->17844 17766->17772 17826 7ff6385f4e88 17766->17826 17767 7ff6385ec010 _wfindfirst32i64 8 API calls 17768 7ff6385f42b3 17767->17768 17768->17736 17771->17772 17851 7ff6385ff608 17771->17851 17772->17767 17774 7ff6385f3bb9 17773->17774 17775 7ff6385f3ba3 17773->17775 17776 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17774->17776 17791 7ff6385f3bf7 17774->17791 17777 7ff6385f3f85 17775->17777 17778 7ff6385f3f12 17775->17778 17775->17791 17776->17791 17781 7ff6385f3fdf 17777->17781 17782 7ff6385f3f8a 17777->17782 17779 7ff6385f3faf 17778->17779 17780 7ff6385f3f18 17778->17780 17785 7ff6385f2480 38 API calls 17779->17785 17789 7ff6385f3f1d 17780->17789 17792 7ff6385f3fee 17780->17792 17781->17779 17781->17792 17801 7ff6385f3f48 17781->17801 17783 7ff6385f3fbf 17782->17783 17784 7ff6385f3f8c 17782->17784 17787 7ff6385f2070 38 API calls 17783->17787 17786 7ff6385f3f2d 17784->17786 17794 7ff6385f3f9b 17784->17794 17785->17801 17788 7ff6385f4834 47 API calls 17786->17788 17802 7ff6385f401d 17786->17802 17787->17801 17788->17801 17789->17786 17790 7ff6385f3f60 17789->17790 17789->17801 17795 7ff6385f4cf0 47 API calls 17790->17795 17790->17802 17791->17736 17793 7ff6385f2890 38 API calls 17792->17793 17792->17802 17793->17801 17794->17779 17796 7ff6385f3fa0 17794->17796 17795->17801 17799 7ff6385f4e88 37 API calls 17796->17799 17796->17802 17797 7ff6385ec010 _wfindfirst32i64 8 API calls 17798 7ff6385f42b3 17797->17798 17798->17736 17799->17801 17800 7ff6385ff608 47 API calls 17800->17801 17801->17800 17801->17802 17802->17797 17988 7ff6385f1644 17803->17988 17807 7ff6385f5107 17806->17807 18005 7ff6385fe768 17807->18005 17813 7ff6385f4856 17812->17813 17861 7ff6385f14b0 17813->17861 17818 7ff6385f50f0 45 API calls 17820 7ff6385f4993 17818->17820 17819 7ff6385f50f0 45 API calls 17821 7ff6385f4a1c 17819->17821 17820->17819 17820->17820 17820->17821 17821->17771 17823 7ff6385f4d70 17822->17823 17824 7ff6385f4d08 17822->17824 17823->17771 17824->17823 17825 7ff6385ff608 47 API calls 17824->17825 17825->17823 17828 7ff6385f4ea9 17826->17828 17827 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17829 7ff6385f4eda 17827->17829 17828->17827 17828->17829 17829->17771 17831 7ff6385f24b3 17830->17831 17832 7ff6385f24e2 17831->17832 17834 7ff6385f259f 17831->17834 17833 7ff6385f14b0 12 API calls 17832->17833 17836 7ff6385f251f 17832->17836 17833->17836 17835 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17834->17835 17835->17836 17836->17771 17838 7ff6385f20a3 17837->17838 17839 7ff6385f20d2 17838->17839 17841 7ff6385f218f 17838->17841 17840 7ff6385f14b0 12 API calls 17839->17840 17843 7ff6385f210f 17839->17843 17840->17843 17842 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17841->17842 17842->17843 17843->17771 17845 7ff6385f28c3 17844->17845 17846 7ff6385f28f2 17845->17846 17848 7ff6385f29af 17845->17848 17847 7ff6385f14b0 12 API calls 17846->17847 17850 7ff6385f292f 17846->17850 17847->17850 17849 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17848->17849 17849->17850 17850->17771 17852 7ff6385ff630 17851->17852 17853 7ff6385ff675 17852->17853 17854 7ff6385f50f0 45 API calls 17852->17854 17856 7ff6385ff635 memcpy_s 17852->17856 17860 7ff6385ff65e memcpy_s 17852->17860 17853->17856 17857 7ff638601640 WideCharToMultiByte 17853->17857 17853->17860 17854->17853 17855 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17855->17856 17856->17771 17858 7ff6385ff751 17857->17858 17858->17856 17859 7ff6385ff766 GetLastError 17858->17859 17859->17856 17859->17860 17860->17855 17860->17856 17862 7ff6385f14e7 17861->17862 17863 7ff6385f14d6 17861->17863 17862->17863 17864 7ff6385fe3ac _fread_nolock 12 API calls 17862->17864 17869 7ff6385ff320 17863->17869 17865 7ff6385f1514 17864->17865 17866 7ff6385f1528 17865->17866 17867 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17865->17867 17868 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17866->17868 17867->17866 17868->17863 17870 7ff6385ff370 17869->17870 17871 7ff6385ff33d 17869->17871 17870->17871 17873 7ff6385ff3a2 17870->17873 17872 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17871->17872 17882 7ff6385f4971 17872->17882 17879 7ff6385ff4b5 17873->17879 17886 7ff6385ff3ea 17873->17886 17874 7ff6385ff5a7 17915 7ff6385fe80c 17874->17915 17876 7ff6385ff56d 17908 7ff6385feba4 17876->17908 17878 7ff6385ff53c 17901 7ff6385fee84 17878->17901 17879->17874 17879->17876 17879->17878 17880 7ff6385ff4ff 17879->17880 17883 7ff6385ff4f5 17879->17883 17891 7ff6385ff0b4 17880->17891 17882->17818 17882->17820 17883->17876 17885 7ff6385ff4fa 17883->17885 17885->17878 17885->17880 17886->17882 17887 7ff6385fb25c __std_exception_copy 37 API calls 17886->17887 17888 7ff6385ff4a2 17887->17888 17888->17882 17889 7ff6385fb6b8 _wfindfirst32i64 17 API calls 17888->17889 17890 7ff6385ff604 17889->17890 17924 7ff638604efc 17891->17924 17895 7ff6385ff15c 17896 7ff6385ff160 17895->17896 17897 7ff6385ff1b1 17895->17897 17899 7ff6385ff17c 17895->17899 17896->17882 17977 7ff6385feca0 17897->17977 17973 7ff6385fef5c 17899->17973 17902 7ff638604efc 38 API calls 17901->17902 17903 7ff6385feece 17902->17903 17904 7ff638604944 37 API calls 17903->17904 17905 7ff6385fef1e 17904->17905 17906 7ff6385fef22 17905->17906 17907 7ff6385fef5c 45 API calls 17905->17907 17906->17882 17907->17906 17909 7ff638604efc 38 API calls 17908->17909 17910 7ff6385febef 17909->17910 17911 7ff638604944 37 API calls 17910->17911 17912 7ff6385fec47 17911->17912 17913 7ff6385fec4b 17912->17913 17914 7ff6385feca0 45 API calls 17912->17914 17913->17882 17914->17913 17916 7ff6385fe884 17915->17916 17917 7ff6385fe851 17915->17917 17919 7ff6385fe89c 17916->17919 17921 7ff6385fe91d 17916->17921 17918 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17917->17918 17923 7ff6385fe87d memcpy_s 17918->17923 17920 7ff6385feba4 46 API calls 17919->17920 17920->17923 17922 7ff6385f50f0 45 API calls 17921->17922 17921->17923 17922->17923 17923->17882 17925 7ff638604f4f fegetenv 17924->17925 17926 7ff638608e5c 37 API calls 17925->17926 17929 7ff638604fa2 17926->17929 17927 7ff638604fcf 17932 7ff6385fb25c __std_exception_copy 37 API calls 17927->17932 17928 7ff638605092 17930 7ff638608e5c 37 API calls 17928->17930 17929->17928 17933 7ff63860506c 17929->17933 17934 7ff638604fbd 17929->17934 17931 7ff6386050bc 17930->17931 17935 7ff638608e5c 37 API calls 17931->17935 17936 7ff63860504d 17932->17936 17939 7ff6385fb25c __std_exception_copy 37 API calls 17933->17939 17934->17927 17934->17928 17937 7ff6386050cd 17935->17937 17938 7ff638606174 17936->17938 17943 7ff638605055 17936->17943 17940 7ff638609050 20 API calls 17937->17940 17941 7ff6385fb6b8 _wfindfirst32i64 17 API calls 17938->17941 17939->17936 17951 7ff638605136 memcpy_s 17940->17951 17942 7ff638606189 17941->17942 17944 7ff6385ec010 _wfindfirst32i64 8 API calls 17943->17944 17945 7ff6385ff101 17944->17945 17969 7ff638604944 17945->17969 17946 7ff6386054df memcpy_s 17947 7ff63860581f 17948 7ff638604a60 37 API calls 17947->17948 17955 7ff638605f37 17948->17955 17949 7ff6386057cb 17949->17947 17952 7ff63860618c memcpy_s 37 API calls 17949->17952 17950 7ff638605177 memcpy_s 17963 7ff6386055d3 memcpy_s 17950->17963 17967 7ff638605abb memcpy_s 17950->17967 17951->17946 17951->17950 17953 7ff6385f5cb4 _get_daylight 11 API calls 17951->17953 17952->17947 17954 7ff6386055b0 17953->17954 17956 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 17954->17956 17958 7ff63860618c memcpy_s 37 API calls 17955->17958 17961 7ff638605f92 17955->17961 17956->17950 17957 7ff638606118 17959 7ff638608e5c 37 API calls 17957->17959 17958->17961 17959->17943 17960 7ff6385f5cb4 11 API calls _get_daylight 17960->17963 17961->17957 17964 7ff638604a60 37 API calls 17961->17964 17968 7ff63860618c memcpy_s 37 API calls 17961->17968 17962 7ff6385f5cb4 11 API calls _get_daylight 17962->17967 17963->17949 17963->17960 17966 7ff6385fb698 37 API calls _invalid_parameter_noinfo 17963->17966 17964->17961 17965 7ff6385fb698 37 API calls _invalid_parameter_noinfo 17965->17967 17966->17963 17967->17947 17967->17949 17967->17962 17967->17965 17968->17961 17970 7ff638604963 17969->17970 17971 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17970->17971 17972 7ff63860498e memcpy_s 17970->17972 17971->17972 17972->17895 17974 7ff6385fef88 memcpy_s 17973->17974 17975 7ff6385f50f0 45 API calls 17974->17975 17976 7ff6385ff042 memcpy_s 17974->17976 17975->17976 17976->17896 17978 7ff6385fecdb 17977->17978 17982 7ff6385fed28 memcpy_s 17977->17982 17979 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17978->17979 17980 7ff6385fed07 17979->17980 17980->17896 17981 7ff6385fed93 17983 7ff6385fb25c __std_exception_copy 37 API calls 17981->17983 17982->17981 17984 7ff6385f50f0 45 API calls 17982->17984 17987 7ff6385fedd5 memcpy_s 17983->17987 17984->17981 17985 7ff6385fb6b8 _wfindfirst32i64 17 API calls 17986 7ff6385fee80 17985->17986 17987->17985 17989 7ff6385f1683 17988->17989 17990 7ff6385f1671 17988->17990 17993 7ff6385f1690 17989->17993 17996 7ff6385f16cd 17989->17996 17991 7ff6385f5cb4 _get_daylight 11 API calls 17990->17991 17992 7ff6385f1676 17991->17992 17994 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 17992->17994 17995 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 17993->17995 18000 7ff6385f1681 17994->18000 17995->18000 17997 7ff6385f1776 17996->17997 17998 7ff6385f5cb4 _get_daylight 11 API calls 17996->17998 17999 7ff6385f5cb4 _get_daylight 11 API calls 17997->17999 17997->18000 18001 7ff6385f176b 17998->18001 18002 7ff6385f1820 17999->18002 18000->17736 18003 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18001->18003 18004 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18002->18004 18003->17997 18004->18000 18006 7ff6385fe781 18005->18006 18007 7ff6385f512f 18005->18007 18006->18007 18008 7ff638604154 45 API calls 18006->18008 18009 7ff6385fe7d4 18007->18009 18008->18007 18010 7ff6385f513f 18009->18010 18011 7ff6385fe7ed 18009->18011 18010->17736 18011->18010 18012 7ff6386034a0 45 API calls 18011->18012 18012->18010 18020 7ff6385f5b5c EnterCriticalSection 18013->18020 18022 7ff6385e288c 18021->18022 18023 7ff6385f52b4 49 API calls 18022->18023 18024 7ff6385e28dd 18023->18024 18025 7ff6385f5cb4 _get_daylight 11 API calls 18024->18025 18026 7ff6385e28e2 18025->18026 18040 7ff6385f5cd4 18026->18040 18029 7ff6385e1ee0 49 API calls 18030 7ff6385e2911 memcpy_s 18029->18030 18031 7ff6385e8de0 57 API calls 18030->18031 18032 7ff6385e2946 18031->18032 18033 7ff6385e2983 MessageBoxA 18032->18033 18034 7ff6385e294b 18032->18034 18036 7ff6385e299d 18033->18036 18035 7ff6385e8de0 57 API calls 18034->18035 18037 7ff6385e2965 MessageBoxW 18035->18037 18038 7ff6385ec010 _wfindfirst32i64 8 API calls 18036->18038 18037->18036 18039 7ff6385e29ad 18038->18039 18039->17403 18041 7ff6385fc078 _get_daylight 11 API calls 18040->18041 18042 7ff6385f5ceb 18041->18042 18043 7ff6385e28e9 18042->18043 18044 7ff6385ff948 _get_daylight 11 API calls 18042->18044 18047 7ff6385f5d2b 18042->18047 18043->18029 18045 7ff6385f5d20 18044->18045 18046 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18045->18046 18046->18047 18047->18043 18052 7ff638600018 18047->18052 18050 7ff6385fb6b8 _wfindfirst32i64 17 API calls 18051 7ff6385f5d70 18050->18051 18057 7ff638600035 18052->18057 18053 7ff63860003a 18054 7ff6385f5d51 18053->18054 18055 7ff6385f5cb4 _get_daylight 11 API calls 18053->18055 18054->18043 18054->18050 18056 7ff638600044 18055->18056 18058 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18056->18058 18057->18053 18057->18054 18059 7ff638600084 18057->18059 18058->18054 18059->18054 18060 7ff6385f5cb4 _get_daylight 11 API calls 18059->18060 18060->18056 18062 7ff6385e8f14 WideCharToMultiByte 18061->18062 18063 7ff6385e8f82 WideCharToMultiByte 18061->18063 18065 7ff6385e8f55 18062->18065 18066 7ff6385e8f3e 18062->18066 18064 7ff6385e8faf 18063->18064 18071 7ff6385e3f6b 18063->18071 18067 7ff6385e29c0 57 API calls 18064->18067 18065->18063 18069 7ff6385e8f6b 18065->18069 18068 7ff6385e29c0 57 API calls 18066->18068 18067->18071 18068->18071 18070 7ff6385e29c0 57 API calls 18069->18070 18070->18071 18071->17412 18071->17413 18073 7ff6385e40ea 18072->18073 18074 7ff6385e8de0 57 API calls 18073->18074 18075 7ff6385e4112 18074->18075 18090 7ff6385e8d00 FindFirstFileExW 18075->18090 18078 7ff6385ec010 _wfindfirst32i64 8 API calls 18079 7ff6385e3f88 18078->18079 18079->17418 18079->17420 18081 7ff6385e4352 18080->18081 18082 7ff6385e8de0 57 API calls 18081->18082 18083 7ff6385e4380 CreateFileW 18082->18083 18084 7ff6385e43b7 GetFinalPathNameByHandleW CloseHandle 18083->18084 18089 7ff6385e441f 18083->18089 18088 7ff6385e43e3 __vcrt_FlsAlloc 18084->18088 18084->18089 18085 7ff6385ec010 _wfindfirst32i64 8 API calls 18087 7ff6385e3fb9 18085->18087 18086 7ff6385e8ef0 59 API calls 18086->18089 18087->17418 18088->18086 18089->18085 18091 7ff6385e8d50 18090->18091 18092 7ff6385e8d3d FindClose 18090->18092 18093 7ff6385ec010 _wfindfirst32i64 8 API calls 18091->18093 18092->18091 18094 7ff6385e411c 18093->18094 18094->18078 18096 7ff6385fb1d3 18095->18096 18099 7ff6385e7dee 18095->18099 18097 7ff6385fb25c __std_exception_copy 37 API calls 18096->18097 18096->18099 18098 7ff6385fb200 18097->18098 18098->18099 18100 7ff6385fb6b8 _wfindfirst32i64 17 API calls 18098->18100 18099->17438 18101 7ff6385fb230 18100->18101 18103 7ff6385e4060 116 API calls 18102->18103 18104 7ff6385e1ac6 18103->18104 18105 7ff6385e1c74 18104->18105 18106 7ff6385e84c0 83 API calls 18104->18106 18107 7ff6385ec010 _wfindfirst32i64 8 API calls 18105->18107 18109 7ff6385e1afe 18106->18109 18108 7ff6385e1c88 18107->18108 18108->17462 18135 7ff6385e3e80 18108->18135 18134 7ff6385e1b2f 18109->18134 18141 7ff6385f1004 18109->18141 18111 7ff6385f097c 74 API calls 18111->18105 18112 7ff6385e1b18 18113 7ff6385e1b34 18112->18113 18114 7ff6385e1b1c 18112->18114 18145 7ff6385f0ccc 18113->18145 18115 7ff6385e2870 59 API calls 18114->18115 18115->18134 18118 7ff6385e1b4f 18120 7ff6385e2870 59 API calls 18118->18120 18119 7ff6385e1b67 18121 7ff6385f1004 73 API calls 18119->18121 18120->18134 18122 7ff6385e1bb4 18121->18122 18123 7ff6385e1bde 18122->18123 18124 7ff6385e1bc6 18122->18124 18126 7ff6385f0ccc _fread_nolock 53 API calls 18123->18126 18125 7ff6385e2870 59 API calls 18124->18125 18125->18134 18127 7ff6385e1bf3 18126->18127 18128 7ff6385e1c0e 18127->18128 18129 7ff6385e1bf9 18127->18129 18148 7ff6385f0a40 18128->18148 18131 7ff6385e2870 59 API calls 18129->18131 18131->18134 18133 7ff6385e2b10 59 API calls 18133->18134 18134->18111 18136 7ff6385e1ee0 49 API calls 18135->18136 18137 7ff6385e3e9d 18136->18137 18137->17457 18139 7ff6385e1ee0 49 API calls 18138->18139 18140 7ff6385e4170 18139->18140 18140->17462 18142 7ff6385f1034 18141->18142 18154 7ff6385f0d94 18142->18154 18144 7ff6385f104d 18144->18112 18166 7ff6385f0cec 18145->18166 18149 7ff6385e1c22 18148->18149 18150 7ff6385f0a49 18148->18150 18149->18133 18149->18134 18151 7ff6385f5cb4 _get_daylight 11 API calls 18150->18151 18152 7ff6385f0a4e 18151->18152 18155 7ff6385f0dfe 18154->18155 18156 7ff6385f0dbe 18154->18156 18155->18156 18157 7ff6385f0e0a 18155->18157 18158 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18156->18158 18165 7ff6385f5b5c EnterCriticalSection 18157->18165 18160 7ff6385f0de5 18158->18160 18160->18144 18167 7ff6385f0d16 18166->18167 18178 7ff6385e1b49 18166->18178 18168 7ff6385f0d62 18167->18168 18170 7ff6385f0d25 memcpy_s 18167->18170 18167->18178 18179 7ff6385f5b5c EnterCriticalSection 18168->18179 18172 7ff6385f5cb4 _get_daylight 11 API calls 18170->18172 18174 7ff6385f0d3a 18172->18174 18176 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18174->18176 18176->18178 18178->18118 18178->18119 18181 7ff6385e8921 __std_exception_destroy 18180->18181 18182 7ff6385e889f GetTokenInformation 18180->18182 18185 7ff6385e8934 CloseHandle 18181->18185 18186 7ff6385e893a 18181->18186 18183 7ff6385e88c0 GetLastError 18182->18183 18184 7ff6385e88cb 18182->18184 18183->18181 18183->18184 18184->18181 18187 7ff6385e88e7 GetTokenInformation 18184->18187 18185->18186 18186->17467 18187->18181 18188 7ff6385e890a 18187->18188 18188->18181 18189 7ff6385e8914 ConvertSidToStringSidW 18188->18189 18189->18181 18191 7ff6385e8975 18190->18191 18207 7ff6385f5508 18191->18207 18195 7ff6385e2c50 18194->18195 18196 7ff6385f52b4 49 API calls 18195->18196 18197 7ff6385e2c9b memcpy_s 18196->18197 18198 7ff6385e8de0 57 API calls 18197->18198 18199 7ff6385e2cd0 18198->18199 18200 7ff6385e2cd5 18199->18200 18201 7ff6385e2d0d MessageBoxA 18199->18201 18202 7ff6385e8de0 57 API calls 18200->18202 18203 7ff6385e2d27 18201->18203 18204 7ff6385e2cef MessageBoxW 18202->18204 18205 7ff6385ec010 _wfindfirst32i64 8 API calls 18203->18205 18204->18203 18206 7ff6385e2d37 18205->18206 18206->17477 18208 7ff6385f5562 18207->18208 18209 7ff6385f5587 18208->18209 18211 7ff6385f55c3 18208->18211 18210 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18209->18210 18213 7ff6385f55b1 18210->18213 18225 7ff6385f38c0 18211->18225 18215 7ff6385ec010 _wfindfirst32i64 8 API calls 18213->18215 18214 7ff6385f56a4 18216 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18214->18216 18217 7ff6385e8998 18215->18217 18216->18213 18217->17474 18219 7ff6385f56ca 18219->18214 18221 7ff6385f56d4 18219->18221 18220 7ff6385f5679 18222 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18220->18222 18224 7ff6385fb700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18221->18224 18222->18213 18223 7ff6385f5670 18223->18214 18223->18220 18224->18213 18226 7ff6385f38fe 18225->18226 18227 7ff6385f38ee 18225->18227 18228 7ff6385f3935 18226->18228 18229 7ff6385f3907 18226->18229 18230 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18227->18230 18228->18227 18232 7ff6385f392d 18228->18232 18236 7ff6385f42d4 18228->18236 18269 7ff6385f3d20 18228->18269 18306 7ff6385f34b0 18228->18306 18231 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18229->18231 18230->18232 18231->18232 18232->18214 18232->18219 18232->18220 18232->18223 18237 7ff6385f4316 18236->18237 18238 7ff6385f4387 18236->18238 18239 7ff6385f43b1 18237->18239 18240 7ff6385f431c 18237->18240 18241 7ff6385f438c 18238->18241 18245 7ff6385f43e0 18238->18245 18325 7ff6385f2684 18239->18325 18242 7ff6385f4350 18240->18242 18243 7ff6385f4321 18240->18243 18244 7ff6385f438e 18241->18244 18250 7ff6385f43c1 18241->18250 18249 7ff6385f4327 18242->18249 18252 7ff6385f43ef 18242->18252 18247 7ff6385f43f7 18243->18247 18243->18249 18251 7ff6385f4330 18244->18251 18256 7ff6385f439d 18244->18256 18246 7ff6385f43ea 18245->18246 18245->18247 18245->18252 18246->18239 18246->18252 18339 7ff6385f4fdc 18247->18339 18249->18251 18257 7ff6385f4362 18249->18257 18264 7ff6385f434b 18249->18264 18332 7ff6385f2274 18250->18332 18267 7ff6385f4420 18251->18267 18309 7ff6385f4a88 18251->18309 18252->18267 18343 7ff6385f2a94 18252->18343 18256->18239 18259 7ff6385f43a2 18256->18259 18257->18267 18319 7ff6385f4dc4 18257->18319 18262 7ff6385f4e88 37 API calls 18259->18262 18259->18267 18261 7ff6385ec010 _wfindfirst32i64 8 API calls 18263 7ff6385f471a 18261->18263 18262->18264 18263->18228 18265 7ff6385f50f0 45 API calls 18264->18265 18264->18267 18268 7ff6385f460c 18264->18268 18265->18268 18267->18261 18268->18267 18350 7ff6385ff7b8 18268->18350 18270 7ff6385f3d44 18269->18270 18271 7ff6385f3d2e 18269->18271 18272 7ff6385f3d84 18270->18272 18275 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18270->18275 18271->18272 18273 7ff6385f4316 18271->18273 18274 7ff6385f4387 18271->18274 18272->18228 18276 7ff6385f43b1 18273->18276 18277 7ff6385f431c 18273->18277 18278 7ff6385f43e0 18274->18278 18279 7ff6385f438c 18274->18279 18275->18272 18286 7ff6385f2684 38 API calls 18276->18286 18280 7ff6385f4350 18277->18280 18281 7ff6385f4321 18277->18281 18284 7ff6385f43ea 18278->18284 18285 7ff6385f43f7 18278->18285 18288 7ff6385f43ef 18278->18288 18282 7ff6385f43c1 18279->18282 18283 7ff6385f438e 18279->18283 18287 7ff6385f4327 18280->18287 18280->18288 18281->18285 18281->18287 18290 7ff6385f2274 38 API calls 18282->18290 18294 7ff6385f439d 18283->18294 18297 7ff6385f4330 18283->18297 18284->18276 18284->18288 18289 7ff6385f4fdc 45 API calls 18285->18289 18301 7ff6385f434b 18286->18301 18292 7ff6385f4362 18287->18292 18287->18297 18287->18301 18293 7ff6385f2a94 38 API calls 18288->18293 18304 7ff6385f4420 18288->18304 18289->18301 18290->18301 18291 7ff6385f4a88 47 API calls 18291->18301 18295 7ff6385f4dc4 46 API calls 18292->18295 18292->18304 18293->18301 18294->18276 18296 7ff6385f43a2 18294->18296 18295->18301 18299 7ff6385f4e88 37 API calls 18296->18299 18296->18304 18297->18291 18297->18304 18298 7ff6385ec010 _wfindfirst32i64 8 API calls 18300 7ff6385f471a 18298->18300 18299->18301 18300->18228 18302 7ff6385f50f0 45 API calls 18301->18302 18301->18304 18305 7ff6385f460c 18301->18305 18302->18305 18303 7ff6385ff7b8 46 API calls 18303->18305 18304->18298 18305->18303 18305->18304 18381 7ff6385f18f8 18306->18381 18310 7ff6385f4aae 18309->18310 18311 7ff6385f14b0 12 API calls 18310->18311 18312 7ff6385f4afe 18311->18312 18313 7ff6385ff320 46 API calls 18312->18313 18321 7ff6385f4df9 18319->18321 18320 7ff6385f4e3e 18320->18264 18321->18320 18322 7ff6385f4e17 18321->18322 18324 7ff6385f50f0 45 API calls 18321->18324 18323 7ff6385ff7b8 46 API calls 18322->18323 18323->18320 18324->18322 18326 7ff6385f26b7 18325->18326 18327 7ff6385f26e6 18326->18327 18329 7ff6385f27a3 18326->18329 18331 7ff6385f2723 18327->18331 18362 7ff6385f1558 18327->18362 18330 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18329->18330 18330->18331 18331->18264 18333 7ff6385f22a7 18332->18333 18334 7ff6385f22d6 18333->18334 18336 7ff6385f2393 18333->18336 18335 7ff6385f1558 12 API calls 18334->18335 18338 7ff6385f2313 18334->18338 18335->18338 18337 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18336->18337 18337->18338 18338->18264 18340 7ff6385f501f 18339->18340 18341 7ff6385f5023 __crtLCMapStringW 18340->18341 18370 7ff6385f5078 18340->18370 18341->18264 18344 7ff6385f2ac7 18343->18344 18345 7ff6385f2af6 18344->18345 18347 7ff6385f2bb3 18344->18347 18346 7ff6385f1558 12 API calls 18345->18346 18349 7ff6385f2b33 18345->18349 18346->18349 18348 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18347->18348 18348->18349 18349->18264 18351 7ff6385ff7e9 18350->18351 18360 7ff6385ff7f7 18350->18360 18352 7ff6385ff817 18351->18352 18353 7ff6385f50f0 45 API calls 18351->18353 18351->18360 18353->18352 18360->18268 18363 7ff6385f158f 18362->18363 18369 7ff6385f157e 18362->18369 18364 7ff6385fe3ac _fread_nolock 12 API calls 18363->18364 18363->18369 18369->18331 18371 7ff6385f509e 18370->18371 18372 7ff6385f5096 18370->18372 18371->18341 18373 7ff6385f50f0 45 API calls 18372->18373 18373->18371 18382 7ff6385f193f 18381->18382 18383 7ff6385f192d 18381->18383 18384 7ff6385f1989 18382->18384 18387 7ff6385f194d 18382->18387 18385 7ff6385f5cb4 _get_daylight 11 API calls 18383->18385 18390 7ff6385f5cb4 _get_daylight 11 API calls 18384->18390 18397 7ff6385f1d05 18384->18397 18386 7ff6385f1932 18385->18386 18388 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18386->18388 18389 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 18387->18389 18396 7ff6385f193d 18388->18396 18389->18396 18393 7ff6385f1cfa 18390->18393 18391 7ff6385f5cb4 _get_daylight 11 API calls 18392 7ff6385f1f99 18391->18392 18394 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18392->18394 18395 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 18393->18395 18394->18396 18395->18397 18396->18228 18397->18391 18397->18396 18399 7ff6385e7b76 18398->18399 18400 7ff6385e7b9a 18399->18400 18401 7ff6385e7bed GetTempPathW 18399->18401 18403 7ff6385e7d70 61 API calls 18400->18403 18402 7ff6385e7c02 18401->18402 18437 7ff6385e2810 18402->18437 18404 7ff6385e7ba6 18403->18404 18449 7ff6385e7630 18404->18449 18414 7ff6385e7c1b __std_exception_destroy 18415 7ff6385e7cc6 18414->18415 18420 7ff6385e7c51 18414->18420 18441 7ff6385f92c8 18414->18441 18444 7ff6385e8d80 18414->18444 18417 7ff6385e8ef0 59 API calls 18415->18417 18438 7ff6385e2835 18437->18438 18439 7ff6385f5508 48 API calls 18438->18439 18440 7ff6385e2854 18439->18440 18440->18414 18483 7ff6385f8ef4 18441->18483 18445 7ff6385e8d90 18444->18445 18446 7ff6385e8da6 CreateDirectoryW 18444->18446 18446->18414 18450 7ff6385e763c 18449->18450 18451 7ff6385e8de0 57 API calls 18450->18451 18452 7ff6385e765e 18451->18452 18453 7ff6385e7666 18452->18453 18454 7ff6385e7679 ExpandEnvironmentStringsW 18452->18454 18455 7ff6385e2b10 59 API calls 18453->18455 18456 7ff6385e769f __std_exception_destroy 18454->18456 18717 7ff6385e172e 18716->18717 18718 7ff6385e1716 18716->18718 18720 7ff6385e1734 18717->18720 18721 7ff6385e1758 18717->18721 18719 7ff6385e2b10 59 API calls 18718->18719 18722 7ff6385e1722 18719->18722 18846 7ff6385e12a0 18720->18846 18809 7ff6385e7e20 18721->18809 18722->17509 18727 7ff6385e174f 18727->17509 18728 7ff6385e177d 18730 7ff6385e2870 59 API calls 18728->18730 18729 7ff6385e17a9 18731 7ff6385e4060 116 API calls 18729->18731 18733 7ff6385e1793 18730->18733 18734 7ff6385e17be 18731->18734 18732 7ff6385e2b10 59 API calls 18732->18727 18733->17509 18735 7ff6385e17de 18734->18735 18736 7ff6385e17c6 18734->18736 18738 7ff6385f1004 73 API calls 18735->18738 18737 7ff6385e2b10 59 API calls 18736->18737 18739 7ff6385e17d5 18737->18739 18740 7ff6385e17ef 18738->18740 18759 7ff6385e2d66 18758->18759 18760 7ff6385e1ee0 49 API calls 18759->18760 18761 7ff6385e2d99 18760->18761 18762 7ff6385e3e80 49 API calls 18761->18762 18789 7ff6385e30ca 18761->18789 18763 7ff6385e2e07 18762->18763 18764 7ff6385e3e80 49 API calls 18763->18764 18765 7ff6385e2e18 18764->18765 18766 7ff6385e2e75 18765->18766 18767 7ff6385e2e39 18765->18767 18769 7ff6385e3190 75 API calls 18766->18769 18968 7ff6385e3190 18767->18968 18770 7ff6385e2e73 18769->18770 18771 7ff6385e2eb4 18770->18771 18772 7ff6385e2ef6 18770->18772 18976 7ff6385e77b0 18771->18976 18773 7ff6385e3190 75 API calls 18772->18773 18775 7ff6385e2f20 18773->18775 18779 7ff6385e3190 75 API calls 18775->18779 18784 7ff6385e2fbc 18775->18784 18781 7ff6385e2f52 18779->18781 18781->18784 18787 7ff6385e3190 75 API calls 18781->18787 18782 7ff6385e1ea0 59 API calls 18785 7ff6385e300f 18782->18785 18784->18782 18802 7ff6385e30cf 18784->18802 18785->18789 18810 7ff6385e7e30 18809->18810 18811 7ff6385e1ee0 49 API calls 18810->18811 18812 7ff6385e7e71 18811->18812 18813 7ff6385e7ef1 18812->18813 18889 7ff6385e3ff0 18812->18889 18815 7ff6385ec010 _wfindfirst32i64 8 API calls 18813->18815 18817 7ff6385e1775 18815->18817 18817->18728 18817->18729 18818 7ff6385e7f2b 18895 7ff6385e79d0 18818->18895 18820 7ff6385e7ee0 18824 7ff6385e2c30 59 API calls 18820->18824 18821 7ff6385e7f14 18825 7ff6385e2c30 59 API calls 18821->18825 18822 7ff6385e7d70 61 API calls 18826 7ff6385e7ea2 __std_exception_destroy 18822->18826 18824->18813 18825->18818 18826->18820 18826->18821 18847 7ff6385e12b2 18846->18847 18848 7ff6385e4060 116 API calls 18847->18848 18849 7ff6385e12e2 18848->18849 18850 7ff6385e1301 18849->18850 18851 7ff6385e12ea 18849->18851 18852 7ff6385f1004 73 API calls 18850->18852 18853 7ff6385e2b10 59 API calls 18851->18853 18854 7ff6385e1313 18852->18854 18858 7ff6385e12fa __std_exception_destroy 18853->18858 18855 7ff6385e133d 18854->18855 18856 7ff6385e1317 18854->18856 18862 7ff6385e1380 18855->18862 18863 7ff6385e1358 18855->18863 18857 7ff6385e2870 59 API calls 18856->18857 18859 7ff6385e132e 18857->18859 18860 7ff6385ec010 _wfindfirst32i64 8 API calls 18858->18860 18861 7ff6385f097c 74 API calls 18859->18861 18865 7ff6385e1444 18860->18865 18861->18858 18864 7ff6385e139a 18862->18864 18871 7ff6385e1453 18862->18871 18866 7ff6385e2870 59 API calls 18863->18866 18867 7ff6385e1050 98 API calls 18864->18867 18865->18727 18865->18732 18868 7ff6385e1373 18866->18868 18869 7ff6385e13ab 18867->18869 18872 7ff6385f097c 74 API calls 18868->18872 18873 7ff6385e14c2 __std_exception_destroy 18869->18873 18880 7ff6385e13b3 18869->18880 18870 7ff6385f097c 74 API calls 18874 7ff6385e13bf 18870->18874 18875 7ff6385f0ccc _fread_nolock 53 API calls 18871->18875 18878 7ff6385e14ab 18871->18878 18871->18880 18872->18858 18875->18871 18881 7ff6385e2870 59 API calls 18878->18881 18880->18870 18881->18873 18890 7ff6385e3ffa 18889->18890 18891 7ff6385e8de0 57 API calls 18890->18891 18892 7ff6385e4022 18891->18892 18893 7ff6385ec010 _wfindfirst32i64 8 API calls 18892->18893 18894 7ff6385e404a 18893->18894 18894->18818 18894->18822 18894->18826 18896 7ff6385e79e0 18895->18896 18897 7ff6385e1ee0 49 API calls 18896->18897 18969 7ff6385e31c4 18968->18969 18970 7ff6385f52b4 49 API calls 18969->18970 18971 7ff6385e31ea 18970->18971 18972 7ff6385e31fb 18971->18972 19028 7ff6385f65dc 18971->19028 18974 7ff6385ec010 _wfindfirst32i64 8 API calls 18972->18974 18975 7ff6385e3219 18974->18975 18975->18770 18977 7ff6385e77be 18976->18977 18978 7ff6385e4060 116 API calls 18977->18978 18979 7ff6385e77ed 18978->18979 18980 7ff6385e1ee0 49 API calls 18979->18980 19029 7ff6385f6605 19028->19029 19030 7ff6385f65f9 19028->19030 19032 7ff6385f5788 45 API calls 19029->19032 19045 7ff6385f5ef0 19030->19045 19034 7ff6385f662d 19032->19034 19046 7ff6385f5f0a 19045->19046 19047 7ff6385f5f27 19045->19047 19047->19046 19236 7ff6385f6918 19235->19236 19237 7ff6385f693e 19236->19237 19240 7ff6385f6971 19236->19240 19238 7ff6385f5cb4 _get_daylight 11 API calls 19237->19238 19239 7ff6385f6943 19238->19239 19241 7ff6385fb698 _invalid_parameter_noinfo 37 API calls 19239->19241 19242 7ff6385f6984 19240->19242 19243 7ff6385f6977 19240->19243 19247 7ff6385e40b9 19241->19247 19254 7ff6385fb9e0 19242->19254 19245 7ff6385f5cb4 _get_daylight 11 API calls 19243->19245 19245->19247 19247->17584 19267 7ff6386011a8 EnterCriticalSection 19254->19267 19615 7ff6385f98c4 19614->19615 19618 7ff6385f93a0 19615->19618 19619 7ff6385f93bb 19618->19619 19620 7ff6385f93ea 19618->19620 19621 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 19619->19621 19628 7ff6385f5b5c EnterCriticalSection 19620->19628 19625 7ff6385f93db 19621->19625 19630 7ff6385f0773 19629->19630 19631 7ff6385f07a1 19629->19631 19632 7ff6385fb5cc _invalid_parameter_noinfo 37 API calls 19630->19632 19634 7ff6385f0793 19631->19634 19639 7ff6385f5b5c EnterCriticalSection 19631->19639 19632->19634 19641 7ff6385e4060 116 API calls 19640->19641 19642 7ff6385e15b7 19641->19642 19643 7ff6385e15bf 19642->19643 19644 7ff6385e15e0 19642->19644 19646 7ff6385e2b10 59 API calls 19643->19646 19645 7ff6385f1004 73 API calls 19644->19645 19648 7ff6385e15f1 19645->19648 19647 7ff6385e15cf 19646->19647 19647->17603 19649 7ff6385e15f5 19648->19649 19650 7ff6385e1611 19648->19650 19651 7ff6385e2870 59 API calls 19649->19651 19652 7ff6385e1641 19650->19652 19653 7ff6385e1621 19650->19653 19662 7ff6385e160c __std_exception_destroy 19651->19662 19656 7ff6385e1656 19652->19656 19660 7ff6385e166d 19652->19660 19655 7ff6385e2870 59 API calls 19653->19655 19654 7ff6385f097c 74 API calls 19657 7ff6385e16e7 19654->19657 19655->19662 19658 7ff6385e1050 98 API calls 19656->19658 19657->17603 19658->19662 19659 7ff6385f0ccc _fread_nolock 53 API calls 19659->19660 19660->19659 19661 7ff6385e16ae 19660->19661 19660->19662 19663 7ff6385e2870 59 API calls 19661->19663 19662->19654 19663->19662 19666 7ff6385e19c3 19664->19666 19667 7ff6385e195f 19664->19667 19665 7ff6385f5860 45 API calls 19665->19667 19666->17611 19667->19665 19667->19666 19669 7ff6385e8de0 57 API calls 19668->19669 19670 7ff6385e8487 LoadLibraryExW 19669->19670 19671 7ff6385e84a4 __std_exception_destroy 19670->19671 19671->17630 19673 7ff6385e714c GetProcAddress 19672->19673 19674 7ff6385e7129 19672->19674 19673->19674 19732 7ff6385e5de0 19731->19732 19733 7ff6385e1ee0 49 API calls 19732->19733 19734 7ff6385e5e12 19733->19734 19735 7ff6385e5e3b 19734->19735 19736 7ff6385e5e1b 19734->19736 19738 7ff6385e5e92 19735->19738 19740 7ff6385e4140 49 API calls 19735->19740 19737 7ff6385e2b10 59 API calls 19736->19737 19758 7ff6385e5e31 19737->19758 19739 7ff6385e4140 49 API calls 19738->19739 19741 7ff6385e5eab 19739->19741 19742 7ff6385e5e5c 19740->19742 19744 7ff6385e5ec9 19741->19744 19747 7ff6385e2b10 59 API calls 19741->19747 19745 7ff6385e5e7a 19742->19745 19749 7ff6385e2b10 59 API calls 19742->19749 19743 7ff6385ec010 _wfindfirst32i64 8 API calls 19746 7ff6385e344e 19743->19746 19748 7ff6385e8470 58 API calls 19744->19748 19750 7ff6385e3ff0 57 API calls 19745->19750 19746->17651 19759 7ff6385e5f30 19746->19759 19747->19744 19752 7ff6385e5ed6 19748->19752 19749->19745 19751 7ff6385e5e84 19750->19751 19751->19738 19755 7ff6385e8470 58 API calls 19751->19755 19753 7ff6385e5edb 19752->19753 19754 7ff6385e5efd 19752->19754 19756 7ff6385e29c0 57 API calls 19753->19756 19829 7ff6385e53f0 GetProcAddress 19754->19829 19755->19738 19756->19758 19758->19743 19913 7ff6385e4ff0 19759->19913 19761 7ff6385e5f54 19762 7ff6385e5f6d 19761->19762 19763 7ff6385e5f5c 19761->19763 19920 7ff6385e4730 19762->19920 19830 7ff6385e5412 19829->19830 19831 7ff6385e5430 GetProcAddress 19829->19831 19834 7ff6385e29c0 57 API calls 19830->19834 19831->19830 19832 7ff6385e5455 GetProcAddress 19831->19832 19832->19830 19915 7ff6385e5015 19913->19915 19914 7ff6385e501d 19914->19761 19915->19914 19918 7ff6385e51af 19915->19918 19955 7ff6385f74f4 19915->19955 19916 7ff6385e535a __std_exception_destroy 19916->19761 19917 7ff6385e4450 47 API calls 19917->19918 19918->19916 19918->19917 19956 7ff6385f7524 19955->19956 19959 7ff6385f69f0 19956->19959 20653 7ff6385eb1cc 20654 7ff6385ea5d3 20653->20654 20656 7ff6385ea656 20653->20656 20655 7ff6385eb850 12 API calls 20654->20655 20654->20656 20655->20656

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 63 7ff6385e1000-7ff6385e39b6 call 7ff6385f0750 call 7ff6385f0748 call 7ff6385e89b0 call 7ff6385f0748 call 7ff6385ebfb0 call 7ff6385f5ae0 call 7ff6385f66e8 call 7ff6385e1ea0 81 7ff6385e3b5f 63->81 82 7ff6385e39bc-7ff6385e39cc call 7ff6385e3f00 63->82 84 7ff6385e3b64-7ff6385e3b84 call 7ff6385ec010 81->84 82->81 87 7ff6385e39d2-7ff6385e39e5 call 7ff6385e3dd0 82->87 87->81 91 7ff6385e39eb-7ff6385e3a12 call 7ff6385e7d70 87->91 94 7ff6385e3a54-7ff6385e3a7c call 7ff6385e8250 call 7ff6385e1ca0 91->94 95 7ff6385e3a14-7ff6385e3a23 call 7ff6385e7d70 91->95 106 7ff6385e3a82-7ff6385e3a98 call 7ff6385e1ca0 94->106 107 7ff6385e3b2d-7ff6385e3b3e 94->107 95->94 101 7ff6385e3a25-7ff6385e3a2b 95->101 102 7ff6385e3a2d-7ff6385e3a35 101->102 103 7ff6385e3a37-7ff6385e3a51 call 7ff6385f576c call 7ff6385e8250 101->103 102->103 103->94 122 7ff6385e3a9a-7ff6385e3ab2 call 7ff6385e2b10 106->122 123 7ff6385e3ab7-7ff6385e3aba 106->123 108 7ff6385e3b92-7ff6385e3b95 107->108 109 7ff6385e3b40-7ff6385e3b47 107->109 115 7ff6385e3bab-7ff6385e3bc3 call 7ff6385e8de0 108->115 116 7ff6385e3b97-7ff6385e3b9d 108->116 109->108 112 7ff6385e3b49-7ff6385e3b51 call 7ff6385e8b80 109->112 131 7ff6385e3b53 112->131 132 7ff6385e3b85-7ff6385e3b88 call 7ff6385e14e0 112->132 133 7ff6385e3bc5-7ff6385e3bcc 115->133 134 7ff6385e3bce-7ff6385e3bd5 SetDllDirectoryW 115->134 117 7ff6385e3b9f-7ff6385e3ba9 116->117 118 7ff6385e3bdb-7ff6385e3be8 call 7ff6385e6ff0 116->118 117->115 117->118 138 7ff6385e3c33-7ff6385e3c38 call 7ff6385e6f70 118->138 139 7ff6385e3bea-7ff6385e3bf7 call 7ff6385e6ca0 118->139 122->81 123->107 124 7ff6385e3abc-7ff6385e3ad3 call 7ff6385e4060 123->124 141 7ff6385e3ad5-7ff6385e3ad8 124->141 142 7ff6385e3ada-7ff6385e3b06 call 7ff6385e84c0 124->142 137 7ff6385e3b5a call 7ff6385e2b10 131->137 146 7ff6385e3b8d-7ff6385e3b90 132->146 133->137 134->118 137->81 149 7ff6385e3c3d-7ff6385e3c40 138->149 139->138 154 7ff6385e3bf9-7ff6385e3c08 call 7ff6385e6800 139->154 147 7ff6385e3b15-7ff6385e3b2b call 7ff6385e2b10 141->147 142->107 157 7ff6385e3b08-7ff6385e3b10 call 7ff6385f097c 142->157 146->81 146->108 147->81 152 7ff6385e3d11-7ff6385e3d20 call 7ff6385e34a0 149->152 153 7ff6385e3c46-7ff6385e3c50 149->153 152->81 166 7ff6385e3d26-7ff6385e3d55 call 7ff6385e8b50 call 7ff6385e81e0 call 7ff6385e7d70 call 7ff6385e3600 152->166 158 7ff6385e3c53-7ff6385e3c5d 153->158 170 7ff6385e3c0a-7ff6385e3c16 call 7ff6385e6780 154->170 171 7ff6385e3c29-7ff6385e3c2e call 7ff6385e6a50 154->171 157->147 163 7ff6385e3c5f-7ff6385e3c64 158->163 164 7ff6385e3c66-7ff6385e3c68 158->164 163->158 163->164 168 7ff6385e3cb1-7ff6385e3cb7 164->168 169 7ff6385e3c6a-7ff6385e3c8d call 7ff6385e1ee0 164->169 199 7ff6385e3d7a-7ff6385e3daa call 7ff6385e8290 call 7ff6385e6a50 call 7ff6385e6f70 166->199 200 7ff6385e3d57-7ff6385e3d74 PostMessageW GetMessageW 166->200 174 7ff6385e3cdc-7ff6385e3d0c call 7ff6385e3600 call 7ff6385e3440 call 7ff6385e35f0 call 7ff6385e6a50 call 7ff6385e6f70 168->174 175 7ff6385e3cb9-7ff6385e3cd6 PostMessageW GetMessageW 168->175 169->81 182 7ff6385e3c93-7ff6385e3c9d 169->182 170->171 183 7ff6385e3c18-7ff6385e3c27 call 7ff6385e6e40 170->183 171->138 174->84 175->174 186 7ff6385e3ca0-7ff6385e3caf 182->186 183->149 186->168 186->186 210 7ff6385e3dac-7ff6385e3db3 call 7ff6385e7f50 199->210 211 7ff6385e3db8-7ff6385e3dc2 call 7ff6385e1e70 199->211 200->199 210->211 211->84
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message$EnvironmentPost$DirectoryExpandFileModuleNameStringsVariable
                                                      • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                      • API String ID: 2647325126-1544818733
                                                      • Opcode ID: a25e3f417c552a27ddeba7d09e9d7cd152d3ae131fac216694c9dd282895ab73
                                                      • Instruction ID: d3f4cd5920d1bee8984bf4842a3444fd130dec951bf165eb735e18649251f5a1
                                                      • Opcode Fuzzy Hash: a25e3f417c552a27ddeba7d09e9d7cd152d3ae131fac216694c9dd282895ab73
                                                      • Instruction Fuzzy Hash: 3EC1A363F0C64681EAA4AB319C512FE6391BF947A4F403131EA4EC7796DF2EF505A708

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 263 7ff638606b50-7ff638606b8b call 7ff6386064d8 call 7ff6386064e0 call 7ff638606548 270 7ff638606db5-7ff638606e01 call 7ff6385fb6b8 call 7ff6386064d8 call 7ff6386064e0 call 7ff638606548 263->270 271 7ff638606b91-7ff638606b9c call 7ff6386064e8 263->271 297 7ff638606f3f-7ff638606fad call 7ff6385fb6b8 call 7ff6386023d0 270->297 298 7ff638606e07-7ff638606e12 call 7ff6386064e8 270->298 271->270 277 7ff638606ba2-7ff638606bac 271->277 279 7ff638606bce-7ff638606bd2 277->279 280 7ff638606bae-7ff638606bb1 277->280 283 7ff638606bd5-7ff638606bdd 279->283 282 7ff638606bb4-7ff638606bbf 280->282 285 7ff638606bc1-7ff638606bc8 282->285 286 7ff638606bca-7ff638606bcc 282->286 283->283 287 7ff638606bdf-7ff638606bf2 call 7ff6385fe3ac 283->287 285->282 285->286 286->279 289 7ff638606bfb-7ff638606c09 286->289 294 7ff638606bf4-7ff638606bf6 call 7ff6385fb700 287->294 295 7ff638606c0a-7ff638606c16 call 7ff6385fb700 287->295 294->289 304 7ff638606c1d-7ff638606c25 295->304 315 7ff638606faf-7ff638606fb6 297->315 316 7ff638606fbb-7ff638606fbe 297->316 298->297 306 7ff638606e18-7ff638606e23 call 7ff638606518 298->306 304->304 307 7ff638606c27-7ff638606c38 call 7ff638601344 304->307 306->297 317 7ff638606e29-7ff638606e4c call 7ff6385fb700 GetTimeZoneInformation 306->317 307->270 318 7ff638606c3e-7ff638606c94 call 7ff63860b580 * 4 call 7ff638606a6c 307->318 320 7ff63860704b-7ff63860704e 315->320 322 7ff638606ff5-7ff638607008 call 7ff6385fe3ac 316->322 323 7ff638606fc0 316->323 329 7ff638606f14-7ff638606f3e call 7ff6386064d0 call 7ff6386064c0 call 7ff6386064c8 317->329 330 7ff638606e52-7ff638606e73 317->330 375 7ff638606c96-7ff638606c9a 318->375 324 7ff638606fc3 320->324 327 7ff638607054-7ff63860705c call 7ff638606b50 320->327 341 7ff638607013-7ff63860702e call 7ff6386023d0 322->341 342 7ff63860700a 322->342 323->324 331 7ff638606fc8-7ff638606ff4 call 7ff6385fb700 call 7ff6385ec010 324->331 332 7ff638606fc3 call 7ff638606dcc 324->332 327->331 336 7ff638606e75-7ff638606e7b 330->336 337 7ff638606e7e-7ff638606e85 330->337 332->331 336->337 344 7ff638606e99 337->344 345 7ff638606e87-7ff638606e8f 337->345 363 7ff638607035-7ff638607047 call 7ff6385fb700 341->363 364 7ff638607030-7ff638607033 341->364 349 7ff63860700c-7ff638607011 call 7ff6385fb700 342->349 354 7ff638606e9b-7ff638606f0f call 7ff63860b580 * 4 call 7ff6386039ac call 7ff638607064 * 2 344->354 345->344 351 7ff638606e91-7ff638606e97 345->351 349->323 351->354 354->329 363->320 364->349 377 7ff638606ca0-7ff638606ca4 375->377 378 7ff638606c9c 375->378 377->375 380 7ff638606ca6-7ff638606ccb call 7ff6385f75a8 377->380 378->377 386 7ff638606cce-7ff638606cd2 380->386 388 7ff638606cd4-7ff638606cdf 386->388 389 7ff638606ce1-7ff638606ce5 386->389 388->389 391 7ff638606ce7-7ff638606ceb 388->391 389->386 394 7ff638606ced-7ff638606d15 call 7ff6385f75a8 391->394 395 7ff638606d6c-7ff638606d70 391->395 403 7ff638606d33-7ff638606d37 394->403 404 7ff638606d17 394->404 396 7ff638606d72-7ff638606d74 395->396 397 7ff638606d77-7ff638606d84 395->397 396->397 399 7ff638606d9f-7ff638606dae call 7ff6386064d0 call 7ff6386064c0 397->399 400 7ff638606d86-7ff638606d9c call 7ff638606a6c 397->400 399->270 400->399 403->395 409 7ff638606d39-7ff638606d57 call 7ff6385f75a8 403->409 407 7ff638606d1a-7ff638606d21 404->407 407->403 410 7ff638606d23-7ff638606d31 407->410 415 7ff638606d63-7ff638606d6a 409->415 410->403 410->407 415->395 416 7ff638606d59-7ff638606d5d 415->416 416->395 417 7ff638606d5f 416->417 417->415
                                                      APIs
                                                      • _get_daylight.LIBCMT ref: 00007FF638606B95
                                                        • Part of subcall function 00007FF6386064E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6386064FC
                                                        • Part of subcall function 00007FF6385FB700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB716
                                                        • Part of subcall function 00007FF6385FB700: GetLastError.KERNEL32(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB720
                                                        • Part of subcall function 00007FF6385FB6B8: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6385FB697,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FB6C1
                                                        • Part of subcall function 00007FF6385FB6B8: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6385FB697,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FB6E6
                                                      • _get_daylight.LIBCMT ref: 00007FF638606B84
                                                        • Part of subcall function 00007FF638606548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF63860655C
                                                      • _get_daylight.LIBCMT ref: 00007FF638606DFA
                                                      • _get_daylight.LIBCMT ref: 00007FF638606E0B
                                                      • _get_daylight.LIBCMT ref: 00007FF638606E1C
                                                      • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF63860705C), ref: 00007FF638606E43
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                      • String ID: Eastern Standard Time$Eastern Summer Time
                                                      • API String ID: 1458651798-239921721
                                                      • Opcode ID: 011d4974f3e124412289dc327b2b40947a146d65b03f6d5f747eb19bebd0a963
                                                      • Instruction ID: 2513a90fd74ec06b4bb5a16c15a30a127575e9d34cc4051c758ae70d3db2f53c
                                                      • Opcode Fuzzy Hash: 011d4974f3e124412289dc327b2b40947a146d65b03f6d5f747eb19bebd0a963
                                                      • Instruction Fuzzy Hash: CCD19DB3A1C36686E7209F31D8411F963A1EF46794F448135EA4D87785DF3EE441B348

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 448 7ff638607a9c-7ff638607b0f call 7ff6386077d0 451 7ff638607b11-7ff638607b1a call 7ff6385f5c94 448->451 452 7ff638607b29-7ff638607b33 call 7ff6385f8c58 448->452 459 7ff638607b1d-7ff638607b24 call 7ff6385f5cb4 451->459 457 7ff638607b35-7ff638607b4c call 7ff6385f5c94 call 7ff6385f5cb4 452->457 458 7ff638607b4e-7ff638607bb7 CreateFileW 452->458 457->459 461 7ff638607c34-7ff638607c3f GetFileType 458->461 462 7ff638607bb9-7ff638607bbf 458->462 470 7ff638607e6a-7ff638607e8a 459->470 464 7ff638607c92-7ff638607c99 461->464 465 7ff638607c41-7ff638607c7c GetLastError call 7ff6385f5c28 CloseHandle 461->465 467 7ff638607c01-7ff638607c2f GetLastError call 7ff6385f5c28 462->467 468 7ff638607bc1-7ff638607bc5 462->468 473 7ff638607ca1-7ff638607ca4 464->473 474 7ff638607c9b-7ff638607c9f 464->474 465->459 482 7ff638607c82-7ff638607c8d call 7ff6385f5cb4 465->482 467->459 468->467 475 7ff638607bc7-7ff638607bff CreateFileW 468->475 479 7ff638607caa-7ff638607cff call 7ff6385f8b70 473->479 480 7ff638607ca6 473->480 474->479 475->461 475->467 487 7ff638607d01-7ff638607d0d call 7ff6386079d8 479->487 488 7ff638607d1e-7ff638607d4f call 7ff638607550 479->488 480->479 482->459 487->488 493 7ff638607d0f 487->493 494 7ff638607d55-7ff638607d97 488->494 495 7ff638607d51-7ff638607d53 488->495 496 7ff638607d11-7ff638607d19 call 7ff6385fb878 493->496 497 7ff638607db9-7ff638607dc4 494->497 498 7ff638607d99-7ff638607d9d 494->498 495->496 496->470 501 7ff638607dca-7ff638607dce 497->501 502 7ff638607e68 497->502 498->497 500 7ff638607d9f-7ff638607db4 498->500 500->497 501->502 504 7ff638607dd4-7ff638607e19 CloseHandle CreateFileW 501->504 502->470 505 7ff638607e4e-7ff638607e63 504->505 506 7ff638607e1b-7ff638607e49 GetLastError call 7ff6385f5c28 call 7ff6385f8d98 504->506 505->502 506->505
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                      • String ID:
                                                      • API String ID: 1617910340-0
                                                      • Opcode ID: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                                      • Instruction ID: 905d7bcbc884b767fcdd9258de25fc5d2212d9990cc3ac19af04bb56d035e43c
                                                      • Opcode Fuzzy Hash: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                                      • Instruction Fuzzy Hash: 19C1BF73B28A5685EB50CF74C4906FC3761EB4ABA8B114235DA2E973D4CF3AE455E308

                                                      Control-flow Graph

                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF6385E153F), ref: 00007FF6385E7BF7
                                                        • Part of subcall function 00007FF6385E7D70: GetEnvironmentVariableW.KERNEL32(00007FF6385E39FF), ref: 00007FF6385E7DAA
                                                        • Part of subcall function 00007FF6385E7D70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF6385E7DC7
                                                        • Part of subcall function 00007FF6385F8610: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6385F8629
                                                      • SetEnvironmentVariableW.KERNEL32 ref: 00007FF6385E7CB1
                                                        • Part of subcall function 00007FF6385E2B10: MessageBoxW.USER32 ref: 00007FF6385E2BE5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                      • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                      • API String ID: 3752271684-1116378104
                                                      • Opcode ID: 26c14f5d2d519ab3f82a273994a24441e39aec3c57247172eafc601634a0f726
                                                      • Instruction ID: 15bdcc8b6213fe5a6267912e6d2eb4f73fe8bae7a6ec617af89311d74d80772b
                                                      • Opcode Fuzzy Hash: 26c14f5d2d519ab3f82a273994a24441e39aec3c57247172eafc601634a0f726
                                                      • Instruction Fuzzy Hash: DC517F53B0D61381FE94AB32AE152FA52855F95BE0F486430ED4ECB787ED2EF405A348
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                      • API String ID: 0-2665694366
                                                      • Opcode ID: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                                      • Instruction ID: 85c3da71d2ccb09b717d6db242bcd5899db7163756be3bb9f5bc70425bc562c1
                                                      • Opcode Fuzzy Hash: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                                      • Instruction Fuzzy Hash: 2D52F473A146A68BD7A58F34C848BFE3BA9FB54350F115139E64A93780DF3AE844DB04

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 957 7ff638606dcc-7ff638606e01 call 7ff6386064d8 call 7ff6386064e0 call 7ff638606548 964 7ff638606f3f-7ff638606fad call 7ff6385fb6b8 call 7ff6386023d0 957->964 965 7ff638606e07-7ff638606e12 call 7ff6386064e8 957->965 976 7ff638606faf-7ff638606fb6 964->976 977 7ff638606fbb-7ff638606fbe 964->977 965->964 970 7ff638606e18-7ff638606e23 call 7ff638606518 965->970 970->964 978 7ff638606e29-7ff638606e4c call 7ff6385fb700 GetTimeZoneInformation 970->978 979 7ff63860704b-7ff63860704e 976->979 981 7ff638606ff5-7ff638607008 call 7ff6385fe3ac 977->981 982 7ff638606fc0 977->982 987 7ff638606f14-7ff638606f3e call 7ff6386064d0 call 7ff6386064c0 call 7ff6386064c8 978->987 988 7ff638606e52-7ff638606e73 978->988 983 7ff638606fc3 979->983 985 7ff638607054-7ff63860705c call 7ff638606b50 979->985 997 7ff638607013-7ff63860702e call 7ff6386023d0 981->997 998 7ff63860700a 981->998 982->983 989 7ff638606fc8-7ff638606ff4 call 7ff6385fb700 call 7ff6385ec010 983->989 990 7ff638606fc3 call 7ff638606dcc 983->990 985->989 993 7ff638606e75-7ff638606e7b 988->993 994 7ff638606e7e-7ff638606e85 988->994 990->989 993->994 1000 7ff638606e99 994->1000 1001 7ff638606e87-7ff638606e8f 994->1001 1016 7ff638607035-7ff638607047 call 7ff6385fb700 997->1016 1017 7ff638607030-7ff638607033 997->1017 1004 7ff63860700c-7ff638607011 call 7ff6385fb700 998->1004 1008 7ff638606e9b-7ff638606f0f call 7ff63860b580 * 4 call 7ff6386039ac call 7ff638607064 * 2 1000->1008 1001->1000 1006 7ff638606e91-7ff638606e97 1001->1006 1004->982 1006->1008 1008->987 1016->979 1017->1004
                                                      APIs
                                                      • _get_daylight.LIBCMT ref: 00007FF638606DFA
                                                        • Part of subcall function 00007FF638606548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF63860655C
                                                      • _get_daylight.LIBCMT ref: 00007FF638606E0B
                                                        • Part of subcall function 00007FF6386064E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6386064FC
                                                      • _get_daylight.LIBCMT ref: 00007FF638606E1C
                                                        • Part of subcall function 00007FF638606518: _invalid_parameter_noinfo.LIBCMT ref: 00007FF63860652C
                                                        • Part of subcall function 00007FF6385FB700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB716
                                                        • Part of subcall function 00007FF6385FB700: GetLastError.KERNEL32(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB720
                                                      • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF63860705C), ref: 00007FF638606E43
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                      • String ID: Eastern Standard Time$Eastern Summer Time
                                                      • API String ID: 2248164782-239921721
                                                      • Opcode ID: 3ce9ff365909c35cfda0cd92fd9b5c2b6ab9c6a7c0cfccc6144e1dd1acbf6dd4
                                                      • Instruction ID: 00c114280e1cb980a0bffd533a5fe6f6a52904932d40930c5a53b3365fb798ef
                                                      • Opcode Fuzzy Hash: 3ce9ff365909c35cfda0cd92fd9b5c2b6ab9c6a7c0cfccc6144e1dd1acbf6dd4
                                                      • Instruction Fuzzy Hash: ED516FB3A1C76286E710DF31E8811E9A761BB4A784F448135EA4DC7796DF3EE440B748
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $header crc mismatch$unknown header flags set
                                                      • API String ID: 0-1127688429
                                                      • Opcode ID: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                                      • Instruction ID: b4dd700729440687f6133518634867c6a25ba8891db6b0cb58cbc3ed42503c3d
                                                      • Opcode Fuzzy Hash: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                                      • Instruction Fuzzy Hash: 3AF1C273A083C54AEBD68B34C888AFE3AA9EF54750F156538DA4997390CF3AE440E744
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                                      • Instruction ID: e823e8468b492203b6d6f8b6f3d1d8613efdd26d7ac1ad72f65f146565a9aa33
                                                      • Opcode Fuzzy Hash: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                                      • Instruction Fuzzy Hash: 38F08133A1868187E7A08F70E8887EA7350AB44724F041635D6AD467D4DF3CE008AB08
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: incorrect header check$invalid window size
                                                      • API String ID: 0-900081337
                                                      • Opcode ID: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                                      • Instruction ID: 4468e00031fc5fcdf743d0be53ba0095b93576b2f3a72646182b86b28ae04adc
                                                      • Opcode Fuzzy Hash: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                                      • Instruction Fuzzy Hash: EA91D673A182C687E7E58E34C848BFE3AA9FB44360F116139DA4A96780DF39F540DB05
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CurrentFeaturePresentProcessProcessor
                                                      • String ID:
                                                      • API String ID: 1010374628-0
                                                      • Opcode ID: 7041d00dd20dc0adae29e525b93bb016b8d8d51295fce4227865030a77fc7bc6
                                                      • Instruction ID: e6acd5dcc32965ab8ee2515fb469fad3e2a90e60f8c66db0ce8f1886678eceed
                                                      • Opcode Fuzzy Hash: 7041d00dd20dc0adae29e525b93bb016b8d8d51295fce4227865030a77fc7bc6
                                                      • Instruction Fuzzy Hash: 7502BFA3E1E66A81FA55AB3194002F92695AF12BA0F444635DD5DCB7D2EE3FF401B30C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff6385e1700-7ff6385e1714 1 7ff6385e172e-7ff6385e1732 0->1 2 7ff6385e1716-7ff6385e172d call 7ff6385e2b10 0->2 4 7ff6385e1734-7ff6385e173d call 7ff6385e12a0 1->4 5 7ff6385e1758-7ff6385e177b call 7ff6385e7e20 1->5 11 7ff6385e174f-7ff6385e1757 4->11 12 7ff6385e173f-7ff6385e174a call 7ff6385e2b10 4->12 13 7ff6385e177d-7ff6385e17a8 call 7ff6385e2870 5->13 14 7ff6385e17a9-7ff6385e17c4 call 7ff6385e4060 5->14 12->11 20 7ff6385e17de-7ff6385e17f1 call 7ff6385f1004 14->20 21 7ff6385e17c6-7ff6385e17d9 call 7ff6385e2b10 14->21 27 7ff6385e1813-7ff6385e1817 20->27 28 7ff6385e17f3-7ff6385e180e call 7ff6385e2870 20->28 26 7ff6385e191f-7ff6385e1922 call 7ff6385f097c 21->26 36 7ff6385e1927-7ff6385e193e 26->36 31 7ff6385e1831-7ff6385e1851 call 7ff6385f5780 27->31 32 7ff6385e1819-7ff6385e1825 call 7ff6385e1050 27->32 39 7ff6385e1917-7ff6385e191a call 7ff6385f097c 28->39 40 7ff6385e1853-7ff6385e186d call 7ff6385e2870 31->40 41 7ff6385e1872-7ff6385e1878 31->41 37 7ff6385e182a-7ff6385e182c 32->37 37->39 39->26 49 7ff6385e190d-7ff6385e1912 40->49 44 7ff6385e1905-7ff6385e1908 call 7ff6385f576c 41->44 45 7ff6385e187e-7ff6385e1887 41->45 44->49 48 7ff6385e1890-7ff6385e18b2 call 7ff6385f0ccc 45->48 52 7ff6385e18e5-7ff6385e18ec 48->52 53 7ff6385e18b4-7ff6385e18cc call 7ff6385f140c 48->53 49->39 54 7ff6385e18f3-7ff6385e18fb call 7ff6385e2870 52->54 58 7ff6385e18d5-7ff6385e18e3 53->58 59 7ff6385e18ce-7ff6385e18d1 53->59 62 7ff6385e1900 54->62 58->54 59->48 61 7ff6385e18d3 59->61 61->62 62->44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                      • API String ID: 2030045667-3833288071
                                                      • Opcode ID: 6b5ec46fd63da2928d703574fa3e1a2c156e5414cd3755f411485795ef841b15
                                                      • Instruction ID: 69280a87e645d4a2f85ff18b0d3311d9b3bfce2f2b97695688b6f63c2ac75086
                                                      • Opcode Fuzzy Hash: 6b5ec46fd63da2928d703574fa3e1a2c156e5414cd3755f411485795ef841b15
                                                      • Instruction Fuzzy Hash: 80517DA3B4C64282EA509B35E8502F9A391BF45BE5F445031EE4DCB795EE2EF548B30C

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _fread_nolock$Message
                                                      • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                      • API String ID: 677216364-1384898525
                                                      • Opcode ID: 41b590fa6c109f12591f487eca3c37f3e6b792da97e66d352e2e42e1c7757f8c
                                                      • Instruction ID: 4f352d700e106944e7c564865bdd73f78b076eba3d543dd3b1f253727e6c8ab0
                                                      • Opcode Fuzzy Hash: 41b590fa6c109f12591f487eca3c37f3e6b792da97e66d352e2e42e1c7757f8c
                                                      • Instruction Fuzzy Hash: 4E519D73A0964286EB94DF38D8501F877A0EF48BA4B559135DA0DC7799DE3EE440E70C

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                      • String ID: CreateProcessW$Error creating child process!
                                                      • API String ID: 2895956056-3524285272
                                                      • Opcode ID: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                                      • Instruction ID: 73ca4f736f6072fd0e1cda92b30061f7eeb6ce6b8a68ac9669b45c3dc16d7179
                                                      • Opcode Fuzzy Hash: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                                      • Instruction Fuzzy Hash: CB415E73A0878282DA609B74E8552EAB3A0FB95374F400735E6AD83BD5DF7DD0549B04

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 511 7ff6385e1050-7ff6385e10ab call 7ff6385eb840 514 7ff6385e10d3-7ff6385e10eb call 7ff6385f5780 511->514 515 7ff6385e10ad-7ff6385e10d2 call 7ff6385e2b10 511->515 520 7ff6385e10ed-7ff6385e1104 call 7ff6385e2870 514->520 521 7ff6385e1109-7ff6385e1119 call 7ff6385f5780 514->521 526 7ff6385e1264-7ff6385e1279 call 7ff6385eb520 call 7ff6385f576c * 2 520->526 527 7ff6385e111b-7ff6385e1132 call 7ff6385e2870 521->527 528 7ff6385e1137-7ff6385e1149 521->528 543 7ff6385e127e-7ff6385e1298 526->543 527->526 530 7ff6385e1150-7ff6385e1175 call 7ff6385f0ccc 528->530 537 7ff6385e117b-7ff6385e1185 call 7ff6385f0a40 530->537 538 7ff6385e125c 530->538 537->538 544 7ff6385e118b-7ff6385e1197 537->544 538->526 545 7ff6385e11a0-7ff6385e11c8 call 7ff6385e9c80 544->545 548 7ff6385e1241-7ff6385e1257 call 7ff6385e2b10 545->548 549 7ff6385e11ca-7ff6385e11cd 545->549 548->538 550 7ff6385e11cf-7ff6385e11d9 549->550 551 7ff6385e123c 549->551 553 7ff6385e1203-7ff6385e1206 550->553 554 7ff6385e11db-7ff6385e11e8 call 7ff6385f140c 550->554 551->548 556 7ff6385e1219-7ff6385e121e 553->556 557 7ff6385e1208-7ff6385e1216 call 7ff63860aee0 553->557 558 7ff6385e11ed-7ff6385e11f0 554->558 556->545 560 7ff6385e1220-7ff6385e1223 556->560 557->556 563 7ff6385e11f2-7ff6385e11fc call 7ff6385f0a40 558->563 564 7ff6385e11fe-7ff6385e1201 558->564 561 7ff6385e1225-7ff6385e1228 560->561 562 7ff6385e1237-7ff6385e123a 560->562 561->548 566 7ff6385e122a-7ff6385e1232 561->566 562->538 563->556 563->564 564->548 566->530
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                      • API String ID: 2030045667-2813020118
                                                      • Opcode ID: 1c9f60fe5bdfbf99a397612234c032aac3c0edeb9f84fb8fb3de77bae926bd72
                                                      • Instruction ID: de625da6b9847064f20d69db721477a3f2c1c0c825da4b554f656f3a3de94ad0
                                                      • Opcode Fuzzy Hash: 1c9f60fe5bdfbf99a397612234c032aac3c0edeb9f84fb8fb3de77bae926bd72
                                                      • Instruction Fuzzy Hash: CA51D063A0D68281EAA09B32EC403FAA291FB857A5F445135EE4DC7785EF3DF505E708

                                                      Control-flow Graph

                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF6385FFD5A,?,?,-00000018,00007FF6385FBB0B,?,?,?,00007FF6385FBA02,?,?,?,00007FF6385F698E), ref: 00007FF6385FFB3C
                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF6385FFD5A,?,?,-00000018,00007FF6385FBB0B,?,?,?,00007FF6385FBA02,?,?,?,00007FF6385F698E), ref: 00007FF6385FFB48
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3013587201-537541572
                                                      • Opcode ID: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                                      • Instruction ID: a4fbfb383e0fd9e4e0b1c2b5ad501fad03b54bc8a4dbfc17cbaa249cd6b92ad4
                                                      • Opcode Fuzzy Hash: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                                      • Instruction Fuzzy Hash: 8841F273B19A1282FA56DB36A8105F523D5BF55BA0F094135DD0DC7B84EE3EE444A30C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 844 7ff6385fc80c-7ff6385fc832 845 7ff6385fc834-7ff6385fc848 call 7ff6385f5c94 call 7ff6385f5cb4 844->845 846 7ff6385fc84d-7ff6385fc851 844->846 864 7ff6385fcc3e 845->864 848 7ff6385fcc27-7ff6385fcc33 call 7ff6385f5c94 call 7ff6385f5cb4 846->848 849 7ff6385fc857-7ff6385fc85e 846->849 866 7ff6385fcc39 call 7ff6385fb698 848->866 849->848 851 7ff6385fc864-7ff6385fc892 849->851 851->848 855 7ff6385fc898-7ff6385fc89f 851->855 856 7ff6385fc8a1-7ff6385fc8b3 call 7ff6385f5c94 call 7ff6385f5cb4 855->856 857 7ff6385fc8b8-7ff6385fc8bb 855->857 856->866 862 7ff6385fcc23-7ff6385fcc25 857->862 863 7ff6385fc8c1-7ff6385fc8c7 857->863 867 7ff6385fcc41-7ff6385fcc58 862->867 863->862 868 7ff6385fc8cd-7ff6385fc8d0 863->868 864->867 866->864 868->856 871 7ff6385fc8d2-7ff6385fc8f7 868->871 873 7ff6385fc92a-7ff6385fc931 871->873 874 7ff6385fc8f9-7ff6385fc8fb 871->874 875 7ff6385fc933-7ff6385fc95b call 7ff6385fe3ac call 7ff6385fb700 * 2 873->875 876 7ff6385fc906-7ff6385fc91d call 7ff6385f5c94 call 7ff6385f5cb4 call 7ff6385fb698 873->876 877 7ff6385fc922-7ff6385fc928 874->877 878 7ff6385fc8fd-7ff6385fc904 874->878 907 7ff6385fc95d-7ff6385fc973 call 7ff6385f5cb4 call 7ff6385f5c94 875->907 908 7ff6385fc978-7ff6385fc9a3 call 7ff6385fd034 875->908 905 7ff6385fcab0 876->905 879 7ff6385fc9a8-7ff6385fc9bf 877->879 878->876 878->877 882 7ff6385fc9c1-7ff6385fc9c9 879->882 883 7ff6385fca3a-7ff6385fca44 call 7ff63860476c 879->883 882->883 886 7ff6385fc9cb-7ff6385fc9cd 882->886 894 7ff6385fcace 883->894 895 7ff6385fca4a-7ff6385fca5f 883->895 886->883 890 7ff6385fc9cf-7ff6385fc9e5 886->890 890->883 897 7ff6385fc9e7-7ff6385fc9f3 890->897 903 7ff6385fcad3-7ff6385fcaf3 ReadFile 894->903 895->894 899 7ff6385fca61-7ff6385fca73 GetConsoleMode 895->899 897->883 901 7ff6385fc9f5-7ff6385fc9f7 897->901 899->894 904 7ff6385fca75-7ff6385fca7d 899->904 901->883 906 7ff6385fc9f9-7ff6385fca11 901->906 909 7ff6385fcbed-7ff6385fcbf6 GetLastError 903->909 910 7ff6385fcaf9-7ff6385fcb01 903->910 904->903 912 7ff6385fca7f-7ff6385fcaa1 ReadConsoleW 904->912 915 7ff6385fcab3-7ff6385fcabd call 7ff6385fb700 905->915 906->883 916 7ff6385fca13-7ff6385fca1f 906->916 907->905 908->879 913 7ff6385fcc13-7ff6385fcc16 909->913 914 7ff6385fcbf8-7ff6385fcc0e call 7ff6385f5cb4 call 7ff6385f5c94 909->914 910->909 918 7ff6385fcb07 910->918 921 7ff6385fcaa3 GetLastError 912->921 922 7ff6385fcac2-7ff6385fcacc 912->922 926 7ff6385fcc1c-7ff6385fcc1e 913->926 927 7ff6385fcaa9-7ff6385fcaab call 7ff6385f5c28 913->927 914->905 915->867 916->883 925 7ff6385fca21-7ff6385fca23 916->925 919 7ff6385fcb0e-7ff6385fcb23 918->919 919->915 929 7ff6385fcb25-7ff6385fcb30 919->929 921->927 922->919 925->883 933 7ff6385fca25-7ff6385fca35 925->933 926->915 927->905 935 7ff6385fcb32-7ff6385fcb4b call 7ff6385fc424 929->935 936 7ff6385fcb57-7ff6385fcb5f 929->936 933->883 944 7ff6385fcb50-7ff6385fcb52 935->944 940 7ff6385fcb61-7ff6385fcb73 936->940 941 7ff6385fcbdb-7ff6385fcbe8 call 7ff6385fc264 936->941 945 7ff6385fcb75 940->945 946 7ff6385fcbce-7ff6385fcbd6 940->946 941->944 944->915 948 7ff6385fcb7a-7ff6385fcb81 945->948 946->915 949 7ff6385fcb83-7ff6385fcb87 948->949 950 7ff6385fcbbd-7ff6385fcbc8 948->950 951 7ff6385fcba3 949->951 952 7ff6385fcb89-7ff6385fcb90 949->952 950->946 954 7ff6385fcba9-7ff6385fcbb9 951->954 952->951 953 7ff6385fcb92-7ff6385fcb96 952->953 953->951 955 7ff6385fcb98-7ff6385fcba1 953->955 954->948 956 7ff6385fcbbb 954->956 955->954 956->946
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 08457a1c6721881f4c11fed91b7cfb17c1058ae71b93dddd692bbf3e619047ea
                                                      • Instruction ID: ff675b73c123ea210254b055830fc892e93e97a8ed67cd20593428604ca31872
                                                      • Opcode Fuzzy Hash: 08457a1c6721881f4c11fed91b7cfb17c1058ae71b93dddd692bbf3e619047ea
                                                      • Instruction Fuzzy Hash: F1C1E423A0CA97D1E6A09B3594402FD3BD1FBA1BA0F554131DA8E87791DE7EEC45E308

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                      • String ID:
                                                      • API String ID: 995526605-0
                                                      • Opcode ID: 0a78fddd52e4a4b47c0abd3b9ff92470e3f80b7b026c685fad37238cb9e723cb
                                                      • Instruction ID: 1b0e486aeb3b88687be180b68cbc2a6284058f71d5ca1c47aa346c94308568dc
                                                      • Opcode Fuzzy Hash: 0a78fddd52e4a4b47c0abd3b9ff92470e3f80b7b026c685fad37238cb9e723cb
                                                      • Instruction Fuzzy Hash: 6B215533A0CA4281EB509F75F8401AAA3A1EF857B0F105235DAADC3BD4DF6EE4549748

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00007FF6385E8860: GetCurrentProcess.KERNEL32 ref: 00007FF6385E8880
                                                        • Part of subcall function 00007FF6385E8860: OpenProcessToken.ADVAPI32 ref: 00007FF6385E8891
                                                        • Part of subcall function 00007FF6385E8860: GetTokenInformation.KERNELBASE ref: 00007FF6385E88B6
                                                        • Part of subcall function 00007FF6385E8860: GetLastError.KERNEL32 ref: 00007FF6385E88C0
                                                        • Part of subcall function 00007FF6385E8860: GetTokenInformation.KERNELBASE ref: 00007FF6385E8900
                                                        • Part of subcall function 00007FF6385E8860: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF6385E891C
                                                        • Part of subcall function 00007FF6385E8860: CloseHandle.KERNEL32 ref: 00007FF6385E8934
                                                      • LocalFree.KERNEL32(00000000,00007FF6385E3B4E), ref: 00007FF6385E8C0C
                                                      • LocalFree.KERNEL32 ref: 00007FF6385E8C15
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                      • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                      • API String ID: 6828938-1817031585
                                                      • Opcode ID: 8ff8ea2c17bd8fbf586603b6c91de9233eb7c00b5d3dcbaf8731662f4bda8ceb
                                                      • Instruction ID: 54e1c8cdb3e6104b352944bfb7b53480abed3c26dfac43cc6a4bdbc5b328f25e
                                                      • Opcode Fuzzy Hash: 8ff8ea2c17bd8fbf586603b6c91de9233eb7c00b5d3dcbaf8731662f4bda8ceb
                                                      • Instruction Fuzzy Hash: B721BA23A0C79681FA90AB30E8042F96260BF49390F841532E94DD3796DF3EF505A788

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,00007FF6385E39CA), ref: 00007FF6385E3F34
                                                        • Part of subcall function 00007FF6385E29C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6385E8AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E29F4
                                                        • Part of subcall function 00007FF6385E29C0: MessageBoxW.USER32 ref: 00007FF6385E2AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastMessageModuleName
                                                      • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                      • API String ID: 2581892565-1977442011
                                                      • Opcode ID: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                                      • Instruction ID: bfbd5dcd03cdb6faf9a927578fd8dd326ea2b69c1f3bcafcafce0499f4b0efc6
                                                      • Opcode Fuzzy Hash: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                                      • Instruction Fuzzy Hash: 4311A263B1C64341FAA09731EC513FA5264AF983D5F402432E84EC679AEE1FF640A70C
                                                      APIs
                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6385FDCFB), ref: 00007FF6385FDE2C
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6385FDCFB), ref: 00007FF6385FDEB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ConsoleErrorLastMode
                                                      • String ID:
                                                      • API String ID: 953036326-0
                                                      • Opcode ID: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                                      • Instruction ID: 633d437cc19ec531ac15ef3fc0a45e5ba1dee7f0d20f2595ce982be62c999bbc
                                                      • Opcode Fuzzy Hash: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                                      • Instruction Fuzzy Hash: 9491BE63E18652C5F7A09F7584406FD3BE4AB61BA8F144139DE0E97B84DF3AE481E708
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _get_daylight$_isindst
                                                      • String ID:
                                                      • API String ID: 4170891091-0
                                                      • Opcode ID: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                                      • Instruction ID: d036ebf9f9d573cfa09cb2193ee4e9286a8cb36b0ca1834e54ae52ce79fe9f74
                                                      • Opcode Fuzzy Hash: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                                      • Instruction Fuzzy Hash: FA514AB3F19A218AFB14CF348941AFC2762AB51358F500135ED1E92BE5DF3EA442A709
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                      • String ID:
                                                      • API String ID: 2780335769-0
                                                      • Opcode ID: bf9e299d8a19087a057b397dc8e4afdf64a098b67ef913149ee4b49067ca2483
                                                      • Instruction ID: aa31adfdfe25c65e0ead3da5cddbd5612e983cb276dabdab172eef325fe3d2df
                                                      • Opcode Fuzzy Hash: bf9e299d8a19087a057b397dc8e4afdf64a098b67ef913149ee4b49067ca2483
                                                      • Instruction Fuzzy Hash: 3E518F23E096418AF750DFB0D8507FD27F1AB54BA8F104535EE098778ADF3AD540A748
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 1279662727-0
                                                      • Opcode ID: 83590a85ef91dfeaaf5391bcb7c84269641a6271a066e8b030d9dbe54c1e2ad9
                                                      • Instruction ID: 7cf56d61fa0f0c8719b8ae8f46ca35be6fb3e6feee49f015512712161f612f75
                                                      • Opcode Fuzzy Hash: 83590a85ef91dfeaaf5391bcb7c84269641a6271a066e8b030d9dbe54c1e2ad9
                                                      • Instruction Fuzzy Hash: A841BF63D1878283E7909F3095503B967A0FBA5364F109334EA9C83BD1DF7EA5E09708
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                      • String ID:
                                                      • API String ID: 3251591375-0
                                                      • Opcode ID: 9d2a249925c3744b7bdec991b642967cea5aa1e4eae3f82ffa02bbb969e0fbb5
                                                      • Instruction ID: 8a5dd5cc978dbe331ea48595a0c6658dfe2bf6e0fd8778778faf97372d24589c
                                                      • Opcode Fuzzy Hash: 9d2a249925c3744b7bdec991b642967cea5aa1e4eae3f82ffa02bbb969e0fbb5
                                                      • Instruction Fuzzy Hash: D5315A63E2C21281FA94AB34A8512F92291AF517A5F442035E90ECB3D3DE6FF805B34D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                                      • Instruction ID: afb6000ef137e7ab8e75fa558139816fc36ffbf8e8c2c3b40ac8ea1c1a61d509
                                                      • Opcode Fuzzy Hash: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                                      • Instruction Fuzzy Hash: DAD09E52F1C71282FA592B7068951F912515F59F55F205438C80B86393CD6EA44EF24E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryMessage
                                                      • String ID: Security descriptor is not initialized!
                                                      • API String ID: 73271072-986317556
                                                      • Opcode ID: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                                      • Instruction ID: 75a075dab5b7dba0dbb3ba510f0a3486ef004d90443b1372f83364c97b2c1cc4
                                                      • Opcode Fuzzy Hash: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                                      • Instruction Fuzzy Hash: 9AE092B3E1CB5682EA509B34EC042E92390BB66364F901374E54CC67E4DF7DD119AB08
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: cf177395047abfa4e851662a110b86e3e3c378c626585af56caf23d5c147307d
                                                      • Instruction ID: bcc2f68af63dd4bcd0462eec7e5c12877b04017693540f0e5c0ee37deffa62fb
                                                      • Opcode Fuzzy Hash: cf177395047abfa4e851662a110b86e3e3c378c626585af56caf23d5c147307d
                                                      • Instruction Fuzzy Hash: 9851F963B09651C6FAA89E3594006FAA6D1BF54BB8F1C8734DE6D877C5CF3ED400A608
                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF6385FB78D,?,?,00000000,00007FF6385FB842), ref: 00007FF6385FB97E
                                                      • GetLastError.KERNEL32(?,?,?,00007FF6385FB78D,?,?,00000000,00007FF6385FB842), ref: 00007FF6385FB988
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseErrorFindLastNotification
                                                      • String ID:
                                                      • API String ID: 1687624791-0
                                                      • Opcode ID: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                                      • Instruction ID: 2587ed7d11aa94d87a7f04a13b8af4f78185d760148975271775fe147ea878d6
                                                      • Opcode Fuzzy Hash: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                                      • Instruction Fuzzy Hash: 9E21A463B0C642C1EED0573195902F922C35F64BB4F184735DA6EC73C2CE6EE448A309
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer
                                                      • String ID:
                                                      • API String ID: 2976181284-0
                                                      • Opcode ID: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                                      • Instruction ID: cc308dc97af01124c4266dc73946ba3bebd10b3704235e9e37ac168e3e9446af
                                                      • Opcode Fuzzy Hash: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                                      • Instruction Fuzzy Hash: E9110162B18A9181DA508B35E4000A9B7A1BB55BF4F684331EE7E8B7E8CF3DD4149708
                                                      APIs
                                                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6385F6101), ref: 00007FF6385F621F
                                                      • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6385F6101), ref: 00007FF6385F6235
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Time$System$FileLocalSpecific
                                                      • String ID:
                                                      • API String ID: 1707611234-0
                                                      • Opcode ID: 94d9743ddc59f1ec6d0c8066f19f46560215df41a9b86dc953b2c7251607b198
                                                      • Instruction ID: 7ac0b7ef6dfabe7a5b38310a05c78527c5e4e8bccf4ba3b7bc930b5591b42189
                                                      • Opcode Fuzzy Hash: 94d9743ddc59f1ec6d0c8066f19f46560215df41a9b86dc953b2c7251607b198
                                                      • Instruction Fuzzy Hash: ED118F6360C61282EF948B64A4111BEB7E0FB95771F500235E69DC1AE8EF2DD044EB04
                                                      APIs
                                                      • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB716
                                                      • GetLastError.KERNEL32(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB720
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                      • String ID:
                                                      • API String ID: 588628887-0
                                                      • Opcode ID: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                                      • Instruction ID: 0710124471f5cec7219d120bd94675d6edbb42141ccf3b65eeade2e113b13b21
                                                      • Opcode Fuzzy Hash: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                                      • Instruction Fuzzy Hash: 25E0C263F0E602C3FF586FF258950F522D15FA8B60F484130C90ECA391DE2EA889B24D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: DirectoryErrorLastRemove
                                                      • String ID:
                                                      • API String ID: 377330604-0
                                                      • Opcode ID: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                                      • Instruction ID: de5ceaf41925dd012f99ed81cfbabba45fa0433e9b7c3520b9624ccef581c1c8
                                                      • Opcode Fuzzy Hash: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                                      • Instruction Fuzzy Hash: EBD01212F1D543C5E69427B50C465F825D02FB5731F900630C02EC13D0EF6EA055750E
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2018770650-0
                                                      • Opcode ID: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                                      • Instruction ID: 701889d2f4fe5697f99f7a7f395d51896f153ff91a6f2fafd8aa9749d1f130de
                                                      • Opcode Fuzzy Hash: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                                      • Instruction Fuzzy Hash: 80D01216F6C503C1E69427B10C850F811D42F65730F610730C12EC13D0DE5EA095750D
                                                      APIs
                                                        • Part of subcall function 00007FF6385E8DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8E1A
                                                      • _findclose.LIBCMT ref: 00007FF6385E81A9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_findclose
                                                      • String ID:
                                                      • API String ID: 2772937645-0
                                                      • Opcode ID: aa2a36deec39c3a11ec2b62d31fe43dc86d3decf01d493f1b5c8a3539a39b282
                                                      • Instruction ID: 6894eae644b1e55a053aad38065ea03f8ad21a318ba0750ea6b3b0589b9f05e6
                                                      • Opcode Fuzzy Hash: aa2a36deec39c3a11ec2b62d31fe43dc86d3decf01d493f1b5c8a3539a39b282
                                                      • Instruction Fuzzy Hash: 5C71BB53E18BC581EA11CB2CC9052FD6360FBA9B5CF54E321DB9C52692EF29E2D9C304
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 1d9ce192a3da46ea8a65def934b56c452277ca90c934615c4cd3a21602e95038
                                                      • Instruction ID: 9fabb4cde07b97004c4d095a578ba33d2c20f0d552a2745e338ed6c7f7586972
                                                      • Opcode Fuzzy Hash: 1d9ce192a3da46ea8a65def934b56c452277ca90c934615c4cd3a21602e95038
                                                      • Instruction Fuzzy Hash: F441B333909251C7EAB4DB35A5401BE77E0EB66761B140231D69EC37D1CF2EE802E655
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _fread_nolock
                                                      • String ID:
                                                      • API String ID: 840049012-0
                                                      • Opcode ID: ff8f7049f38efe52bd7839717f8be0f8b2254237d4257605192cdac3888bd95f
                                                      • Instruction ID: 0c0e4d93e3eb5dde94da8b9ed633ea1f75938bd449c6ca50fbb7f4dc55ed1f5a
                                                      • Opcode Fuzzy Hash: ff8f7049f38efe52bd7839717f8be0f8b2254237d4257605192cdac3888bd95f
                                                      • Instruction Fuzzy Hash: 0F210A23B0969695FA909B326D007FAA681BF45BE5F8C5431DE0D87782DE3EF001D748
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 9d46e4dc1c7706e1baa247f93764384ede75e9bcf433252d370e5f4900f7c3d5
                                                      • Instruction ID: f42c0a5f7bcdc4fe2f47d8a1b87add223df7152f6e32db1e049bbca2b84ccc71
                                                      • Opcode Fuzzy Hash: 9d46e4dc1c7706e1baa247f93764384ede75e9bcf433252d370e5f4900f7c3d5
                                                      • Instruction Fuzzy Hash: 0831A123E19A62C1F7915F3588413F82AD0AF60BB1F410639EA1D873D2CF7EE845A759
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: HandleModule$AddressFreeLibraryProc
                                                      • String ID:
                                                      • API String ID: 3947729631-0
                                                      • Opcode ID: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                                      • Instruction ID: 6baba89c740a621c54eee6e214fdc0772fb1a31fdf832b36a85dcbfb3fd3a903
                                                      • Opcode Fuzzy Hash: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                                      • Instruction Fuzzy Hash: EC21AD32E05A01C9EBA58F74C080AED37B0EB54B2CF240636D61D86BC5DF39E489D785
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                                      • Instruction ID: bb3bbc0cc2096aa6054acb55a5e5dbf0718342d711b8dd27efa50181a9edf779
                                                      • Opcode Fuzzy Hash: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                                      • Instruction Fuzzy Hash: 0E11D823A0E641C1EAE09F3195002F9A3E1FFA5BA0F544031EA8D87B85CF3FD400A749
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                                      • Instruction ID: 6b80898804fc197408db78996f1049ce29afb4ca15a0eaa9ae8149fbeef3d0c8
                                                      • Opcode Fuzzy Hash: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                                      • Instruction Fuzzy Hash: 2A21C573A0CA4186DB618F38E4403B977A1EB95BA4F144234E65D8B7D5DF3FD800AB08
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                                      • Instruction ID: 5ba3712a6644d04d688e3aa934f9bea2996bb014bbd2a3376edc70ec6deff61d
                                                      • Opcode Fuzzy Hash: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                                      • Instruction Fuzzy Hash: C0018223A0874581EA849F6258001A9A6D5AB65FF0F4C4670DE5C9BBDACF3DE1019308
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 429e4ff91632884dbfd59807356ed260fa29108cd8906d3b6e9196ad5ea12367
                                                      • Instruction ID: 9e45dba87809c27b559ce043c93e7e03cd97a9d15e8cdac93a5d865ce55f74cc
                                                      • Opcode Fuzzy Hash: 429e4ff91632884dbfd59807356ed260fa29108cd8906d3b6e9196ad5ea12367
                                                      • Instruction Fuzzy Hash: 6E018022E0E642C0FED06B7159412F966D1AF297F4F080235E91DC67D6CF3EF4616208
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF6385FC196,?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6), ref: 00007FF6385FF99D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                                      • Instruction ID: 757886dbc37c5704147058d15951c0864d59d2c26317e027dc920c230ac435d6
                                                      • Opcode Fuzzy Hash: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                                      • Instruction Fuzzy Hash: D5F0AF43B0A206D2FE99577256503F512D25FA9BA0F4C4030C90EC6BC5DE1EA481A22A
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,?,?,00007FF6385F1514,?,?,?,00007FF6385F2A26,?,?,?,?,?,00007FF6385F4019), ref: 00007FF6385FE3EA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                                      • Instruction ID: fbecaf062382255e087be988942319f9e052447e0bee105710778abcb8a4a26c
                                                      • Opcode Fuzzy Hash: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                                      • Instruction Fuzzy Hash: E8F05E07F5E296C5FEA9567258596F552D04F657B0F080230D92ECA3C1DE5EF440B119
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 5d337e270712d004679ba659ef610f4cb2fc78abe2ab3a8c8a6757f66acf180b
                                                      • Instruction ID: fcece0978dc9b516079802e5fae87a4464ee5c3bd24b764bcb42c8f685cd3c59
                                                      • Opcode Fuzzy Hash: 5d337e270712d004679ba659ef610f4cb2fc78abe2ab3a8c8a6757f66acf180b
                                                      • Instruction Fuzzy Hash: 2AE0EC62E09606C2FED47EB045C25F925A14F78360F804030DA1A8A383DD1E6864BA2A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: DirectoryErrorLastRemove
                                                      • String ID:
                                                      • API String ID: 377330604-0
                                                      • Opcode ID: b081b867af62e1502bd09a952f28b23a6342cded27452249318bab44c8c263ba
                                                      • Instruction ID: 2a010fcaa4f779959ee1d4f36bd40ec59627ade685c48ae1870b11b4103a8f0d
                                                      • Opcode Fuzzy Hash: b081b867af62e1502bd09a952f28b23a6342cded27452249318bab44c8c263ba
                                                      • Instruction Fuzzy Hash: 7D419317D1C68681E7919B3499012FD6360FBA5754F40B632DF8D822A3EF29B6DCD344
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                      • API String ID: 190572456-4266016200
                                                      • Opcode ID: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                                      • Instruction ID: 5ef0a4fd4e41fa7600f9853f76509277646780ceab821e3b5c569b57477cbb38
                                                      • Opcode Fuzzy Hash: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                                      • Instruction Fuzzy Hash: 2512ECA790DB2391FA55CF34AC901F423A5AF06355B846631D80E863A6EF7FB548B30C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 808467561-2761157908
                                                      • Opcode ID: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                                      • Instruction ID: 0bd214a358c62d2c1bddc63bb7aca0e8ff15f6d0dea07353b70db592887de821
                                                      • Opcode Fuzzy Hash: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                                      • Instruction Fuzzy Hash: E5B2E5F3A1C2A28BE7258E74D4547FD37A1FB45388F505135DA0AA7B84DF39A900EB48
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00007FF6385E2A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E8797
                                                      • FormatMessageW.KERNEL32 ref: 00007FF6385E87C6
                                                      • WideCharToMultiByte.KERNEL32 ref: 00007FF6385E881C
                                                        • Part of subcall function 00007FF6385E29C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6385E8AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E29F4
                                                        • Part of subcall function 00007FF6385E29C0: MessageBoxW.USER32 ref: 00007FF6385E2AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                      • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                      • API String ID: 2920928814-2573406579
                                                      • Opcode ID: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                                      • Instruction ID: 97aab62a27325e49151d9e9a4d802c884c4a7d76eed0332311bcf7dfa33c9a99
                                                      • Opcode Fuzzy Hash: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                                      • Instruction Fuzzy Hash: E4217173A0CA5282FBA49B30EC442E96365FF89354F841135E54DC27A5EF3EE145B708
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 3140674995-0
                                                      • Opcode ID: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                                      • Instruction ID: 20575d879fcfadfea1900c197d185df2242ff2a8a987947a8c03fb92fd424fa3
                                                      • Opcode Fuzzy Hash: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                                      • Instruction Fuzzy Hash: 9D316E73619B818AEB609F60E8403ED3360FB85758F04403ADA4D97B95EF3DD648D718
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 1239891234-0
                                                      • Opcode ID: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                                      • Instruction ID: 68ea6971a60aede13584f306b164113fe8712bb4a1004760233edc339e6ac637
                                                      • Opcode Fuzzy Hash: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                                      • Instruction Fuzzy Hash: D1316037618B8185E760CF34E8402EE73A4FB897A8F540135EA8D83B95EF3DD5459B04
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2227656907-0
                                                      • Opcode ID: b3715d4618dde4abce6a703dfc2b0a62f6c41887aa9418885becb382e3094c85
                                                      • Instruction ID: 6253a000d349c356773e9c2e03e6270c3ac1a5fa3cdeb71256697223ea16aee2
                                                      • Opcode Fuzzy Hash: b3715d4618dde4abce6a703dfc2b0a62f6c41887aa9418885becb382e3094c85
                                                      • Instruction Fuzzy Hash: 29B1D5A7B1C6A681EA629B7294101F96391EF45BE4F444132EA4E87BC9DF3DE441F30C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                                      • Instruction ID: a8054768dbc6ca186eabd8e3e4f0dab211f29d46a5b9883df13cd9a60a692a2b
                                                      • Opcode Fuzzy Hash: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                                      • Instruction Fuzzy Hash: 97114822B18B118AEB00CB70E8552A833A4FB1AB58F041E31DA6D82BA4DF3DD554A344
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: memcpy_s
                                                      • String ID:
                                                      • API String ID: 1502251526-0
                                                      • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                      • Instruction ID: 7acda8a4323334cd341cf7ae9b54ec1b2a5dc8de0805890746a299b3cd5dc7ad
                                                      • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                      • Instruction Fuzzy Hash: A6C106B3B1C29587D734CF2AA0446AAB791F785788F448134DB4A83784DF3EE941EB48
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise_clrfp
                                                      • String ID:
                                                      • API String ID: 15204871-0
                                                      • Opcode ID: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                                      • Instruction ID: b9064bbeff7a515de5cfae6cc712bcf0f27cef186a265df8f8f33b41cc3393f5
                                                      • Opcode Fuzzy Hash: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                                      • Instruction Fuzzy Hash: B4B1AFB3618B998BE715CF39C8423AC37A0F745B88F258921DA5D837A4CF3AD455E708
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $
                                                      • API String ID: 0-227171996
                                                      • Opcode ID: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                                      • Instruction ID: ea8a585a47a4b8c738cd1b7beb3e86c3dad6e587054f5fd517795bed7ca84331
                                                      • Opcode Fuzzy Hash: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                                      • Instruction Fuzzy Hash: C4E1B537A0C642C2EBA88E3580541BD33E0FF65B6AF145135CA4E87794DF2BEA51E748
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: e+000$gfff
                                                      • API String ID: 0-3030954782
                                                      • Opcode ID: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                                      • Instruction ID: 29f3eca9aa58e3d0d01b4d33e3da2444526713bb45d2920de873673c8895865a
                                                      • Opcode Fuzzy Hash: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                                      • Instruction Fuzzy Hash: D4517863B182C1C6EBA08E35A8017A97BD1E765BA4F488235CB9CCBBC5CF3ED4449704
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: gfffffff
                                                      • API String ID: 0-1523873471
                                                      • Opcode ID: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                                      • Instruction ID: 2cd1ff1e16ea706de4e373b01f1862a5f162c3373ae0145562433e623e4f7553
                                                      • Opcode Fuzzy Hash: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                                      • Instruction Fuzzy Hash: D8A14563A08786C6EFA1CF35A4007EA7BD1AB61BA4F048031DE8D8B795DE3EE501D705
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID: TMP
                                                      • API String ID: 3215553584-3125297090
                                                      • Opcode ID: 227a240b370b15b1266a0cc9d4416acc6519c25bf7b5095cb295345a6af5b08f
                                                      • Instruction ID: 5891d3ef6661b97689b2617dc29dd35e8138c76c9991b0769427d0ffda97c591
                                                      • Opcode Fuzzy Hash: 227a240b370b15b1266a0cc9d4416acc6519c25bf7b5095cb295345a6af5b08f
                                                      • Instruction Fuzzy Hash: E751D413B08756C1FA94AB3659011FA62D66FA5BE4F084035DE0EC77C6EF3EE456620C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                                      • Instruction ID: 75d85e7c838288d8eb116356a25a94da26c90780f3ef8680b2721f0c5227a7d9
                                                      • Opcode Fuzzy Hash: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                                      • Instruction Fuzzy Hash: EDB09221E0BA16C6EA082B316C8229422A47F89711FD440B8C00E81320DE2E20A9B709
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                                      • Instruction ID: 49dc9a3be09bc69a50472e4e2fef056c69668cab54d09762c8a7cb78c8c31a20
                                                      • Opcode Fuzzy Hash: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                                      • Instruction Fuzzy Hash: 73D1A023A0C642C6EBA88B3585406BD27E4BF65B69F144235CE0D87795DF3FEA41E348
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                                      • Instruction ID: 8010ce5fdca11773686c8f9698b5659f2457035e4d966d56db2072ef6361a146
                                                      • Opcode Fuzzy Hash: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                                      • Instruction Fuzzy Hash: A6C184732141E14BD2C9EB29E8695BA77A1F78934DBC4503AEBCB47B8AC63CA114D710
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                                      • Instruction ID: 8175a3e0c94da263692291fae30fde6b3dedb4fb4c25c95c8e650235cfd0d828
                                                      • Opcode Fuzzy Hash: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                                      • Instruction Fuzzy Hash: 94B16A73A09685C5F7A48F39C0502EC7BE0E7A9B68F644139CA4E87395DF2AD841E748
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                                      • Instruction ID: c5646dd8689421cad5ea704186feb259c8b917f0e6a1ed80336a508e38f90c38
                                                      • Opcode Fuzzy Hash: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                                      • Instruction Fuzzy Hash: DC81D173A0C28186E7A4CF29A0443AA7AD1FBA57A4F004235DA8DC3F99CE3ED4009B04
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3215553584-0
                                                      • Opcode ID: 9914cb7746023329a97bf4181aa287deee78f55ee5d35b62d6e15dbc326fdfe6
                                                      • Instruction ID: 784cc7d1f2ce697408517d40410e2be8427ce980218f45a3df2928c63f00e135
                                                      • Opcode Fuzzy Hash: 9914cb7746023329a97bf4181aa287deee78f55ee5d35b62d6e15dbc326fdfe6
                                                      • Instruction Fuzzy Hash: 8D61FBA3E1D2A246FB648A3C84546F96681AF923B0F140635D71EC77D1EE6FE800B70C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                                      • Instruction ID: c583fd8818183130313a1d694b7feb0e9edc14c2a9c4a47cddd20179d719acbf
                                                      • Opcode Fuzzy Hash: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                                      • Instruction Fuzzy Hash: 0A5142B7A18A51C6E7A48F39C0442A937E0EB64B78F245131CE8D97794CF7BE842E744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                                      • Instruction ID: 41761a14bc7787cfe99930cd26c52e28bbb3de2d00f92c6871e342af0c0ab52b
                                                      • Opcode Fuzzy Hash: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                                      • Instruction Fuzzy Hash: 43515DB7A18651C2EBA48B39D0442A837E1EB65B68F244131CE4D977D8CF3BE842E744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                                      • Instruction ID: 84d26842e9028490f1ea91b6553782b7fe71acea44648c460459522cc2cdff0b
                                                      • Opcode Fuzzy Hash: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                                      • Instruction Fuzzy Hash: 9C5160B7A19A51C6E7A48B39C0402A837E1EB64B78F244131CE4D977A4CF3BE847D744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                                      • Instruction ID: d8004496a0a36ac0e5f375d9fa7a4546a3eabf58a64fb661cff867fd6d38f0c4
                                                      • Opcode Fuzzy Hash: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                                      • Instruction Fuzzy Hash: 4C51A6B7A18651C5E7A48B39C0546B837E0EBA4B69F244131CE4C9B794CF3BE843E744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                                      • Instruction ID: dc23ae112e25b3a46656c6919b06ff17ea27fd9ab127e7d78d713149aec659b3
                                                      • Opcode Fuzzy Hash: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                                      • Instruction Fuzzy Hash: 4C5184B7A18655C5E7B48B39C1402B837E1EB64F68F244131CA8C97799CF3BE882E744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                                      • Instruction ID: 2c9a594027e1195aef215cfdd924d739cabe8e5b729730aaf22b0b96e61f4065
                                                      • Opcode Fuzzy Hash: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                                      • Instruction Fuzzy Hash: C75191B7A18A51C5E7A48B39C4406B837E1EB64BA8F244131DE4C97798CF3BE843D748
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                      • Instruction ID: 616531f7f976dcc40020a57bd8715a53788bcd139de2131ed2e50863990fa6d8
                                                      • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                      • Instruction Fuzzy Hash: 2341A693C0F65AC4E9D5893845006F42BC0AF327B0D5852B8DD9AD73C7ED0FA58BE209
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                      • String ID:
                                                      • API String ID: 588628887-0
                                                      • Opcode ID: f111dc0bb75c4fd458f0a84966b8cb0fe478d08570652a426d7f95957c6d4c4f
                                                      • Instruction ID: 7a57831c0c2f9fe0259c4524f816c057a41b1c8a77abe5cd32738900a2a99727
                                                      • Opcode Fuzzy Hash: f111dc0bb75c4fd458f0a84966b8cb0fe478d08570652a426d7f95957c6d4c4f
                                                      • Instruction Fuzzy Hash: C5412273714A5582EF48CF3AD9241A9B3A1BB58FD4B18A032EE0DD7B59DE3ED0429304
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 543d9937c4504bcf76314e5cfa4014ffdc16ce7a2adb90035c1ed44de59b08ad
                                                      • Instruction ID: 7f9d4b995af2c162dcc9d26f6158fc8b0c90a193413a92e141a6f963fd134e6d
                                                      • Opcode Fuzzy Hash: 543d9937c4504bcf76314e5cfa4014ffdc16ce7a2adb90035c1ed44de59b08ad
                                                      • Instruction Fuzzy Hash: 9231C333B1CB4282E7649F3568401BE76D5AF85BE0F144238EA5D97BD5DF3DD011A608
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                                      • Instruction ID: b3daed927b5c33cf94073a0118af6a404f73d8068eae0819406947e8e4bf1d46
                                                      • Opcode Fuzzy Hash: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                                      • Instruction Fuzzy Hash: 9EF06872B192658ADB988F39A80266977D0F7093C0F508579D58DC7B04DA3D9071AF08
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                                      • Instruction ID: 63006c192ee662a8aac0b04ae0d67cd1d7e031617f2fdf43d0e4d55e2140e30a
                                                      • Opcode Fuzzy Hash: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                                      • Instruction Fuzzy Hash: C2A001A295C852D4E6A48B20A8510A02221AB52319B411072D02E916A09E3EA841A308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                      • API String ID: 190572456-2208601799
                                                      • Opcode ID: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                                      • Instruction ID: af1cbe36383470a223b0b3059543393e9143479197c7d470bc70ca4e5fa91b73
                                                      • Opcode Fuzzy Hash: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                                      • Instruction Fuzzy Hash: F1E1C8A6E1DB2391FE99CB24B8801F823A5AF06791F946475D80D86395EF7EB144B30C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message_fread_nolock
                                                      • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                      • API String ID: 3065259568-2316137593
                                                      • Opcode ID: 6515b2cfd5f676f602b6d26fc9e0d82733edfbb4b02d3f5c084f722c90793e63
                                                      • Instruction ID: 66fa856924e0e15b59256d05c0458bf9cee0420ad4687f0c1c1704923ad9c21b
                                                      • Opcode Fuzzy Hash: 6515b2cfd5f676f602b6d26fc9e0d82733edfbb4b02d3f5c084f722c90793e63
                                                      • Instruction Fuzzy Hash: F451C763B4968385FAA09731A8502FA6394EF457E4F405031EE4DC7B86EE7EF505B308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                      • String ID: P%
                                                      • API String ID: 2147705588-2959514604
                                                      • Opcode ID: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                                      • Instruction ID: 329af1886a156d10bf8d849dfa1d548b57cc8f85cc068d01e6297a3826da3577
                                                      • Opcode Fuzzy Hash: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                                      • Instruction Fuzzy Hash: 0D510276618BA186D6289F32A4181FAB7A1FB98B65F004121EBCF83784DF3DD045EB14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID: -$:$f$p$p
                                                      • API String ID: 3215553584-2013873522
                                                      • Opcode ID: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                                      • Instruction ID: 2094662995e235c3b1a420ab1e811177489941ecb66cbf7d516bb944911a808e
                                                      • Opcode Fuzzy Hash: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                                      • Instruction Fuzzy Hash: 9112A523E0C183C6FBA49A34D0446F976E6FB60764F948135E689877C4DF3EE484AB18
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID: f$f$p$p$f
                                                      • API String ID: 3215553584-1325933183
                                                      • Opcode ID: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                                      • Instruction ID: d1e3ad11f3bf1c21180d3857e279f372c999dc7aa77d64b9be07109fb581ff3b
                                                      • Opcode Fuzzy Hash: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                                      • Instruction Fuzzy Hash: B812A663E4C183C6FBA59A35D0542F97AE2FBA0760F844135D69AC67C4DF3EE440AB18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                      • API String ID: 2030045667-3659356012
                                                      • Opcode ID: 8c28f480e69de69819ddb3148d11db88dcb2336ffa2465eb483aedbeae2631a3
                                                      • Instruction ID: 110b0849799fbc3503b8cfa0721b79bca77ae1aa15804eebeeacfffe84cf44cb
                                                      • Opcode Fuzzy Hash: 8c28f480e69de69819ddb3148d11db88dcb2336ffa2465eb483aedbeae2631a3
                                                      • Instruction Fuzzy Hash: 31319463B4C65286EA619B32A8001FAA390EF047E4F885431DE4D87B95EE3EF505A30C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 849930591-393685449
                                                      • Opcode ID: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                                      • Instruction ID: 2cf6f7dc2e3ca279c57c7d64aef0370448b85dea72739b01e543b1992dcc8ce3
                                                      • Opcode Fuzzy Hash: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                                      • Instruction Fuzzy Hash: 79D19D33A08B4286EBA08F3498802ED37A0FB557A8F102175EA8DD7B95DF39F591D704
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E8A47
                                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E8A9E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide
                                                      • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                      • API String ID: 626452242-27947307
                                                      • Opcode ID: 400f0bdcbd62a4a5536486c2f7426be13d95d078f8c38135e0fc09a91e7db9c0
                                                      • Instruction ID: dafb2002505f877ca7b70eb54cc35c009cf190e0f5330263ab7fcc0fc6e52f3f
                                                      • Opcode Fuzzy Hash: 400f0bdcbd62a4a5536486c2f7426be13d95d078f8c38135e0fc09a91e7db9c0
                                                      • Instruction Fuzzy Hash: AB41B33360CB5682E660CF21B8401EAB6A5FB847A0F545535DE8D87B94DF3DE445E708
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(?,00007FF6385E39CA), ref: 00007FF6385E8F31
                                                        • Part of subcall function 00007FF6385E29C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6385E8AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E29F4
                                                        • Part of subcall function 00007FF6385E29C0: MessageBoxW.USER32 ref: 00007FF6385E2AD0
                                                      • WideCharToMultiByte.KERNEL32(?,00007FF6385E39CA), ref: 00007FF6385E8FA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLastMessage
                                                      • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                      • API String ID: 3723044601-27947307
                                                      • Opcode ID: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                                      • Instruction ID: 91ddf44cdf009ad1905919009ae399d72f1e3017fe867fce60907bf333d8ba73
                                                      • Opcode Fuzzy Hash: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                                      • Instruction Fuzzy Hash: E5219A62B0CB5685EB508F32AC400F9B2A2EB84BA0F585535DA5DC3794EF3DF541A348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                      • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                      • API String ID: 3231891352-3501660386
                                                      • Opcode ID: 2be27f9cd969ff962ba60c53aa7374ee1e35d43e53d67819a9def324665be43e
                                                      • Instruction ID: 01a9a141817a05cc8d456daa8d730a0b15b0069dee77cb355fa1eea5552e51ec
                                                      • Opcode Fuzzy Hash: 2be27f9cd969ff962ba60c53aa7374ee1e35d43e53d67819a9def324665be43e
                                                      • Instruction Fuzzy Hash: FF519163E0D65381FA90AB35AD502F962969F95BE0F482131E94DC77D6EE2EF500B30C
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6385EE67A,?,?,?,00007FF6385ED5AC,?,?,?,00007FF6385ED1A1), ref: 00007FF6385EE44D
                                                      • GetLastError.KERNEL32(?,?,?,00007FF6385EE67A,?,?,?,00007FF6385ED5AC,?,?,?,00007FF6385ED1A1), ref: 00007FF6385EE45B
                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6385EE67A,?,?,?,00007FF6385ED5AC,?,?,?,00007FF6385ED1A1), ref: 00007FF6385EE485
                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF6385EE67A,?,?,?,00007FF6385ED5AC,?,?,?,00007FF6385ED1A1), ref: 00007FF6385EE4F3
                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF6385EE67A,?,?,?,00007FF6385ED5AC,?,?,?,00007FF6385ED1A1), ref: 00007FF6385EE4FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                      • String ID: api-ms-
                                                      • API String ID: 2559590344-2084034818
                                                      • Opcode ID: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                                      • Instruction ID: 812b030f73f3d6ced968207cec874f578b7734849e2161c06406ba8bc442bf79
                                                      • Opcode Fuzzy Hash: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                                      • Instruction Fuzzy Hash: EA31D06BB6AA5290EE919B66A8005F523D4BF44BB0F491535DD1D86B90EE3EF480A308
                                                      APIs
                                                        • Part of subcall function 00007FF6385E8DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8E1A
                                                      • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF6385E7BB1,00000000,?,00000000,00000000,?,00007FF6385E153F), ref: 00007FF6385E768F
                                                        • Part of subcall function 00007FF6385E2B10: MessageBoxW.USER32 ref: 00007FF6385E2BE5
                                                      Strings
                                                      • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF6385E76A3
                                                      • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF6385E7666
                                                      • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF6385E76EA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                      • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                      • API String ID: 1662231829-3498232454
                                                      • Opcode ID: 9bfcf0b62ea921097bc7abb589b6718567d9e6fafddd2668cb98e057143b44d0
                                                      • Instruction ID: b5e63240254bdfe0ee53be1e7897d06ec222cef6c27a4fbb1e6e7fdea295f37d
                                                      • Opcode Fuzzy Hash: 9bfcf0b62ea921097bc7abb589b6718567d9e6fafddd2668cb98e057143b44d0
                                                      • Instruction Fuzzy Hash: 1631C753B2D75280FAA0AB35ED513FA5291AF997D0F841431DA4EC37C6EE2EF504A708
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8E1A
                                                        • Part of subcall function 00007FF6385E29C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6385E8AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E29F4
                                                        • Part of subcall function 00007FF6385E29C0: MessageBoxW.USER32 ref: 00007FF6385E2AD0
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8EA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLastMessage
                                                      • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                      • API String ID: 3723044601-876015163
                                                      • Opcode ID: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                                      • Instruction ID: 133e20ae35183174ab690bec7ad0a1297c5c071a8c8102f162c816ffa8a6f4bf
                                                      • Opcode Fuzzy Hash: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                                      • Instruction Fuzzy Hash: B7218563B0CA5281EB50CB35F8410E9A3A1FB897D4F584531DB4CC3B69EE3EE5419708
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Value$ErrorLast
                                                      • String ID:
                                                      • API String ID: 2506987500-0
                                                      • Opcode ID: bfba03ac5ae09ad9fbcc276f7ce213313610dc176689fe84f9eb047eddb4be0f
                                                      • Instruction ID: 381ef2f41546801480c3546eedf5da2c3d2441a3f299da4d38f42d1e2229e959
                                                      • Opcode Fuzzy Hash: bfba03ac5ae09ad9fbcc276f7ce213313610dc176689fe84f9eb047eddb4be0f
                                                      • Instruction Fuzzy Hash: 60216D32B0C202C2FA98633196561F972E24F647B0F244634E86EC7BC6DE2EA440670A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                      • String ID: CONOUT$
                                                      • API String ID: 3230265001-3130406586
                                                      • Opcode ID: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                                      • Instruction ID: 730976f4234db808693160508e976f259b36d14c06dd83073d685eed65a7b88e
                                                      • Opcode Fuzzy Hash: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                                      • Instruction Fuzzy Hash: 7E119062B1CA6186E3508B22E8443A962A4FB89FE4F104234EE1EC7795CF3ED544E74C
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC087
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC0BD
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC0EA
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC0FB
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC10C
                                                      • SetLastError.KERNEL32(?,?,?,00007FF6385F5CBD,?,?,?,?,00007FF6385FF9AF,?,?,00000000,00007FF6385FC196,?,?,?), ref: 00007FF6385FC127
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Value$ErrorLast
                                                      • String ID:
                                                      • API String ID: 2506987500-0
                                                      • Opcode ID: c0a004ea3dc260b1b19508bfa023ca7aaafe15f5c3081b93ddc037c8cc4a548c
                                                      • Instruction ID: 5ddab13905bdb9005fef240f399245f54d9feeb1659d12a88874aea850661250
                                                      • Opcode Fuzzy Hash: c0a004ea3dc260b1b19508bfa023ca7aaafe15f5c3081b93ddc037c8cc4a548c
                                                      • Instruction Fuzzy Hash: 42115422A0C262C3FA94973196551FD62E69F657F0F244734E82EC7BD6DE2EA8417308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                      • String ID: Unhandled exception in script
                                                      • API String ID: 3081866767-2699770090
                                                      • Opcode ID: 035139a28c932b525dc7cac8fcdac5569ee169202821a797d5d04823a4addf63
                                                      • Instruction ID: 7c8f21d08b56c8b63dfea13975ce04b7889c80030c54afd3dde0310f9f8b98b5
                                                      • Opcode Fuzzy Hash: 035139a28c932b525dc7cac8fcdac5569ee169202821a797d5d04823a4addf63
                                                      • Instruction Fuzzy Hash: A9317E73A09A8285EB60DF31E8541F963A0FF89794F440135EA4D87B99DF3DD104D708
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6385E8AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E29F4
                                                        • Part of subcall function 00007FF6385E8770: GetLastError.KERNEL32(00000000,00007FF6385E2A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF6385E101D), ref: 00007FF6385E8797
                                                        • Part of subcall function 00007FF6385E8770: FormatMessageW.KERNEL32 ref: 00007FF6385E87C6
                                                        • Part of subcall function 00007FF6385E8DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8E1A
                                                      • MessageBoxW.USER32 ref: 00007FF6385E2AD0
                                                      • MessageBoxA.USER32 ref: 00007FF6385E2AEC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                      • String ID: %s%s: %s$Fatal error detected
                                                      • API String ID: 2806210788-2410924014
                                                      • Opcode ID: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                                      • Instruction ID: 3f76410dd996cd66c0cee7f0f5ded73a040993342e2b2062b9789e07f8d17efb
                                                      • Opcode Fuzzy Hash: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                                      • Instruction Fuzzy Hash: E031A27362CA8281E670DB20E8412EA6364FF847C4F405136E68D82B99DF3DE605EB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                                      • Instruction ID: fd3eb28e227b2677d9340fd8d0db5dd7e41a58967a38b5d2313c4ef9964e3c56
                                                      • Opcode Fuzzy Hash: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                                      • Instruction Fuzzy Hash: 29F0C263B0DA0281FB148B34E4443B92360BF8AB65F540635D66E853E4DF2ED049F308
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _set_statfp
                                                      • String ID:
                                                      • API String ID: 1156100317-0
                                                      • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                      • Instruction ID: 3b9f0046322756e6ad900f4f4a72177709f531c572a9b4d5cf87d9e129256155
                                                      • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                      • Instruction Fuzzy Hash: DC1130ABE1CA2301F6541174EC4A3F925436F673F2E344A35E56ECE7D68E6E6848710C
                                                      APIs
                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FC15F
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FC17E
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FC1A6
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FC1B7
                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6385FB35B,?,?,00000000,00007FF6385FB5F6,?,?,?,?,?,00007FF6385F38BC), ref: 00007FF6385FC1C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: b1bd102f14ef160237d88092488be8f7d710cf93cdfd52ce3a466472a24625ff
                                                      • Instruction ID: 5d0ea5ee74e69456dacb3d6c9ef25ca4a848c09859d8b1b696c6fdea4534bd13
                                                      • Opcode Fuzzy Hash: b1bd102f14ef160237d88092488be8f7d710cf93cdfd52ce3a466472a24625ff
                                                      • Instruction Fuzzy Hash: B5117F32B0C612C2FAD89331A9415F962D25F653F0F244334E83EC6BC6DE2EB811A308
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: e9bb77e276a59ebbfc727978b4b2f571bf1e0609d8f34a2fe370ed2cea8cc4b2
                                                      • Instruction ID: 69e7c97c470c5e699f8fb5600099b3d9ffc42a0d5d607448f6977cd72ca077ce
                                                      • Opcode Fuzzy Hash: e9bb77e276a59ebbfc727978b4b2f571bf1e0609d8f34a2fe370ed2cea8cc4b2
                                                      • Instruction Fuzzy Hash: 1411DA22A49217C2F9D8623554561FD22D54F653B4F280734D93ECA7D7DD2EB8027209
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID: verbose
                                                      • API String ID: 3215553584-579935070
                                                      • Opcode ID: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                                      • Instruction ID: efa7c2652a9c5ff0d6df230d8c1ac8443f69a9ceace28f35457d8ba164b16f4c
                                                      • Opcode Fuzzy Hash: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                                      • Instruction Fuzzy Hash: 9991D133A0AA46C1F7A09E35D8503BD3BD1EB60B64F448232DA8D873C5DE3EE405A309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo
                                                      • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                      • API String ID: 3215553584-1196891531
                                                      • Opcode ID: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                                      • Instruction ID: b5d22cb515414aa3fe0bf4fd825a6a978b1cd53620bf7d0a950b9c46ef2ac183
                                                      • Opcode Fuzzy Hash: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                                      • Instruction Fuzzy Hash: D9814FB7E0CA6285E6655E3981503F837A1AB12B48F558035CA0DD7395DF3FA901B70F
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 2395640692-1018135373
                                                      • Opcode ID: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                                      • Instruction ID: aa4da455d8db6f6710fd73f1b79f73c4885f7674492b288ff4b302022c6dd129
                                                      • Opcode Fuzzy Hash: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                                      • Instruction Fuzzy Hash: 8151A433B196028ADB98CB29E8446FD7391EB44BA8F149131DA5E87784EF7EF841D704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CallEncodePointerTranslator
                                                      • String ID: MOC$RCC
                                                      • API String ID: 3544855599-2084237596
                                                      • Opcode ID: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                                      • Instruction ID: 7e034c2859fa803887563207f5705a71d9092d55ca70c489dae7d11da6b779cf
                                                      • Opcode Fuzzy Hash: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                                      • Instruction Fuzzy Hash: 7561A433908B8582E7B09B25E8407E9B7A0FB847E4F045225EB8D87B55DF7DE191CB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                      • String ID: csm$csm
                                                      • API String ID: 3896166516-3733052814
                                                      • Opcode ID: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                                      • Instruction ID: 24bb15aa1e28d41c9627d638cfe83e4b70a953b18e12fd0476c2ffbb0141ccbd
                                                      • Opcode Fuzzy Hash: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                                      • Instruction Fuzzy Hash: 9151713390828287EBA48B3599442E87B90FB54BE8F1461B6DA8DC7BC5CF3DF4519709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message$ByteCharMultiWide
                                                      • String ID: %s%s: %s$Fatal error detected
                                                      • API String ID: 1878133881-2410924014
                                                      • Opcode ID: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                                      • Instruction ID: 0458ad9643a7ada442c7f6dc370b6b8c3de38c671fa9666ae12afb4828ca5579
                                                      • Opcode Fuzzy Hash: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                                      • Instruction Fuzzy Hash: 4431B67362CA8281E670DB20E4412EAA3A4FF847C4F405036E78D87B99DF3DE605DB48
                                                      APIs
                                                        • Part of subcall function 00007FF6385E8DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6385E2A9B), ref: 00007FF6385E8E1A
                                                      • CreateFileW.KERNEL32(00000000,?,?,00007FF6385E3FB9,?,00007FF6385E39CA), ref: 00007FF6385E43A8
                                                      • GetFinalPathNameByHandleW.KERNEL32(?,?,00007FF6385E3FB9,?,00007FF6385E39CA), ref: 00007FF6385E43C8
                                                      • CloseHandle.KERNEL32(?,?,00007FF6385E3FB9,?,00007FF6385E39CA), ref: 00007FF6385E43D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Handle$ByteCharCloseCreateFileFinalMultiNamePathWide
                                                      • String ID: \\?\
                                                      • API String ID: 2226452419-4282027825
                                                      • Opcode ID: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                                      • Instruction ID: 4e744b830bd7b69b575dfe5ed110059adfc9966cc23424d0cc29b39164ed980e
                                                      • Opcode Fuzzy Hash: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                                      • Instruction Fuzzy Hash: F021A063B08A5146E7609B31F8543E96251EB897A4F441231DF4E83B95DE3EE548DB08
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                      • String ID:
                                                      • API String ID: 2718003287-0
                                                      • Opcode ID: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                                      • Instruction ID: 5df2b3007740e1c68498f28d6d16c49ea48449a0f1936686cfad2702e1ce07d4
                                                      • Opcode Fuzzy Hash: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                                      • Instruction Fuzzy Hash: 8ED1FE73B09A8189E750CF79C4402EC37A6FB657A8B044235DE5E9BB99DE39E40AD304
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$DialogInvalidateRect
                                                      • String ID:
                                                      • API String ID: 1956198572-0
                                                      • Opcode ID: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                                      • Instruction ID: 9959d07efb784652cbb0c4ce607e4603c2d5a26ed0ce05b8781f01958de950d9
                                                      • Opcode Fuzzy Hash: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                                      • Instruction Fuzzy Hash: 5A11E962E1C15242F7989779F9442FD1252EB89BD0F449030EA4986BDDCD2EE8C17708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: _get_daylight$_invalid_parameter_noinfo
                                                      • String ID: ?
                                                      • API String ID: 1286766494-1684325040
                                                      • Opcode ID: 8b6f824ce68226522039b5681d667a4258c25c0b371a8f4ef00d3752ae492e10
                                                      • Instruction ID: 562f971911ee070af73540b186ac5347fceeeaaf0d8de252c2823bafe5bf47e7
                                                      • Opcode Fuzzy Hash: 8b6f824ce68226522039b5681d667a4258c25c0b371a8f4ef00d3752ae492e10
                                                      • Instruction Fuzzy Hash: F5414BB3A0C36282FB619B3594013FA6690EB817A4F104235EE5D86BD9DF3ED451E70C
                                                      APIs
                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6385F9DFA
                                                        • Part of subcall function 00007FF6385FB700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB716
                                                        • Part of subcall function 00007FF6385FB700: GetLastError.KERNEL32(?,?,?,00007FF638603B72,?,?,?,00007FF638603BAF,?,?,00000000,00007FF638604075,?,?,00000000,00007FF638603FA7), ref: 00007FF6385FB720
                                                      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6385EC335), ref: 00007FF6385F9E18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                      • String ID: C:\Users\user\Desktop\4.7.exe
                                                      • API String ID: 2553983749-1563713416
                                                      • Opcode ID: 2dc50b8d6a573f30b306f0085b97da4955317f93722b68647fdb996873f18b46
                                                      • Instruction ID: 0a2956fab4ccfcba2867b9660c3a8939e53e5890972895ed15c772c3af1ebce6
                                                      • Opcode Fuzzy Hash: 2dc50b8d6a573f30b306f0085b97da4955317f93722b68647fdb996873f18b46
                                                      • Instruction Fuzzy Hash: 81419C33A08B12C6EB959F31A4800FC37D5EB557E4B544036EA0E87B85CF3EE481A348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID: U
                                                      • API String ID: 442123175-4171548499
                                                      • Opcode ID: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                                      • Instruction ID: 8cc334a3afaa5ca73e9dfcf6a7a22fe22db83dc4a93d4c82a6610e21ff45c2ff
                                                      • Opcode Fuzzy Hash: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                                      • Instruction Fuzzy Hash: 8B41AE73A18A4286DB608F25E8443EA67A1FB98794F404031EE8DC7798EF3DD541EB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory
                                                      • String ID: :
                                                      • API String ID: 1611563598-336475711
                                                      • Opcode ID: 31d491d52d461351267de4742896314f9207a416e16019cf89ca7f2196efcd07
                                                      • Instruction ID: 22eb8a0dc45b841cd5f55cd983300a7477dbd3c55c6bf2c180abcc6f3fd49129
                                                      • Opcode Fuzzy Hash: 31d491d52d461351267de4742896314f9207a416e16019cf89ca7f2196efcd07
                                                      • Instruction Fuzzy Hash: 9321D563A0CA91C1EB208B31D4442AD73B2FB85B44F558035DA8D83784DF7EE945E749
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message$ByteCharMultiWide
                                                      • String ID: Fatal error detected
                                                      • API String ID: 1878133881-4025702859
                                                      • Opcode ID: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                                      • Instruction ID: 57629650070b79f37ee3ef4faf75756f769604f05d6fa8f07da1979780d0fbf2
                                                      • Opcode Fuzzy Hash: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                                      • Instruction Fuzzy Hash: 2B21887362C68191E760DB20E8516DA7354FF94784F805135E68D87B99DF3DD205DB08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: Message$ByteCharMultiWide
                                                      • String ID: Error detected
                                                      • API String ID: 1878133881-3513342764
                                                      • Opcode ID: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                                      • Instruction ID: c802a6c4debe3210cc4d3be07fa3067fecd2e056fc8ffdaa167e3de9cfddda17
                                                      • Opcode Fuzzy Hash: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                                      • Instruction Fuzzy Hash: 7E21A673628A8181E760DB20F8516EAA364FF94788F801136E68D87B59DF3DD205DB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFileHeaderRaise
                                                      • String ID: csm
                                                      • API String ID: 2573137834-1018135373
                                                      • Opcode ID: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                                      • Instruction ID: 6d5cc08325d353707fc2a5fc4aff2a9973de346d036f716c0e8367ad58448ea3
                                                      • Opcode Fuzzy Hash: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                                      • Instruction Fuzzy Hash: 76115B73608B8182EB60CF25F4002A977E1FB98B98F584230DA8D47B68DF3DC551DB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1785335747.00007FF6385E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6385E0000, based on PE: true
                                                      • Associated: 00000000.00000002.1785301166.00007FF6385E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785365641.00007FF63860C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF63861F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785390510.00007FF638621000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1785434479.00007FF638623000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6385e0000_4.jbxd
                                                      Similarity
                                                      • API ID: DriveType_invalid_parameter_noinfo
                                                      • String ID: :
                                                      • API String ID: 2595371189-336475711
                                                      • Opcode ID: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                                      • Instruction ID: 3f415b03d6fef9a4bc2d648be82e278113196d6dcc8b286b5bd1d24ecd928e25
                                                      • Opcode Fuzzy Hash: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                                      • Instruction Fuzzy Hash: EF01D4A391C61286F7629F7094622FE23E0EF55748F800435D58ECA785DE2DE504F61C

                                                      Execution Graph

                                                      Execution Coverage:3.7%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:3.8%
                                                      Total number of Nodes:895
                                                      Total number of Limit Nodes:77
                                                      execution_graph 31057 7ffdfb11a8c0 31058 7ffdfb11a8d6 31057->31058 31060 7ffdfb11a914 31058->31060 31061 7ffdfb186050 31058->31061 31062 7ffdfb186078 31061->31062 31063 7ffdfb18609c 31061->31063 31062->31063 31064 7ffdfb186094 31062->31064 31065 7ffdfb18609e 31062->31065 31063->31060 31068 7ffdfb0cf4d0 31064->31068 31075 7ffdfb0cd260 ShowWindow 31065->31075 31069 7ffdfb0cf4fd 31068->31069 31072 7ffdfb0cf50a 31069->31072 31077 7ffdfb0cd9b0 31069->31077 31071 7ffdfb0cf513 31071->31063 31072->31071 31073 7ffdfb0cf573 ShowWindow 31072->31073 31073->31071 31076 7ffdfb0cd2b1 31075->31076 31076->31063 31078 7ffdfb0cd9db 31077->31078 31079 7ffdfb0cda55 GetModuleHandleW 31078->31079 31080 7ffdfb0cda64 31078->31080 31085 7ffdfb0cdb2d 31078->31085 31079->31080 31081 7ffdfb0cda9a LoadIconW 31080->31081 31082 7ffdfb0cda8b GetModuleHandleW 31080->31082 31086 7ffdfb0cdab1 31080->31086 31084 7ffdfb0cdb0b LoadCursorW RegisterClassW 31081->31084 31082->31081 31083 7ffdfb0cdb76 31083->31072 31084->31085 31085->31072 31086->31083 31086->31084 31087 7ffdfad0c2c0 31088 7ffdfaca12ee 31087->31088 31089 7ffdfad0c2d7 EVP_PKEY_CTX_new_id 31088->31089 31090 7ffdfad0c327 31089->31090 31095 7ffdfad0c5a2 31089->31095 31091 7ffdfad0c3a4 EVP_MD_size 31090->31091 31092 7ffdfad0c338 31090->31092 31100 7ffdfad0c3ca 31091->31100 31093 7ffdfad0c349 31092->31093 31094 7ffdfad0c37a ERR_put_error EVP_PKEY_CTX_free 31092->31094 31096 7ffdfad0c36d EVP_PKEY_CTX_free 31093->31096 31094->31095 31096->31095 31097 7ffdfad0c5f0 EVP_PKEY_CTX_free 31098 7ffdfad0c602 31097->31098 31098->31095 31099 7ffdfad0c639 ERR_put_error 31098->31099 31099->31095 31100->31097 31101 7ffdfad0c4a4 EVP_PKEY_derive_init 31100->31101 31102 7ffdfad0c4b4 EVP_PKEY_CTX_ctrl 31101->31102 31103 7ffdfad0c58a EVP_PKEY_CTX_free 31101->31103 31102->31103 31104 7ffdfad0c4e0 EVP_PKEY_CTX_ctrl 31102->31104 31103->31095 31105 7ffdfad0c5cf ERR_put_error 31103->31105 31104->31103 31106 7ffdfad0c508 EVP_PKEY_CTX_ctrl 31104->31106 31105->31095 31106->31103 31107 7ffdfad0c532 EVP_PKEY_CTX_ctrl 31106->31107 31107->31103 31108 7ffdfad0c562 EVP_PKEY_derive 31107->31108 31108->31103 31109 7ffdfad0c57b EVP_PKEY_CTX_free 31108->31109 31109->31095 31110 7ffdfad0bea0 31111 7ffdfaca12ee 31110->31111 31112 7ffdfad0beb2 EVP_PKEY_CTX_new_id 31111->31112 31113 7ffdfad0bf24 EVP_MD_size 31112->31113 31114 7ffdfad0bef4 31112->31114 31115 7ffdfad0bf6a 31113->31115 31116 7ffdfad0bf30 31113->31116 31117 7ffdfad0bfb4 EVP_MD_CTX_new 31115->31117 31118 7ffdfad0c058 EVP_PKEY_derive_init 31115->31118 31121 7ffdfad0bf5b EVP_PKEY_CTX_free 31116->31121 31122 7ffdfad0c174 31117->31122 31123 7ffdfad0bfc5 EVP_DigestInit_ex 31117->31123 31119 7ffdfad0c124 31118->31119 31120 7ffdfad0c068 EVP_PKEY_CTX_ctrl 31118->31120 31127 7ffdfad0c14f EVP_PKEY_CTX_free 31119->31127 31120->31119 31124 7ffdfad0c096 EVP_PKEY_CTX_ctrl 31120->31124 31121->31114 31129 7ffdfad0c19f EVP_MD_CTX_free 31122->31129 31123->31122 31125 7ffdfad0bfdb EVP_DigestFinal_ex 31123->31125 31124->31119 31126 7ffdfad0c0c0 EVP_PKEY_CTX_ctrl 31124->31126 31125->31122 31128 7ffdfad0bff6 EVP_MD_CTX_free 31125->31128 31126->31119 31130 7ffdfad0c0e7 EVP_PKEY_CTX_ctrl 31126->31130 31127->31114 31131 7ffdfad0c161 OPENSSL_cleanse 31127->31131 31132 7ffdfad0c046 31128->31132 31133 7ffdfad0c1a7 EVP_PKEY_CTX_free 31129->31133 31130->31119 31134 7ffdfad0c10e EVP_PKEY_derive 31130->31134 31131->31114 31132->31133 31135 7ffdfad0c04e 31132->31135 31133->31114 31134->31119 31134->31127 31135->31118 31136 7ffdfb0e3576 31139 7ffdfb0e3610 31136->31139 31138 7ffdfb0e35a1 31140 7ffdfb0e363d 31139->31140 31141 7ffdfb0e3645 GetSystemMetrics 31140->31141 31142 7ffdfb0e3654 31140->31142 31141->31142 31146 7ffdfb0e3676 31142->31146 31147 7ffdfb107a80 31142->31147 31144 7ffdfb0e394a 31144->31146 31153 7ffdfb0e4060 31144->31153 31146->31138 31148 7ffdfb107abb 31147->31148 31151 7ffdfb107ac0 31147->31151 31149 7ffdfb107a80 3 API calls 31148->31149 31149->31151 31152 7ffdfb107c0d 31151->31152 31157 7ffdfb14bc70 31151->31157 31152->31144 31156 7ffdfb0e40b6 31153->31156 31154 7ffdfb0e482c 31154->31146 31156->31154 31168 7ffdfb0e48a0 31156->31168 31158 7ffdfb14bca9 31157->31158 31159 7ffdfb14bcc2 strchr 31158->31159 31164 7ffdfb14cb20 31158->31164 31162 7ffdfb14bce4 31159->31162 31161 7ffdfb14be1a strncpy 31163 7ffdfb14be39 31161->31163 31162->31161 31162->31163 31163->31151 31166 7ffdfb14cb5b 31164->31166 31165 7ffdfb14ce45 memcpy 31167 7ffdfb14ce6e 31165->31167 31166->31165 31166->31167 31167->31159 31169 7ffdfb0e490a 31168->31169 31171 7ffdfb0e49b3 31169->31171 31174 7ffdfb0e14c0 31169->31174 31172 7ffdfb0e4b5a 31171->31172 31173 7ffdfb0e4cbf DeleteObject 31171->31173 31172->31154 31173->31172 31175 7ffdfb0e1516 31174->31175 31176 7ffdfb0e1729 31175->31176 31178 7ffdfb0e157a 31175->31178 31179 7ffdfb0e1592 31175->31179 31176->31178 31181 7ffdfb0b4780 31176->31181 31178->31171 31179->31178 31180 7ffdfb0b4780 23 API calls 31179->31180 31180->31178 31183 7ffdfb0b47bc 31181->31183 31182 7ffdfb0b48ec 31182->31178 31183->31182 31185 7ffdfb0bf590 31183->31185 31201 7ffdfb0beaf0 31185->31201 31187 7ffdfb0bf5d1 SetROP2 CreateCompatibleDC 31188 7ffdfb0bf61e 31187->31188 31191 7ffdfb0bf728 CreateDIBitmap 31187->31191 31189 7ffdfb0bf62a CreateBitmap 31188->31189 31200 7ffdfb0bf64f CreateBitmap 31188->31200 31190 7ffdfb0bf709 SetTextColor SetBkColor 31189->31190 31193 7ffdfb0bf7ee 8 API calls 31190->31193 31191->31193 31195 7ffdfb0bf8cc 31193->31195 31196 7ffdfb0bf8bd ReleaseDC 31193->31196 31198 7ffdfb0bf8da 31195->31198 31199 7ffdfb0bf8d1 DeleteDC 31195->31199 31196->31198 31198->31182 31199->31198 31200->31190 31202 7ffdfb0beb1a GetDC 31201->31202 31203 7ffdfb0beb52 31201->31203 31205 7ffdfb0beb30 SelectPalette RealizePalette GetBkMode 31202->31205 31204 7ffdfb0beb74 CreateCompatibleDC SelectObject 31203->31204 31203->31205 31204->31205 31205->31187 31207 7ffdfb185060 31209 7ffdfb18508f 31207->31209 31208 7ffdfb18510d 31215 7ffdfb1850f5 31209->31215 31222 7ffdfb12dbd0 isupper 31209->31222 31211 7ffdfb1850dd 31223 7ffdfb12dbd0 isupper 31211->31223 31213 7ffdfb1850e9 31224 7ffdfb12dbd0 isupper 31213->31224 31215->31208 31218 7ffdfb0db2b0 31215->31218 31217 7ffdfb1851e4 31220 7ffdfb0db2d8 31218->31220 31219 7ffdfb0db72f memset 31221 7ffdfb0db755 31219->31221 31220->31219 31222->31211 31223->31213 31224->31215 31225 7ffdfb187b20 31227 7ffdfb187b30 31225->31227 31226 7ffdfb187c8f 31227->31226 31229 7ffdfb198570 31227->31229 31235 7ffdfb1985aa 31229->31235 31230 7ffdfb198a75 GetModuleHandleW 31231 7ffdfb198a87 LoadIconW LoadIconW LoadCursorW RegisterClassExW 31230->31231 31232 7ffdfb198b5c CreateWindowExW SetWindowLongPtrW ShowWindow UpdateWindow 31231->31232 31233 7ffdfb198bce 31231->31233 31232->31233 31237 7ffdfb1891f0 31233->31237 31235->31230 31235->31231 31236 7ffdfb198c22 31236->31226 31239 7ffdfb189214 31237->31239 31238 7ffdfb189240 31238->31236 31239->31238 31240 7ffdfb189339 CreateBitmap CreatePatternBrush 31239->31240 31241 7ffdfb189388 31240->31241 31241->31236 31242 7ffdfb0c1470 31243 7ffdfb0c1490 SendMessageW SendMessageW SendMessageW 31242->31243 31246 7ffdfb0c1516 31242->31246 31244 7ffdfb0c1509 31243->31244 31244->31246 31245 7ffdfb0c15b8 31246->31245 31247 7ffdfb0ced74 GetFocus 31246->31247 31248 7ffdfb0ced99 GetForegroundWindow 31247->31248 31249 7ffdfb0ceda4 IsWindow 31247->31249 31248->31249 31251 7ffdfb0cedeb 31249->31251 31252 7ffdfb0cf13f SetWindowLongPtrW 31249->31252 31251->31252 31253 7ffdfb0cf17c SetParent 31252->31253 31254 7ffdfb0cf167 SetWindowLongPtrW 31252->31254 31255 7ffdfb0cf26c 31253->31255 31256 7ffdfb0cf192 SendMessageW SendMessageW 31253->31256 31254->31253 31258 7ffdfb0cf2f1 31255->31258 31259 7ffdfb0cf27f SendMessageW 31255->31259 31256->31255 31257 7ffdfb0cf1d0 GetDesktopWindow 31256->31257 31257->31255 31260 7ffdfb0cf1df SetWindowLongPtrW 31257->31260 31261 7ffdfb0cf322 31258->31261 31262 7ffdfb0cf2ff SetWindowPos 31258->31262 31259->31258 31263 7ffdfb0cf299 SendMessageW 31259->31263 31264 7ffdfb0cf258 SetMenu DestroyWindow 31260->31264 31273 7ffdfb0cf1f9 31260->31273 31285 7ffdfb0cf600 31261->31285 31262->31261 31267 7ffdfb0cf2cf 31263->31267 31264->31255 31266 7ffdfb0cf32c 31268 7ffdfb0cf339 SendMessageW 31266->31268 31269 7ffdfb0cf34e 31266->31269 31270 7ffdfb0cf2d7 SendMessageW 31267->31270 31268->31269 31271 7ffdfb0cf35b SendMessageW 31269->31271 31272 7ffdfb0cf371 31269->31272 31270->31258 31271->31272 31274 7ffdfb0cf3e9 31272->31274 31275 7ffdfb0cf37d SendMessageW 31272->31275 31273->31264 31278 7ffdfb0cf22f SetParent 31273->31278 31276 7ffdfb0cf3f5 SetMenu 31274->31276 31283 7ffdfb0cf40d 31274->31283 31281 7ffdfb0cf39d 31275->31281 31276->31283 31277 7ffdfb0cd260 ShowWindow 31277->31274 31278->31273 31280 7ffdfb0cf462 SetActiveWindow 31282 7ffdfb0cf49e 31280->31282 31281->31277 31283->31280 31284 7ffdfb0cf600 ShowWindow 31283->31284 31284->31283 31286 7ffdfb0cf617 31285->31286 31289 7ffdfb0cf625 31285->31289 31286->31266 31287 7ffdfb0cf654 ShowWindow 31288 7ffdfb0cf665 31287->31288 31288->31266 31289->31287 31289->31288 31290 7ffdfb0b8390 31291 7ffdfb0b83c0 31290->31291 31292 7ffdfb0b855a DefWindowProcW 31291->31292 31293 7ffdfb0b8553 31291->31293 31292->31293 31294 7ffdfacb83f0 31295 7ffdfacb8406 31294->31295 31296 7ffdfacb8431 EVP_PKEY_CTX_new EVP_PKEY_derive_init 31295->31296 31297 7ffdfacb85f5 31295->31297 31298 7ffdfacb8453 EVP_PKEY_derive_set_peer 31296->31298 31305 7ffdfacb849f 31296->31305 31299 7ffdfacb8466 EVP_PKEY_derive 31298->31299 31298->31305 31300 7ffdfacb847d CRYPTO_malloc 31299->31300 31299->31305 31301 7ffdfacb84b0 EVP_PKEY_derive 31300->31301 31300->31305 31304 7ffdfacb84d1 31301->31304 31301->31305 31302 7ffdfacb85bf CRYPTO_clear_free EVP_PKEY_CTX_free 31304->31305 31306 7ffdfaca1c08 9 API calls 31304->31306 31305->31302 31306->31305 31307 7ffdfacf7b50 31309 7ffdfacf7b68 31307->31309 31308 7ffdfacf7c76 31309->31308 31311 7ffdfaca1b4a 31309->31311 31311->31309 31316 7ffdfacac410 31311->31316 31312 7ffdfacac4ef 31312->31309 31314 7ffdfacac8f5 memcpy 31314->31316 31315 7ffdfacacaa0 memcpy 31315->31316 31316->31312 31316->31314 31316->31315 31317 7ffdfacac8bf 31316->31317 31319 7ffdfacacb9e 31316->31319 31321 7ffdfaca195b 31316->31321 31318 7ffdfacac8ce BIO_clear_flags BIO_set_flags 31317->31318 31318->31312 31320 7ffdfacacbe0 BIO_snprintf ERR_add_error_data 31319->31320 31320->31312 31321->31316 31325 7ffdfacb0120 31321->31325 31322 7ffdfacb0535 EVP_CIPHER_CTX_cipher EVP_CIPHER_flags 31324 7ffdfacb0627 31322->31324 31322->31325 31323 7ffdfacb071b EVP_MD_CTX_md EVP_MD_size 31327 7ffdfacb0731 31323->31327 31340 7ffdfacb0294 31323->31340 31324->31323 31331 7ffdfacb079e 31324->31331 31324->31340 31325->31322 31325->31324 31326 7ffdfacb0d72 31325->31326 31325->31340 31328 7ffdfacb0d7f strncmp 31326->31328 31326->31340 31327->31331 31333 7ffdfacb077e CRYPTO_memcmp 31327->31333 31327->31340 31330 7ffdfacb0da0 strncmp 31328->31330 31328->31340 31329 7ffdfacb08d1 EVP_MD_CTX_md 31332 7ffdfacb08e6 EVP_MD_CTX_md EVP_MD_size 31329->31332 31329->31340 31334 7ffdfacb0dc0 strncmp 31330->31334 31330->31340 31331->31329 31331->31340 31339 7ffdfacb0903 31332->31339 31333->31327 31333->31340 31335 7ffdfacb0ddb strncmp 31334->31335 31334->31340 31336 7ffdfacb0df3 strncmp 31335->31336 31335->31340 31336->31340 31337 7ffdfacb093a EVP_CIPHER_CTX_cipher EVP_CIPHER_flags 31338 7ffdfacb0966 EVP_CIPHER_CTX_cipher EVP_CIPHER_flags 31337->31338 31337->31339 31338->31339 31339->31337 31339->31338 31339->31340 31341 7ffdfacb09e0 CRYPTO_memcmp 31339->31341 31340->31316 31341->31339 31342 7ffdfb0d602f 31345 7ffdfb0d53c0 31342->31345 31344 7ffdfb0d6037 31346 7ffdfb0d5401 31345->31346 31347 7ffdfb0d540a GetWindowLongPtrW 31346->31347 31348 7ffdfb0d5422 IsWindowVisible 31346->31348 31347->31348 31354 7ffdfb0d552d 31347->31354 31349 7ffdfb0d5443 GetWindowPlacement 31348->31349 31352 7ffdfb0d543f 31348->31352 31349->31352 31350 7ffdfb0d549e 31351 7ffdfb0d54c0 GetClientRect MoveWindow 31350->31351 31350->31354 31351->31354 31352->31350 31353 7ffdfb0cd260 ShowWindow 31352->31353 31353->31350 31354->31344 31355 7ffdfb0e35d0 31356 7ffdfb0e3610 28 API calls 31355->31356 31357 7ffdfb0e35e1 31356->31357 31358 7ffdfacd9790 31360 7ffdfacd97b4 31358->31360 31359 7ffdfacd98b7 31360->31359 31362 7ffdfaca209a 31360->31362 31362->31360 31363 7ffdfacde290 31362->31363 31364 7ffdfacde2d5 31363->31364 31365 7ffdfacde336 31363->31365 31366 7ffdfacde41c 31363->31366 31364->31360 31367 7ffdfacde342 31365->31367 31373 7ffdfacde3d7 EVP_PKEY_free 31365->31373 31366->31367 31368 7ffdfacde4d5 EVP_PKEY_new 31366->31368 31367->31360 31369 7ffdfacde4e6 EVP_PKEY_copy_parameters 31368->31369 31371 7ffdfacde50e 31368->31371 31370 7ffdfacde4f9 EVP_PKEY_set1_tls_encodedpoint 31369->31370 31369->31371 31370->31371 31371->31367 31372 7ffdfacde538 EVP_PKEY_free 31371->31372 31372->31367 31373->31360 31374 7ffdfb0d5e10 31375 7ffdfb0d5e53 31374->31375 31376 7ffdfb0d5ef7 GetWindowLongPtrW 31375->31376 31377 7ffdfb0d625a 31375->31377 31379 7ffdfb0d6168 31375->31379 31376->31375 31378 7ffdfb0d62a2 31377->31378 31381 7ffdfb0d6271 SetFocus 31377->31381 31378->31379 31380 7ffdfb0d62d1 DefWindowProcW 31378->31380 31380->31379 31381->31379 31382 7ffdfb0d5d50 31384 7ffdfb0d5d61 31382->31384 31386 7ffdfb0d5d6b 31382->31386 31383 7ffdfb0d7606 31384->31383 31388 7ffdfb0d7461 31384->31388 31389 7ffdfb0d73e7 31384->31389 31393 7ffdfb0d73fd 31384->31393 31385 7ffdfb0d5de2 31386->31385 31387 7ffdfb0d5d9a SendMessageW 31386->31387 31387->31385 31388->31383 31391 7ffdfb0d747c 31388->31391 31388->31393 31389->31383 31392 7ffdfb0d743b 31389->31392 31389->31393 31390 7ffdfb0d7422 DefWindowProcW 31390->31383 31394 7ffdfb0d7489 ImmGetContext 31391->31394 31395 7ffdfb0d75ed DefWindowProcW 31391->31395 31397 7ffdfb0d7445 DefWindowProcW 31392->31397 31393->31383 31393->31390 31394->31395 31396 7ffdfb0d749b ImmGetCompositionStringW 31394->31396 31395->31383 31398 7ffdfb0d74b9 ImmGetCompositionStringW 31396->31398 31399 7ffdfb0d75dc ImmReleaseContext 31396->31399 31397->31383 31401 7ffdfb0d74ed 31398->31401 31399->31383 31405 7ffdfb0cbb70 11 API calls 31401->31405 31403 7ffdfb0d7566 GetTickCount 31404 7ffdfb0d7580 31403->31404 31404->31399 31405->31403 31406 7ffdfb11894d 31410 7ffdfb118960 31406->31410 31407 7ffdfb118997 strncmp 31407->31410 31408 7ffdfb1189da strncmp 31408->31410 31409 7ffdfb118a1c strncmp 31409->31410 31410->31407 31410->31408 31410->31409 31411 7ffdfb118a5b strncmp 31410->31411 31412 7ffdfb118a94 strncmp 31410->31412 31413 7ffdfb118ace 31410->31413 31411->31410 31412->31410 31414 7ffdfb14bc70 3 API calls 31413->31414 31415 7ffdfb118bca 31413->31415 31425 7ffdfb118e62 31413->31425 31414->31415 31416 7ffdfb118c15 31415->31416 31417 7ffdfb14bc70 3 API calls 31415->31417 31418 7ffdfb118c5a 31416->31418 31419 7ffdfb14bc70 3 API calls 31416->31419 31416->31425 31417->31416 31420 7ffdfb14bc70 3 API calls 31418->31420 31421 7ffdfb118c78 31418->31421 31419->31418 31420->31421 31422 7ffdfb118d91 memset 31421->31422 31421->31425 31423 7ffdfb118ddd 31422->31423 31424 7ffdfb107a80 3 API calls 31423->31424 31424->31425 31426 7ffdfb108009 31428 7ffdfb10800d 31426->31428 31429 7ffdfb107fcc 31428->31429 31430 7ffdfb114200 31428->31430 31433 7ffdfb11423f 31430->31433 31432 7ffdfb114454 31437 7ffdfb114290 31432->31437 31465 7ffdfb117b60 strchr isspace 31432->31465 31433->31432 31434 7ffdfb114437 GetStockObject 31433->31434 31433->31437 31438 7ffdfb11439b 31433->31438 31454 7ffdfb0c3ae0 31434->31454 31437->31429 31438->31437 31439 7ffdfb0c2340 31438->31439 31440 7ffdfb0c2378 GetDC 31439->31440 31441 7ffdfb0c2374 31439->31441 31442 7ffdfb0c2395 31440->31442 31443 7ffdfb0c24bb ReleaseDC 31440->31443 31441->31440 31466 7ffdfb0c52f0 31442->31466 31445 7ffdfb0c24dc 31443->31445 31446 7ffdfb0c254a 31445->31446 31471 7ffdfb0c3da0 31445->31471 31450 7ffdfb0c3ae0 20 API calls 31446->31450 31448 7ffdfb0c23e2 _stricmp 31452 7ffdfb0c23a0 31448->31452 31449 7ffdfb0c23a5 31449->31443 31451 7ffdfb0c2578 31450->31451 31451->31437 31452->31443 31452->31448 31452->31449 31453 7ffdfb0c5200 _stricmp _stricmp _stricmp EnumFontFamiliesW 31452->31453 31453->31452 31455 7ffdfb0c3b20 GetDC SelectObject GetTextMetricsW GetTextFaceW 31454->31455 31457 7ffdfb0c3b7c 31455->31457 31482 7ffdfb0c3f80 31457->31482 31459 7ffdfb0c3d35 GetCharWidthW 31461 7ffdfb0c3d43 SelectObject ReleaseDC 31459->31461 31460 7ffdfb0c3d3d GetCharWidthA 31460->31461 31464 7ffdfb0c3d7d 31461->31464 31462 7ffdfb0c3cc6 31462->31459 31462->31460 31464->31432 31465->31438 31476 7ffdfb0c5200 _stricmp 31466->31476 31468 7ffdfb0c5305 31469 7ffdfb0c5309 31468->31469 31470 7ffdfb0c5200 4 API calls 31468->31470 31469->31452 31470->31468 31472 7ffdfb0c3f35 31471->31472 31475 7ffdfb0c3dc0 31471->31475 31472->31446 31473 7ffdfb0c3de0 DeleteObject 31474 7ffdfb0c3dfc DeleteObject 31473->31474 31473->31475 31474->31475 31475->31472 31475->31473 31477 7ffdfb0c523d _stricmp 31476->31477 31479 7ffdfb0c52bd 31476->31479 31478 7ffdfb0c5251 _stricmp 31477->31478 31477->31479 31478->31479 31480 7ffdfb0c5265 EnumFontFamiliesW 31478->31480 31479->31468 31480->31479 31483 7ffdfb0c3fca SelectObject GetTextFaceW 31482->31483 31484 7ffdfb0c4004 31483->31484 31485 7ffdfb0c4056 SelectObject 31484->31485 31486 7ffdfb0c406d 31485->31486 31487 7ffdfb0c4091 memset 31486->31487 31489 7ffdfb0c40db 31486->31489 31490 7ffdfb0c5380 SelectObject 31487->31490 31489->31462 31491 7ffdfb0c53fa GetFontData 31490->31491 31492 7ffdfb0c53f2 31490->31492 31493 7ffdfb0c570a GetTextCharset 31491->31493 31500 7ffdfb0c5436 31491->31500 31492->31491 31494 7ffdfb0c5749 SelectObject 31493->31494 31497 7ffdfb0c5708 31493->31497 31495 7ffdfb0c5778 31494->31495 31495->31489 31496 7ffdfb0c5473 GetFontData 31496->31500 31497->31494 31498 7ffdfb0c553d GetFontData 31498->31500 31499 7ffdfb0c55d9 GetFontData GetFontData 31499->31500 31500->31494 31500->31496 31500->31497 31500->31498 31500->31499 31501 7ffdfb187e70 GetWindowLongPtrW 31505 7ffdfb187eb2 31501->31505 31506 7ffdfb187ef6 31501->31506 31502 7ffdfb18802f DefWindowProcW 31503 7ffdfb18804f 31502->31503 31504 7ffdfb187f50 GetSysColor 31504->31506 31505->31502 31506->31504 31506->31505 31507 7ffdfacc7140 31508 7ffdfacc7150 31507->31508 31509 7ffdfacc7160 ERR_put_error 31508->31509 31510 7ffdfacc718c 31508->31510 31511 7ffdfacc7208 31510->31511 31512 7ffdfacc71c6 ASYNC_get_current_job 31510->31512 31514 7ffdfacc720e 31510->31514 31516 7ffdfaca146a 31511->31516 31512->31511 31513 7ffdfacc71d0 31512->31513 31516->31514 31517 7ffdface6220 31516->31517 31518 7ffdface6a5a ERR_clear_error SetLastError 31517->31518 31530 7ffdface6dd9 31517->31530 31520 7ffdface6a73 31518->31520 31519 7ffdface6ac1 31523 7ffdface6d46 31519->31523 31526 7ffdface6b72 31519->31526 31528 7ffdface6dc9 BUF_MEM_free 31519->31528 31536 7ffdface6520 31519->31536 31543 7ffdface6ff0 31519->31543 31520->31519 31520->31530 31532 7ffdface6c09 31520->31532 31533 7ffdface6bea BUF_MEM_grow 31520->31533 31534 7ffdface6b4a ERR_put_error 31520->31534 31524 7ffdface6d51 ERR_put_error 31523->31524 31527 7ffdface6da4 ERR_put_error 31523->31527 31529 7ffdface6d79 31524->31529 31526->31528 31527->31526 31528->31530 31529->31527 31530->31514 31531 7ffdface6c1c ERR_put_error 31531->31526 31532->31519 31532->31531 31533->31532 31533->31534 31534->31526 31539 7ffdface653a 31536->31539 31537 7ffdface67c5 ERR_put_error 31540 7ffdface67e1 31537->31540 31538 7ffdface67bf 31538->31537 31538->31540 31539->31538 31539->31540 31541 7ffdface688c ERR_put_error 31539->31541 31542 7ffdface66b3 BUF_MEM_grow_clean 31539->31542 31540->31519 31541->31540 31542->31538 31542->31539 31546 7ffdface700c 31543->31546 31544 7ffdface7367 ERR_put_error 31545 7ffdface729a 31544->31545 31545->31519 31546->31544 31546->31545 31547 7ffdfb0c2020 31548 7ffdfb0c205d 31547->31548 31549 7ffdfb0c2061 memset SystemParametersInfoW 31547->31549 31548->31549 31550 7ffdfb0c2097 CreateFontIndirectW 31549->31550 31551 7ffdfb0c21d3 SystemParametersInfoW 31549->31551 31576 7ffdfb0c1f50 31550->31576 31552 7ffdfb0c2220 6 API calls 31551->31552 31553 7ffdfb0c21f2 CreateFontIndirectW 31551->31553 31557 7ffdfb0c1f50 22 API calls 31552->31557 31555 7ffdfb0c1f50 22 API calls 31553->31555 31558 7ffdfb0c2214 DeleteObject 31555->31558 31556 7ffdfb0c20bc DeleteObject CreateFontIndirectW 31559 7ffdfb0c1f50 22 API calls 31556->31559 31560 7ffdfb0c22d0 DeleteObject 31557->31560 31558->31552 31561 7ffdfb0c20ea DeleteObject CreateFontIndirectW 31559->31561 31562 7ffdfb0c2315 31560->31562 31563 7ffdfb0c22e3 31560->31563 31564 7ffdfb0c1f50 22 API calls 31561->31564 31563->31562 31565 7ffdfb0c22f0 GetStockObject 31563->31565 31566 7ffdfb0c2118 DeleteObject CreateFontIndirectW 31564->31566 31567 7ffdfb0c1f50 22 API calls 31565->31567 31568 7ffdfb0c1f50 22 API calls 31566->31568 31567->31563 31569 7ffdfb0c2146 DeleteObject CreateFontIndirectW 31568->31569 31570 7ffdfb0c1f50 22 API calls 31569->31570 31571 7ffdfb0c2174 DeleteObject CreateFontIndirectW 31570->31571 31572 7ffdfb0c1f50 22 API calls 31571->31572 31573 7ffdfb0c219f DeleteObject CreateFontIndirectW 31572->31573 31574 7ffdfb0c1f50 22 API calls 31573->31574 31575 7ffdfb0c21ca DeleteObject 31574->31575 31575->31551 31577 7ffdfb0c1f95 31576->31577 31578 7ffdfb0c3ae0 20 API calls 31577->31578 31579 7ffdfb0c1fdc 31578->31579 31580 7ffdfb0c3da0 2 API calls 31579->31580 31581 7ffdfb0c1ffb 31580->31581 31581->31556 31582 655c64c0 PySys_GetObject 31583 655c64ef PyTuple_GetItem 31582->31583 31584 655c6b26 31582->31584 31583->31584 31585 655c6506 PyLong_AsLong PyTuple_GetItem 31583->31585 31585->31584 31586 655c652b PyLong_AsLong PySys_GetObject 31585->31586 31587 655c6546 PyLong_AsVoidPtr 31586->31587 31588 655c6552 GetProcAddress 31586->31588 31587->31588 31589 655c71f9 PyErr_Format 31588->31589 31590 655c6579 GetProcAddress 31588->31590 31589->31584 31590->31589 31591 655c6599 GetProcAddress 31590->31591 31591->31589 31593 655c65b9 PyModule_Create2 31591->31593 31593->31584 31594 655c65e5 PyModule_GetName 31593->31594 31594->31584 31595 655c65fa strrchr 31594->31595 31596 655c664e 31595->31596 31597 655c6617 malloc 31595->31597 31599 655c666d 31596->31599 31602 655c6d50 31596->31602 31597->31596 31598 655c6631 memcpy 31597->31598 31598->31596 31601 655c6682 PyBytes_FromStringAndSize 31599->31601 31609 655c7225 31599->31609 31600 655c74f7 exit 31603 655c6b20 31601->31603 31604 655c66a0 PyBytes_AsString 31601->31604 31602->31600 31608 655c6d8c PyErr_Format 31602->31608 31611 655c697b 31602->31611 31603->31584 31605 655c6b56 _Py_Dealloc 31603->31605 31606 655c66b9 malloc 31604->31606 31607 655c6b40 31604->31607 31605->31584 31606->31607 31612 655c66d0 PyCMethod_New 31606->31612 31607->31603 31616 655c6b4a _Py_Dealloc 31607->31616 31619 655c6dc0 31608->31619 31609->31600 31610 655c733d 31609->31610 31620 655c7261 PyErr_Format 31609->31620 31742 655c1660 8 API calls 31610->31742 31611->31610 31622 655c71d4 31611->31622 31626 655c74bd 31611->31626 31679 655c6996 31611->31679 31614 655c6718 PyCMethod_New 31612->31614 31615 655c6b61 31612->31615 31614->31615 31623 655c675e PyCMethod_New 31614->31623 31617 655c6b6f 31615->31617 31618 655c6ca0 _Py_Dealloc 31615->31618 31616->31584 31616->31605 31617->31607 31618->31611 31619->31603 31631 655c6ddb PyBytes_AsStringAndSize 31619->31631 31628 655c728b 31620->31628 31621 655c69bb 31701 655df800 31621->31701 31623->31615 31624 655c67a4 PyBytes_FromStringAndSize 31623->31624 31624->31603 31627 655c67d5 PyBytes_AsString 31624->31627 31749 655c1660 8 API calls 31626->31749 31630 655d3bc0 31627->31630 31632 655c729c 31628->31632 31633 655c73f2 31628->31633 31636 655c68b3 _time64 srand 31630->31636 31631->31603 31649 655c6df7 31631->31649 31632->31600 31650 655c72af 31632->31650 31744 655c8050 PyErr_Format exit _Py_Dealloc 31633->31744 31634 655c748e 31748 655c1660 8 API calls 31634->31748 31635 655c6a0e 31639 655c7458 31635->31639 31640 655c6b75 malloc 31635->31640 31644 655c6a58 strstr 31635->31644 31645 655c6ab3 31635->31645 31736 655dd5a0 __iob_func abort 31636->31736 31747 655c1660 8 API calls 31639->31747 31647 655c74a9 _errno 31640->31647 31659 655c6b90 31640->31659 31643 655c6e52 31643->31633 31654 655c6e79 memcpy 31643->31654 31644->31645 31651 655c6a74 31644->31651 31645->31600 31645->31639 31657 655c6adb 31645->31657 31653 655c73db 31647->31653 31648 655c6e35 31741 655c8050 PyErr_Format exit _Py_Dealloc 31648->31741 31649->31643 31649->31648 31655 655c72cf PyErr_Format 31650->31655 31651->31645 31656 655c6a8f strncmp 31651->31656 31660 655c73e5 _errno 31653->31660 31654->31611 31658 655c6e8f _Py_Dealloc 31654->31658 31655->31603 31656->31640 31656->31645 31657->31639 31664 655c6af4 PyErr_Format 31657->31664 31658->31611 31662 655c6bd7 31659->31662 31663 655c73b1 31659->31663 31660->31603 31661 655c68ed 31661->31628 31737 655dd780 10 API calls 31661->31737 31666 655c6be9 malloc 31662->31666 31667 655c6be4 free 31662->31667 31743 655c1660 8 API calls 31663->31743 31664->31603 31670 655c73cc _errno 31666->31670 31671 655c6c06 memcpy 31666->31671 31667->31666 31669 655c6917 31669->31628 31672 655c6920 31669->31672 31670->31653 31673 655c6c27 31671->31673 31676 655c6ec0 31671->31676 31738 655dd1b0 10 API calls 31672->31738 31677 655c6c2d 31673->31677 31678 655c6ce0 31673->31678 31675 655c72ef 31675->31589 31676->31600 31676->31675 31681 655c6ee4 31676->31681 31685 655c6c47 malloc 31677->31685 31686 655c6c42 free 31677->31686 31695 655c6c76 31677->31695 31678->31600 31678->31675 31688 655c6d04 31678->31688 31679->31603 31679->31610 31679->31621 31679->31622 31680 655c692c 31682 655c741c 31680->31682 31683 655c693a 31680->31683 31681->31675 31694 655c6efd PyErr_Format 31681->31694 31745 655c1660 8 API calls 31682->31745 31739 655dd450 10 API calls 31683->31739 31690 655c6c64 memcpy 31685->31690 31691 655c74e3 _errno 31685->31691 31686->31685 31688->31675 31696 655c6d1d PyErr_Format 31688->31696 31689 655c6946 31693 655c743a 31689->31693 31699 655c6954 31689->31699 31690->31695 31691->31653 31692 655c6c7e 31692->31603 31700 655c6c86 31692->31700 31746 655c1660 8 API calls 31693->31746 31694->31603 31695->31692 31740 655c4020 11 API calls 31695->31740 31696->31603 31699->31611 31699->31619 31699->31626 31700->31584 31702 655df83f 31701->31702 31703 655dfa9b 31701->31703 31705 655dfa82 31702->31705 31708 655dfa69 31702->31708 31711 655dfa50 31702->31711 31717 655df85a 31702->31717 31704 655dd140 2 API calls 31703->31704 31707 655dfab4 memcmp 31704->31707 31706 655dd140 2 API calls 31705->31706 31706->31703 31710 655df9be free 31707->31710 31734 655dfaca 31707->31734 31709 655dd140 2 API calls 31708->31709 31709->31705 31713 655df9c6 free 31710->31713 31764 655dd140 __iob_func 31711->31764 31715 655df9d5 31713->31715 31714 655c6a06 31714->31634 31714->31635 31715->31713 31716 655e37c0 21 API calls 31715->31716 31716->31715 31717->31714 31718 655df8d4 malloc 31717->31718 31718->31714 31719 655df8eb 31718->31719 31750 655deb10 31719->31750 31720 655df919 31720->31713 31721 655df93e 31720->31721 31722 655df92a free 31720->31722 31721->31715 31723 655df947 malloc 31721->31723 31722->31714 31723->31713 31724 655df979 31723->31724 31763 655e4050 memcpy 31724->31763 31726 655df9a8 31726->31710 31727 655df9b3 31726->31727 31728 655dfa21 31726->31728 31727->31707 31727->31710 31728->31715 31729 655dfcbd free 31728->31729 31730 655dfc3f 31728->31730 31730->31710 31731 655dfc6d memcmp 31730->31731 31731->31710 31732 655dfc8f 31731->31732 31732->31710 31733 655dfc9d memcmp 31732->31733 31733->31710 31733->31734 31734->31710 31736->31661 31737->31669 31738->31680 31739->31689 31740->31692 31741->31603 31742->31603 31743->31603 31744->31603 31745->31692 31746->31692 31747->31603 31748->31603 31749->31603 31751 655deb3b 31750->31751 31752 655def04 31750->31752 31754 655def36 31751->31754 31755 655def1d 31751->31755 31758 655deeeb 31751->31758 31759 655deb56 31751->31759 31753 655dd140 2 API calls 31752->31753 31753->31755 31756 655dd140 2 API calls 31754->31756 31757 655dd140 2 API calls 31755->31757 31762 655deb62 31756->31762 31757->31754 31760 655dd140 2 API calls 31758->31760 31759->31762 31767 655e0c50 31759->31767 31760->31752 31762->31720 31763->31726 31765 65640f10 31764->31765 31766 655dd171 abort 31765->31766 31768 655e0c87 31767->31768 31769 655e0cb6 31767->31769 31768->31769 31771 655dbe60 31768->31771 31769->31762 31772 655dbe69 31771->31772 31773 655dbe74 31771->31773 31772->31768 31774 655dd140 2 API calls 31773->31774 31775 655dbe8d 31774->31775 31776 655dbe99 31775->31776 31777 655dd140 2 API calls 31775->31777 31776->31768 31778 655dbed1 31777->31778 31779 655dbee9 31778->31779 31780 655dd140 2 API calls 31778->31780 31779->31768 31781 655dbf20 31780->31781 31782 655dbf39 31781->31782 31783 655dbf45 31781->31783 32012 655ec400 rand memset 31782->32012 31785 655dd140 2 API calls 31783->31785 31790 655dbf5e 31785->31790 31786 655dbf3e 31786->31768 31787 655dbff2 31789 655dd140 2 API calls 31787->31789 31788 655dbfd9 31792 655dd140 2 API calls 31788->31792 31799 655dc00b 31789->31799 31790->31787 31790->31788 31791 655dbfc0 31790->31791 31797 655dd140 2 API calls 31790->31797 31803 655dbf7c 31790->31803 31794 655dd140 2 API calls 31791->31794 31792->31787 31793 655dc0a2 31796 655dd140 2 API calls 31793->31796 31794->31788 31795 655dc089 31798 655dd140 2 API calls 31795->31798 31801 655dc0bb 31796->31801 31797->31791 31798->31793 31799->31793 31799->31795 31800 655dc070 31799->31800 31807 655dd140 2 API calls 31799->31807 31809 655dc02c 31799->31809 31802 655dd140 2 API calls 31800->31802 31804 655dc0cb 31801->31804 31806 655dd140 2 API calls 31801->31806 31802->31795 31803->31768 31805 655dc0d0 31804->31805 31808 655dd140 2 API calls 31804->31808 31805->31768 31806->31804 31807->31800 31810 655dc143 31808->31810 31809->31768 31811 655dc382 31810->31811 31813 655dd140 2 API calls 31810->31813 31823 655dc168 31810->31823 31812 655dd140 2 API calls 31811->31812 31814 655dc39b 31812->31814 31813->31811 31815 655dc3a9 31814->31815 31817 655dd140 2 API calls 31814->31817 31816 655dc3ae 31815->31816 31818 655dd140 2 API calls 31815->31818 31816->31768 31817->31815 31819 655dc3ec 31818->31819 31820 655dc3f9 31819->31820 31821 655dc412 31819->31821 31824 655dc444 31820->31824 31825 655dc42b 31820->31825 31826 655dc403 31820->31826 31822 655dd140 2 API calls 31821->31822 31822->31825 31823->31768 31827 655dd140 2 API calls 31824->31827 31829 655dd140 2 API calls 31825->31829 32013 655ec6f0 memset memcpy memset memset 31826->32013 31830 655dc45d 31827->31830 31829->31824 31832 655dc469 31830->31832 31833 655dd140 2 API calls 31830->31833 31831 655dc40b 31831->31768 31834 655dc4b1 31832->31834 31836 655dc473 31832->31836 31837 655dd140 2 API calls 31832->31837 31833->31832 31835 655dd140 2 API calls 31834->31835 31838 655dc4ca 31835->31838 31836->31768 31837->31834 31839 655dc4d9 31838->31839 31841 655dd140 2 API calls 31838->31841 31840 655dc521 31839->31840 31843 655dc4e3 31839->31843 31845 655dd140 2 API calls 31839->31845 31842 655dd140 2 API calls 31840->31842 31841->31839 31844 655dc53a 31842->31844 31843->31768 31846 655dc549 31844->31846 31847 655dd140 2 API calls 31844->31847 31845->31840 31848 655dd140 2 API calls 31846->31848 31850 655dc54e 31846->31850 31847->31846 31849 655dc59e 31848->31849 31851 655dc5a9 31849->31851 31852 655dd140 2 API calls 31849->31852 31850->31768 31853 655dc5f1 31851->31853 31855 655dc5b3 31851->31855 31856 655dd140 2 API calls 31851->31856 31852->31851 31854 655dd140 2 API calls 31853->31854 31857 655dc60a 31854->31857 31855->31768 31856->31853 31858 655dd140 2 API calls 31857->31858 31861 655dc619 31857->31861 31859 655dc650 31858->31859 31860 655dc669 31859->31860 31863 655dd140 2 API calls 31859->31863 31862 655dc66e 31860->31862 31864 655dd140 2 API calls 31860->31864 31861->31768 31862->31768 31863->31860 31865 655dc6ac 31864->31865 31866 655dc6bd 31865->31866 31868 655dd140 2 API calls 31865->31868 31867 655dc6c2 31866->31867 31869 655dd140 2 API calls 31866->31869 31867->31768 31868->31866 31874 655dc716 31869->31874 31870 655dc7b2 31872 655dd140 2 API calls 31870->31872 31871 655dc799 31873 655dd140 2 API calls 31871->31873 31876 655dc7cb 31872->31876 31873->31870 31874->31870 31874->31871 31875 655dc780 31874->31875 31879 655dd140 2 API calls 31874->31879 31881 655dc73c 31874->31881 31877 655dd140 2 API calls 31875->31877 31878 655dd140 2 API calls 31876->31878 31877->31871 31880 655dc7fb 31878->31880 31879->31875 31882 655dc809 31880->31882 31883 655dc81a 31880->31883 31881->31768 31885 655dc80e 31882->31885 31886 655dc833 31882->31886 31884 655dd140 2 API calls 31883->31884 31884->31886 32014 655ec4f0 memset 31885->32014 31887 655dd140 2 API calls 31886->31887 31889 655dc84c 31887->31889 31891 655dc85d calloc 31889->31891 31892 655dc87e 31889->31892 31890 655dc813 31890->31768 31891->31768 31893 655dd140 2 API calls 31892->31893 31894 655dc897 31893->31894 31895 655dc930 31894->31895 31897 655dc917 31894->31897 31898 655dc8b7 calloc 31894->31898 31896 655dd140 2 API calls 31895->31896 31905 655dc949 31896->31905 31899 655dd140 2 API calls 31897->31899 31900 655dc901 31898->31900 31906 655dc8d3 31898->31906 31899->31895 31900->31768 31901 655dc9c9 31902 655dd140 2 API calls 31901->31902 31913 655dc9e2 31902->31913 31903 655dc9b0 31904 655dd140 2 API calls 31903->31904 31904->31901 31905->31901 31905->31903 31907 655dd140 2 API calls 31905->31907 31914 655dc963 31905->31914 31906->31900 31909 655dc8f9 free 31906->31909 31907->31903 31908 655dca69 31910 655dd140 2 API calls 31908->31910 31909->31900 31920 655dca82 31910->31920 31911 655dca50 31912 655dd140 2 API calls 31911->31912 31912->31908 31913->31908 31913->31911 31915 655dd140 2 API calls 31913->31915 31923 655dca03 31913->31923 31914->31768 31915->31911 31916 655dcb22 31918 655dd140 2 API calls 31916->31918 31917 655dcb09 31919 655dd140 2 API calls 31917->31919 31922 655dcb3b 31918->31922 31919->31916 31920->31916 31920->31917 31921 655dcaf0 31920->31921 31927 655dd140 2 API calls 31920->31927 31933 655dcaac 31920->31933 31924 655dd140 2 API calls 31921->31924 31925 655dcb49 31922->31925 31926 655dd140 2 API calls 31922->31926 31923->31768 31924->31917 31928 655dcb91 31925->31928 31930 655dcb53 31925->31930 31931 655dd140 2 API calls 31925->31931 31926->31925 31927->31921 31929 655dd140 2 API calls 31928->31929 31932 655dcbaa 31929->31932 31930->31768 31931->31928 31934 655dcbb9 31932->31934 31936 655dd140 2 API calls 31932->31936 31933->31768 31935 655dcc01 31934->31935 31938 655dcbc3 31934->31938 31940 655dd140 2 API calls 31934->31940 31937 655dd140 2 API calls 31935->31937 31936->31934 31939 655dcc1a 31937->31939 31938->31768 31941 655dcc90 31939->31941 31943 655dd140 2 API calls 31939->31943 31947 655dcc32 31939->31947 31940->31935 31942 655dd140 2 API calls 31941->31942 31944 655dcca9 31942->31944 31943->31941 31945 655dcd01 31944->31945 31948 655dd140 2 API calls 31944->31948 31952 655dccbe 31944->31952 31946 655dd140 2 API calls 31945->31946 31949 655dcd1a 31946->31949 31947->31768 31948->31945 31950 655dcd29 31949->31950 31951 655dd140 2 API calls 31949->31951 31953 655dcd2e 31950->31953 31954 655dd140 2 API calls 31950->31954 31951->31950 31952->31768 31953->31768 31955 655dcd6c 31954->31955 31956 655dcd79 31955->31956 31958 655dd140 2 API calls 31955->31958 31957 655dcd7e 31956->31957 31959 655dd140 2 API calls 31956->31959 31957->31768 31958->31956 31960 655dcdbc 31959->31960 31961 655dcdc9 31960->31961 31963 655dd140 2 API calls 31960->31963 31962 655dcdce 31961->31962 31964 655dd140 2 API calls 31961->31964 31962->31768 31963->31961 31965 655dce0c 31964->31965 31966 655dce19 31965->31966 31968 655dd140 2 API calls 31965->31968 31967 655dce1e 31966->31967 31969 655dd140 2 API calls 31966->31969 31967->31768 31968->31966 31970 655dce5c 31969->31970 31971 655dce69 31970->31971 31973 655dd140 2 API calls 31970->31973 31972 655dce6e 31971->31972 31974 655dd140 2 API calls 31971->31974 31972->31768 31973->31971 31975 655dceac 31974->31975 31976 655dd140 2 API calls 31975->31976 31978 655dceb9 31975->31978 31977 655dcedb 31976->31977 31979 655dcf31 31977->31979 31981 655dd140 2 API calls 31977->31981 31984 655dceee 31977->31984 31978->31768 31980 655dd140 2 API calls 31979->31980 31982 655dcf4a 31980->31982 31981->31979 31983 655dcfa1 31982->31983 31986 655dcf5e 31982->31986 31987 655dcf88 31982->31987 31985 655dd140 2 API calls 31983->31985 31984->31768 31989 655dcfba 31985->31989 32015 655e86f0 toupper 31986->32015 31988 655dd140 2 API calls 31987->31988 31988->31983 31991 655dcfc9 31989->31991 31993 655dd140 2 API calls 31989->31993 31991->31768 31992 655dcf63 31992->31768 31994 655dcfee 31993->31994 31995 655dd140 2 API calls 31994->31995 32002 655dcff9 31994->32002 31996 655dd01b 31995->31996 31997 655dd140 2 API calls 31996->31997 32000 655dd029 31996->32000 31998 655dd04b 31997->31998 31999 655dd059 31998->31999 32001 655dd140 2 API calls 31998->32001 31999->31768 32000->31768 32003 655dd07e 32001->32003 32002->31768 32004 655dd0dd 32003->32004 32005 655dd092 calloc 32003->32005 32006 655dd140 2 API calls 32004->32006 32007 655dd0ac 32005->32007 32008 655dd0d0 32005->32008 32009 655dd0f6 32006->32009 32007->32009 32010 655dd0b1 32007->32010 32008->31768 32011 655dd140 2 API calls 32009->32011 32010->31768 32011->31978 32012->31786 32013->31831 32014->31890 32015->31992 32016 7ffdface63c0 32017 7ffdfaca12ee 32016->32017 32018 7ffdface63d0 ERR_put_error 32017->32018 32019 7ffdface6401 32018->32019 32020 7ffdfb186135 32022 7ffdfb186146 32020->32022 32021 7ffdfb186189 32032 7ffdfb0cd0c0 32021->32032 32022->32021 32024 7ffdfb18617a 32022->32024 32029 7ffdfb0b68f0 32024->32029 32030 7ffdfb0b695b CreateWindowExW SetWindowPos SetWindowLongPtrW 32029->32030 32031 7ffdfb0b694c GetModuleHandleW 32029->32031 32031->32030 32033 7ffdfb0cd0de 32032->32033 32034 7ffdfb0cd112 CreateWindowExW SetWindowPos 32033->32034 32035 7ffdfb0cd103 GetModuleHandleW 32033->32035 32035->32034
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_Format
                                                      • String ID: ]e$%s (%d:%d)$000000$<frozen %U>$OOy#|i$__main__$__mp_main__$__spec__$hdinfo$keyinfo
                                                      • API String ID: 376477240-3468890334
                                                      • Opcode ID: 9be498631c7257f6422cf86f304994446f235b1151f305000d2705761c798620
                                                      • Instruction ID: 1d209b5b48e7c21203fab8b1053d5a676cce39321b266a018cb5fc17f9b51f9a
                                                      • Opcode Fuzzy Hash: 9be498631c7257f6422cf86f304994446f235b1151f305000d2705761c798620
                                                      • Instruction Fuzzy Hash: CCB28D72305B8085EB10CFA9EC9436937A2FB85BC9F8481AADE9E47764DF39C551C342
                                                      APIs
                                                      • PySys_GetObject.PYTHON311 ref: 655C64E1
                                                      • PyTuple_GetItem.PYTHON311 ref: 655C64FB
                                                      • PyLong_AsLong.PYTHON311 ref: 655C6510
                                                      • PyTuple_GetItem.PYTHON311 ref: 655C6520
                                                      • PyLong_AsLong.PYTHON311 ref: 655C652E
                                                      • PySys_GetObject.PYTHON311 ref: 655C653D
                                                      • PyLong_AsVoidPtr.PYTHON311 ref: 655C6549
                                                      • GetProcAddress.KERNEL32 ref: 655C6567
                                                      • GetProcAddress.KERNEL32 ref: 655C6587
                                                      • GetProcAddress.KERNEL32 ref: 655C65A7
                                                      • PyModule_Create2.PYTHON311 ref: 655C65D3
                                                      • PyModule_GetName.PYTHON311 ref: 655C65E8
                                                      • strrchr.MSVCRT ref: 655C660D
                                                      • malloc.MSVCRT ref: 655C6623
                                                      • memcpy.MSVCRT ref: 655C663D
                                                      • PyBytes_FromStringAndSize.PYTHON311 ref: 655C6690
                                                      • PyBytes_AsString.PYTHON311 ref: 655C66AA
                                                      • malloc.MSVCRT ref: 655C66BE
                                                      • PyCMethod_New.PYTHON311 ref: 655C670C
                                                      • PyCMethod_New.PYTHON311 ref: 655C6752
                                                      • PyCMethod_New.PYTHON311 ref: 655C6798
                                                      • PyBytes_FromStringAndSize.PYTHON311 ref: 655C67C2
                                                      • PyBytes_AsString.PYTHON311 ref: 655C67D8
                                                      • _time64.MSVCRT ref: 655C68B5
                                                      • srand.MSVCRT ref: 655C68BD
                                                      • strstr.MSVCRT ref: 655C6A64
                                                      • strncmp.MSVCRT ref: 655C6AA0
                                                      • PyErr_Format.PYTHON311 ref: 655C6B13
                                                      • _Py_Dealloc.PYTHON311 ref: 655C6B4A
                                                      • _Py_Dealloc.PYTHON311 ref: 655C6B59
                                                      • malloc.MSVCRT ref: 655C6B7A
                                                      • free.MSVCRT ref: 655C6BE4
                                                      • malloc.MSVCRT ref: 655C6BF0
                                                      • memcpy.MSVCRT ref: 655C6C13
                                                      • free.MSVCRT ref: 655C6C42
                                                      • malloc.MSVCRT ref: 655C6C4E
                                                      • memcpy.MSVCRT ref: 655C6C71
                                                      • PyErr_Format.PYTHON311 ref: 655C72E4
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDA43
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDA60
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDA82
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDAA2
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDAC2
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDAE2
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDB02
                                                        • Part of subcall function 655DDA10: memcmp.MSVCRT ref: 655DDB22
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD7B3
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD7D3
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD7F5
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD815
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD835
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD855
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD875
                                                        • Part of subcall function 655DD780: memcmp.MSVCRT ref: 655DD895
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD1DB
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD205
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD224
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD243
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD262
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD27D
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD298
                                                        • Part of subcall function 655DD1B0: strcmp.MSVCRT ref: 655DD2B3
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD47B
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD49F
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD4BB
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD4DA
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD4F9
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD514
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD52F
                                                        • Part of subcall function 655DD450: strcmp.MSVCRT ref: 655DD54A
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD32B
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD355
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD374
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD393
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD3B2
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD3CD
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD3E8
                                                        • Part of subcall function 655DD300: strcmp.MSVCRT ref: 655DD403
                                                      • PyBytes_AsStringAndSize.PYTHON311 ref: 655C6DE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: strcmp$memcmp$Bytes_Stringmalloc$AddressLong_Method_ProcSizememcpy$DeallocErr_FormatFromItemLongModule_ObjectSys_Tuple_free$Create2NameVoid_time64srandstrncmpstrrchrstrstr
                                                      • String ID: %s (%d:%d)$,*$.pyarmor.ikey$000000$C_ASSERT_ARMORED_INDEX$C_ENTER_CO_OBJECT_INDEX$C_LEAVE_CO_OBJECT_INDEX$PyCell_Get$PyCell_New$PyCell_Set$aes$dllhandle$failed to get api %s$pyarmor_runtime_$sha256$sprng$version_info
                                                      • API String ID: 3695841847-2027502154
                                                      • Opcode ID: f6b11f4101312ae89eb043b33b891eee429fccf193af02a5ebf434f1b51d7729
                                                      • Instruction ID: 955eb3a15706740a7882e2f96de0b7443565cc515975ca817dfd7254fa7c2746
                                                      • Opcode Fuzzy Hash: f6b11f4101312ae89eb043b33b891eee429fccf193af02a5ebf434f1b51d7729
                                                      • Instruction Fuzzy Hash: 22822632315F8482EB01CF69E8587693BA2FB85B89F85805EDE4E0BB50DF39D556C342

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Window$Load$Icon$ClassCreateCursorHandleLongModuleRegisterShowUpdate
                                                      • String ID: 8.6$8.6.12$::ttk$::ttk::style$Button.border$P$Ttk$arrow$classic$default$downarrow$from$highlight$hsash$image$label$leftarrow$rightarrow$style$text$ttk::theme::classic$uparrow$vsash
                                                      • API String ID: 3723784198-449331163
                                                      • Opcode ID: 8f9ba403931917c369828b063368510c2b79a1c9ad4c486de7b4d73ff0a393d7
                                                      • Instruction ID: af3a1fc07649d5ee12e4d2e04e4d48e123dd2f8ae3bc2c5c6d1cc6801c9e8023
                                                      • Opcode Fuzzy Hash: 8f9ba403931917c369828b063368510c2b79a1c9ad4c486de7b4d73ff0a393d7
                                                      • Instruction Fuzzy Hash: 83124B76F0AB8781EB049F21E860AEA33A5FB49B88F444136D96D177A8DF7CE155C340

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 664 7ffdfb0c1470-7ffdfb0c148a 665 7ffdfb0c1516-7ffdfb0c151e 664->665 666 7ffdfb0c1490-7ffdfb0c1507 SendMessageW * 3 664->666 669 7ffdfb0c1520-7ffdfb0c152e 665->669 670 7ffdfb0c1562-7ffdfb0c1569 665->670 667 7ffdfb0c150c-7ffdfb0c1511 666->667 668 7ffdfb0c1509 666->668 667->665 668->667 669->670 673 7ffdfb0c1530-7ffdfb0c153f 669->673 671 7ffdfb0c15b8-7ffdfb0c15bd 670->671 672 7ffdfb0c156b-7ffdfb0c1579 670->672 672->671 674 7ffdfb0c157b-7ffdfb0c158a 672->674 675 7ffdfb0c154b-7ffdfb0c1552 673->675 676 7ffdfb0c1541 673->676 677 7ffdfb0c1596-7ffdfb0c159d 674->677 678 7ffdfb0c158c 674->678 675->670 679 7ffdfb0c1554-7ffdfb0c1558 675->679 676->675 677->671 681 7ffdfb0c159f-7ffdfb0c15a9 677->681 678->677 679->670 680 7ffdfb0c155a-7ffdfb0c155d call 7ffdfb0cecf0 679->680 680->670 681->671 683 7ffdfb0c15ab-7ffdfb0ced66 681->683 686 7ffdfb0ced68-7ffdfb0ced70 call 7ffdfb186110 683->686 687 7ffdfb0ced74-7ffdfb0ced97 GetFocus 683->687 686->687 688 7ffdfb0ced99-7ffdfb0ceda2 GetForegroundWindow 687->688 689 7ffdfb0ceda4 687->689 688->689 691 7ffdfb0cedac-7ffdfb0cedc6 688->691 689->691 694 7ffdfb0cedc8-7ffdfb0cedd9 691->694 695 7ffdfb0ceddd-7ffdfb0cede5 IsWindow 691->695 694->695 696 7ffdfb0cedeb-7ffdfb0cedfc 695->696 697 7ffdfb0cf13f-7ffdfb0cf165 SetWindowLongPtrW 695->697 696->697 699 7ffdfb0cf17c-7ffdfb0cf18c SetParent 697->699 700 7ffdfb0cf167-7ffdfb0cf176 SetWindowLongPtrW 697->700 702 7ffdfb0cf26c-7ffdfb0cf27d 699->702 703 7ffdfb0cf192-7ffdfb0cf1ca SendMessageW * 2 699->703 700->699 705 7ffdfb0cf2f1-7ffdfb0cf2fd 702->705 706 7ffdfb0cf27f-7ffdfb0cf297 SendMessageW 702->706 703->702 704 7ffdfb0cf1d0-7ffdfb0cf1d9 GetDesktopWindow 703->704 704->702 707 7ffdfb0cf1df-7ffdfb0cf1f7 SetWindowLongPtrW 704->707 708 7ffdfb0cf322-7ffdfb0cf337 call 7ffdfb0cf600 705->708 709 7ffdfb0cf2ff-7ffdfb0cf31c SetWindowPos 705->709 706->705 710 7ffdfb0cf299-7ffdfb0cf2eb SendMessageW call 7ffdfb140d30 SendMessageW 706->710 711 7ffdfb0cf1f9-7ffdfb0cf21b 707->711 712 7ffdfb0cf258-7ffdfb0cf266 SetMenu DestroyWindow 707->712 718 7ffdfb0cf339-7ffdfb0cf348 SendMessageW 708->718 719 7ffdfb0cf34e-7ffdfb0cf359 708->719 709->708 710->705 711->712 721 7ffdfb0cf21d 711->721 712->702 718->719 722 7ffdfb0cf35b-7ffdfb0cf36b SendMessageW 719->722 723 7ffdfb0cf371-7ffdfb0cf37b 719->723 724 7ffdfb0cf220-7ffdfb0cf224 721->724 722->723 725 7ffdfb0cf3e9-7ffdfb0cf3f3 723->725 726 7ffdfb0cf37d-7ffdfb0cf39b SendMessageW 723->726 729 7ffdfb0cf24c-7ffdfb0cf256 724->729 730 7ffdfb0cf226-7ffdfb0cf22d 724->730 727 7ffdfb0cf3f5-7ffdfb0cf406 SetMenu 725->727 728 7ffdfb0cf40d-7ffdfb0cf410 725->728 731 7ffdfb0cf3dd-7ffdfb0cf3e4 call 7ffdfb0cd260 726->731 732 7ffdfb0cf39d-7ffdfb0cf3d6 726->732 727->728 734 7ffdfb0cf412-7ffdfb0cf418 728->734 735 7ffdfb0cf46f-7ffdfb0cf486 SetActiveWindow 728->735 729->712 729->724 730->729 736 7ffdfb0cf22f-7ffdfb0cf246 SetParent 730->736 731->725 732->731 739 7ffdfb0cf41a-7ffdfb0cf428 734->739 740 7ffdfb0cf462-7ffdfb0cf469 734->740 742 7ffdfb0cf49e-7ffdfb0cf4ce call 7ffdfb1af7a0 735->742 736->729 739->740 743 7ffdfb0cf42a-7ffdfb0cf42d 739->743 740->735 745 7ffdfb0cf430-7ffdfb0cf434 743->745 747 7ffdfb0cf456-7ffdfb0cf460 745->747 748 7ffdfb0cf436-7ffdfb0cf43d 745->748 747->740 747->745 748->747 749 7ffdfb0cf43f-7ffdfb0cf452 call 7ffdfb0cecf0 call 7ffdfb0cf600 748->749 749->747
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$FocusForegroundLong
                                                      • String ID: UpdateWrapper: Cannot find container window$UpdateWrapper: Container was destroyed
                                                      • API String ID: 2937761121-1156326135
                                                      • Opcode ID: d434dc067906118a4d60ed8c6fdb3e4352b40dac76156baa84dc3e4e8265a215
                                                      • Instruction ID: 99a0420a0637544caae1d79aed72d137b3aeb03a5c48bb852485ce2c8f846405
                                                      • Opcode Fuzzy Hash: d434dc067906118a4d60ed8c6fdb3e4352b40dac76156baa84dc3e4e8265a215
                                                      • Instruction Fuzzy Hash: 0BF14D72B0AA8386EB648F11D464BB973A0FB85B98F044135DE6E477E8DF3CE4559700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_sizeO_memcmpR_flagsX_cipherX_md
                                                      • String ID: $..\s\ssl\record\ssl3_record.c$@$CONNE$GET $HEAD $POST $PUT
                                                      • API String ID: 2456506815-352295518
                                                      • Opcode ID: 3bdbc81cb969bd6d7753d324455ab0374f9f712aa8ade17549a8626ead9427ca
                                                      • Instruction ID: 22cee6bb5f8d1da882aa05d49702306fec7c2f48f99fb094ae5204e9c5fca005
                                                      • Opcode Fuzzy Hash: 3bdbc81cb969bd6d7753d324455ab0374f9f712aa8ade17549a8626ead9427ca
                                                      • Instruction Fuzzy Hash: A1729E36B0864286FB288E11E464BBD26A0EB44BC8F154176DAAD4BBDCDF3ED594C700

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Create$BitmapBrushPattern
                                                      • String ID: 8.6$Button.border$Combobox.focus$Scrollbar.trough$Ttk$alt$border$client$field$focus$slider$thumb$ttk::theme::winnative$winnative
                                                      • API String ID: 3280665104-2094136981
                                                      • Opcode ID: b31de2be146e75256c0e82ad79fddffdc6f373d01e20bd9515acc9596ba2253f
                                                      • Instruction ID: 970a31d540b39ff645710d0f45b79bd5e0b13abdeaa7857f690140a7edfb45b3
                                                      • Opcode Fuzzy Hash: b31de2be146e75256c0e82ad79fddffdc6f373d01e20bd9515acc9596ba2253f
                                                      • Instruction Fuzzy Hash: 35714D76F0AB8B81EB149B61E4609EA77A4FB49B88F444136D96D0B7B9DF3CE114C340

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1463 7ffdfb0c5380-7ffdfb0c53f0 SelectObject 1464 7ffdfb0c53fa-7ffdfb0c5430 GetFontData 1463->1464 1465 7ffdfb0c53f2-7ffdfb0c53f7 1463->1465 1466 7ffdfb0c5436-7ffdfb0c543d 1464->1466 1467 7ffdfb0c570a-7ffdfb0c5715 GetTextCharset 1464->1467 1465->1464 1468 7ffdfb0c545a 1466->1468 1469 7ffdfb0c543f-7ffdfb0c5458 1466->1469 1470 7ffdfb0c5717-7ffdfb0c5745 1467->1470 1471 7ffdfb0c5749-7ffdfb0c578b SelectObject call 7ffdfb1af7a0 1467->1471 1473 7ffdfb0c545f-7ffdfb0c5468 1468->1473 1469->1473 1470->1471 1473->1471 1475 7ffdfb0c546e 1473->1475 1477 7ffdfb0c5473-7ffdfb0c5493 GetFontData 1475->1477 1478 7ffdfb0c5495-7ffdfb0c5509 1477->1478 1479 7ffdfb0c550b-7ffdfb0c5515 1477->1479 1481 7ffdfb0c551b-7ffdfb0c5520 1478->1481 1479->1481 1482 7ffdfb0c5526-7ffdfb0c5529 1481->1482 1483 7ffdfb0c56ec-7ffdfb0c5702 1481->1483 1485 7ffdfb0c552b-7ffdfb0c5531 1482->1485 1486 7ffdfb0c5533-7ffdfb0c5537 1482->1486 1483->1477 1484 7ffdfb0c5708 1483->1484 1484->1471 1487 7ffdfb0c553d-7ffdfb0c555e GetFontData 1485->1487 1486->1483 1486->1487 1488 7ffdfb0c557c 1487->1488 1489 7ffdfb0c5560-7ffdfb0c557a 1487->1489 1490 7ffdfb0c5581-7ffdfb0c5585 1488->1490 1489->1490 1490->1483 1491 7ffdfb0c558b-7ffdfb0c558e 1490->1491 1492 7ffdfb0c5590-7ffdfb0c55ad 1491->1492 1493 7ffdfb0c55af 1491->1493 1494 7ffdfb0c55b4-7ffdfb0c561a GetFontData * 2 1492->1494 1493->1494 1497 7ffdfb0c561c-7ffdfb0c5622 1494->1497 1498 7ffdfb0c5681-7ffdfb0c5689 1494->1498 1497->1498 1499 7ffdfb0c5624-7ffdfb0c5636 1497->1499 1500 7ffdfb0c568b-7ffdfb0c5691 1498->1500 1501 7ffdfb0c56e9 1498->1501 1503 7ffdfb0c5640-7ffdfb0c567f 1499->1503 1500->1501 1502 7ffdfb0c5693-7ffdfb0c56a9 1500->1502 1501->1483 1504 7ffdfb0c56b0-7ffdfb0c56be 1502->1504 1503->1498 1503->1503 1505 7ffdfb0c56d6-7ffdfb0c56e0 1504->1505 1506 7ffdfb0c56c0-7ffdfb0c56cc 1504->1506 1505->1504 1508 7ffdfb0c56e2-7ffdfb0c56e7 1505->1508 1506->1505 1507 7ffdfb0c56ce-7ffdfb0c56d3 1506->1507 1507->1505 1508->1483
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: DataFont$ObjectSelect$CharsetText
                                                      • String ID: cmap$pamc
                                                      • API String ID: 447340330-4234804082
                                                      • Opcode ID: 9883f4281c3c7787471d451032958de6f10e594a20dd1e5281156ed375801fcf
                                                      • Instruction ID: e3216df6e24f3ef9b79a7d92a6c4c0f57fc4e14ffa838cca98fc36461eb0549a
                                                      • Opcode Fuzzy Hash: 9883f4281c3c7787471d451032958de6f10e594a20dd1e5281156ed375801fcf
                                                      • Instruction Fuzzy Hash: 3BB123BBB292628BD7548F16E411A7EB7A1FB95B44F404031EE9943BE8DB7CD441DB00

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Y_derive$O_clear_freeO_mallocX_freeX_newY_derive_initY_derive_set_peer
                                                      • String ID: ..\s\ssl\s3_lib.c
                                                      • API String ID: 2104848214-4238427508
                                                      • Opcode ID: 130a6e57b97b6379b2ff914890c962828d412850f22ca7823f055f40a8ef15cc
                                                      • Instruction ID: b69b184c484523f8879336cee14fbca0b4c67ad081aa5c397a17ae2c62b21d1c
                                                      • Opcode Fuzzy Hash: 130a6e57b97b6379b2ff914890c962828d412850f22ca7823f055f40a8ef15cc
                                                      • Instruction Fuzzy Hash: 0C51C136B0864285FB28DE22A920ABE6691FF44BC4F084072DE6C47BDDEF3DE4558740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteFontIndirect$InfoParametersSystem$CapsDeviceReleaseStockmemset
                                                      • String ID: TkCaptionFont$TkDefaultFont$TkFixedFont$TkHeadingFont$TkIconFont$TkMenuFont$TkSmallCaptionFont$TkTextFont$TkTooltipFont
                                                      • API String ID: 3615235001-2508811397
                                                      • Opcode ID: 9ccc85a36dcb20fc4ec8aa18b0c8cc15d1766b04439c597cd0f8507ce402052f
                                                      • Instruction ID: 99161a478dbcee33dc0418ed02d6b1ccdd78c2b20af00e3ee10d01ee1d88031e
                                                      • Opcode Fuzzy Hash: 9ccc85a36dcb20fc4ec8aa18b0c8cc15d1766b04439c597cd0f8507ce402052f
                                                      • Instruction Fuzzy Hash: 93814C62F1664386FB149B62E824AF96360FB45B8CF404031D92E577A8DF3CE54ACB40

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 984 7ffdfb11894d-7ffdfb11895b 985 7ffdfb118960-7ffdfb118986 984->985 987 7ffdfb118ac0-7ffdfb118ac8 985->987 988 7ffdfb11898c-7ffdfb118990 985->988 987->985 991 7ffdfb118ace-7ffdfb118ad6 987->991 989 7ffdfb1189cf-7ffdfb1189d3 988->989 990 7ffdfb118992-7ffdfb118995 988->990 995 7ffdfb118a10-7ffdfb118a14 989->995 996 7ffdfb1189d5-7ffdfb1189d8 989->996 990->989 992 7ffdfb118997-7ffdfb1189ac strncmp 990->992 993 7ffdfb118ad8-7ffdfb118ae6 991->993 994 7ffdfb118aea-7ffdfb118b9f call 7ffdfb186d90 call 7ffdfb185750 991->994 999 7ffdfb1189ae-7ffdfb1189c3 992->999 1000 7ffdfb1189c8 992->1000 993->994 1026 7ffdfb118f00 994->1026 1027 7ffdfb118ba5-7ffdfb118bb2 994->1027 997 7ffdfb118a4f-7ffdfb118a53 995->997 998 7ffdfb118a16-7ffdfb118a1a 995->998 996->995 1002 7ffdfb1189da-7ffdfb1189ef strncmp 996->1002 1004 7ffdfb118a8e-7ffdfb118a92 997->1004 1005 7ffdfb118a55-7ffdfb118a59 997->1005 998->997 1003 7ffdfb118a1c-7ffdfb118a31 strncmp 998->1003 999->987 1000->989 1007 7ffdfb1189f1-7ffdfb118a04 1002->1007 1008 7ffdfb118a09 1002->1008 1009 7ffdfb118a33-7ffdfb118a46 1003->1009 1010 7ffdfb118a48 1003->1010 1004->987 1014 7ffdfb118a94-7ffdfb118aa9 strncmp 1004->1014 1005->1004 1012 7ffdfb118a5b-7ffdfb118a70 strncmp 1005->1012 1007->987 1008->995 1009->987 1010->997 1016 7ffdfb118a72-7ffdfb118a85 1012->1016 1017 7ffdfb118a87 1012->1017 1014->987 1015 7ffdfb118aab-7ffdfb118abb 1014->1015 1015->987 1016->987 1017->1004 1030 7ffdfb118f05-7ffdfb118f2b 1026->1030 1028 7ffdfb118bb4-7ffdfb118bd0 call 7ffdfb14bc70 1027->1028 1029 7ffdfb118be6-7ffdfb118bfd call 7ffdfb11c210 call 7ffdfb14c2e0 1027->1029 1028->1029 1035 7ffdfb118bd2-7ffdfb118bde 1028->1035 1038 7ffdfb118c1d-7ffdfb118c22 1029->1038 1039 7ffdfb118bff-7ffdfb118c10 call 7ffdfb14bc70 1029->1039 1035->1029 1041 7ffdfb118c24-7ffdfb118c34 call 7ffdfb0c1650 1038->1041 1042 7ffdfb118c3a-7ffdfb118c42 1038->1042 1045 7ffdfb118c15-7ffdfb118c1b 1039->1045 1041->1042 1051 7ffdfb118ef8-7ffdfb118efb call 7ffdfb185a30 1041->1051 1043 7ffdfb118c5d-7ffdfb118c60 1042->1043 1044 7ffdfb118c44-7ffdfb118c5a call 7ffdfb14bc70 1042->1044 1048 7ffdfb118c80-7ffdfb118c8d 1043->1048 1049 7ffdfb118c62-7ffdfb118c7e call 7ffdfb14bc70 1043->1049 1044->1043 1045->1038 1045->1042 1054 7ffdfb118c92-7ffdfb118c95 1048->1054 1049->1048 1061 7ffdfb118c8f 1049->1061 1051->1026 1057 7ffdfb118cff-7ffdfb118d02 1054->1057 1058 7ffdfb118c97-7ffdfb118cbe call 7ffdfb183cf0 1054->1058 1059 7ffdfb118d04-7ffdfb118d1a call 7ffdfb1843c0 1057->1059 1060 7ffdfb118d2b-7ffdfb118d3f 1057->1060 1058->1051 1069 7ffdfb118cc4-7ffdfb118cce 1058->1069 1059->1051 1070 7ffdfb118d20-7ffdfb118d26 call 7ffdfb186800 1059->1070 1067 7ffdfb118d4d-7ffdfb118d6b 1060->1067 1068 7ffdfb118d41-7ffdfb118d4b 1060->1068 1061->1054 1071 7ffdfb118d82-7ffdfb118e06 memset 1067->1071 1072 7ffdfb118d6d-7ffdfb118d74 1067->1072 1068->1067 1068->1071 1069->1057 1073 7ffdfb118cd0-7ffdfb118cf4 1069->1073 1070->1060 1079 7ffdfb118e08-7ffdfb118e12 1071->1079 1080 7ffdfb118e19-7ffdfb118e64 call 7ffdfb1107c0 call 7ffdfb107a80 1071->1080 1072->1071 1076 7ffdfb118d76-7ffdfb118d7d 1072->1076 1073->1057 1074 7ffdfb118cf6-7ffdfb118cf9 1073->1074 1074->1057 1076->1071 1079->1080 1080->1051 1085 7ffdfb118e6a-7ffdfb118e8f call 7ffdfb119470 1080->1085 1085->1051 1088 7ffdfb118e91-7ffdfb118e97 1085->1088 1089 7ffdfb118e9d-7ffdfb118ea5 1088->1089 1090 7ffdfb118f58-7ffdfb118f5c 1088->1090 1093 7ffdfb118f50-7ffdfb118f53 call 7ffdfb0c18d0 1089->1093 1094 7ffdfb118eab-7ffdfb118eef 1089->1094 1091 7ffdfb118f5e-7ffdfb118f6c 1090->1091 1092 7ffdfb118f75-7ffdfb118f92 call 7ffdfb149fb0 1090->1092 1091->1092 1092->1030 1093->1090 1094->1051
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: strncmp
                                                      • String ID: -class$-colormap$-screen$-use$-visual$CONTAINMENT$Class$Colormap$FRAME$Use$Visual$class$colormap$use$v$visual$windows cannot have both the -use and the -container option set$"6
                                                      • API String ID: 1114863663-646938501
                                                      • Opcode ID: f7413b5202df08c6a529bb41f8151afdd6ac3aac6e59a64dd44c62e999cebe4e
                                                      • Instruction ID: 85c85a7cb2fbc296006875c56539a8f5664a0c8634758ed99ef2b34b0e95ded0
                                                      • Opcode Fuzzy Hash: f7413b5202df08c6a529bb41f8151afdd6ac3aac6e59a64dd44c62e999cebe4e
                                                      • Instruction Fuzzy Hash: 7AF13962F0AB8795EB548B11E460BB933A5FB49B88F089435CE6E477E8DF3CE4548700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1101 7ffdfad0c2c0-7ffdfad0c321 call 7ffdfaca12ee EVP_PKEY_CTX_new_id 1104 7ffdfad0c654 1101->1104 1105 7ffdfad0c327-7ffdfad0c336 1101->1105 1106 7ffdfad0c656-7ffdfad0c679 call 7ffdfaca191f 1104->1106 1107 7ffdfad0c3a4-7ffdfad0c3cc EVP_MD_size call 7ffdfaca11ea 1105->1107 1108 7ffdfad0c338-7ffdfad0c347 1105->1108 1117 7ffdfad0c5f0-7ffdfad0c611 EVP_PKEY_CTX_free call 7ffdfaca1ad2 1107->1117 1118 7ffdfad0c3d2-7ffdfad0c3ec call 7ffdfaca2496 1107->1118 1111 7ffdfad0c349-7ffdfad0c375 call 7ffdfaca1c94 EVP_PKEY_CTX_free 1108->1111 1112 7ffdfad0c37a-7ffdfad0c39f ERR_put_error EVP_PKEY_CTX_free 1108->1112 1111->1104 1112->1104 1124 7ffdfad0c613-7ffdfad0c637 call 7ffdfaca1c94 1117->1124 1125 7ffdfad0c639-7ffdfad0c64f ERR_put_error 1117->1125 1118->1117 1123 7ffdfad0c3f2-7ffdfad0c405 call 7ffdfaca1712 1118->1123 1123->1117 1130 7ffdfad0c40b-7ffdfad0c422 call 7ffdfaca1bef 1123->1130 1124->1104 1125->1104 1130->1117 1133 7ffdfad0c428-7ffdfad0c43a call 7ffdfaca1bef 1130->1133 1133->1117 1136 7ffdfad0c440-7ffdfad0c44c call 7ffdfaca12e9 1133->1136 1136->1117 1139 7ffdfad0c452-7ffdfad0c475 call 7ffdfaca223e 1136->1139 1139->1117 1142 7ffdfad0c47b-7ffdfad0c48c call 7ffdfaca1b68 1139->1142 1142->1117 1145 7ffdfad0c492-7ffdfad0c49e call 7ffdfaca1122 1142->1145 1145->1117 1148 7ffdfad0c4a4-7ffdfad0c4ae EVP_PKEY_derive_init 1145->1148 1149 7ffdfad0c4b4-7ffdfad0c4da EVP_PKEY_CTX_ctrl 1148->1149 1150 7ffdfad0c58a-7ffdfad0c5a0 EVP_PKEY_CTX_free 1148->1150 1149->1150 1151 7ffdfad0c4e0-7ffdfad0c502 EVP_PKEY_CTX_ctrl 1149->1151 1152 7ffdfad0c5cf-7ffdfad0c5ee ERR_put_error 1150->1152 1153 7ffdfad0c5a2-7ffdfad0c5ca call 7ffdfaca1c94 1150->1153 1151->1150 1154 7ffdfad0c508-7ffdfad0c530 EVP_PKEY_CTX_ctrl 1151->1154 1152->1106 1153->1106 1154->1150 1156 7ffdfad0c532-7ffdfad0c560 EVP_PKEY_CTX_ctrl 1154->1156 1156->1150 1158 7ffdfad0c562-7ffdfad0c579 EVP_PKEY_derive 1156->1158 1158->1150 1159 7ffdfad0c57b-7ffdfad0c585 EVP_PKEY_CTX_free 1158->1159 1159->1106
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X_ctrl$X_free$D_sizeR_put_errorX_new_idY_derive_init
                                                      • String ID: ..\s\ssl\tls13_enc.c$U$W$tls13
                                                      • API String ID: 2176224248-2595563013
                                                      • Opcode ID: 09b05af00634b470c3d80df0cdabe513e3a21458ade412db6ba97d4ea4af0331
                                                      • Instruction ID: b4fb74ce5e0692053c1bbbb2064bcfd9a1d74893962dda4e13588a9512858158
                                                      • Opcode Fuzzy Hash: 09b05af00634b470c3d80df0cdabe513e3a21458ade412db6ba97d4ea4af0331
                                                      • Instruction Fuzzy Hash: 4891B221B0865245F7289A22E824BBE6750FF84784F484175EE6D9BADEEF3CD545CB00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1160 7ffdfb0bf590-7ffdfb0bf5cc call 7ffdfb0beaf0 1162 7ffdfb0bf5d1-7ffdfb0bf618 SetROP2 CreateCompatibleDC 1160->1162 1163 7ffdfb0bf728-7ffdfb0bf73a 1162->1163 1164 7ffdfb0bf61e-7ffdfb0bf622 1162->1164 1165 7ffdfb0bf73c 1163->1165 1166 7ffdfb0bf741-7ffdfb0bf77e 1163->1166 1167 7ffdfb0bf64f-7ffdfb0bf65a 1164->1167 1168 7ffdfb0bf624-7ffdfb0bf628 1164->1168 1165->1166 1177 7ffdfb0bf7ba 1166->1177 1178 7ffdfb0bf780-7ffdfb0bf788 1166->1178 1170 7ffdfb0bf65c-7ffdfb0bf661 1167->1170 1171 7ffdfb0bf663-7ffdfb0bf665 1167->1171 1168->1167 1169 7ffdfb0bf62a-7ffdfb0bf64a CreateBitmap 1168->1169 1172 7ffdfb0bf709-7ffdfb0bf723 SetTextColor SetBkColor 1169->1172 1170->1171 1173 7ffdfb0bf667-7ffdfb0bf66e 1171->1173 1174 7ffdfb0bf670-7ffdfb0bf691 1171->1174 1176 7ffdfb0bf7ee-7ffdfb0bf7f1 1172->1176 1173->1174 1186 7ffdfb0bf693-7ffdfb0bf6a6 1174->1186 1187 7ffdfb0bf6e1-7ffdfb0bf6ff CreateBitmap 1174->1187 1179 7ffdfb0bf804-7ffdfb0bf8bb SelectObject BitBlt SelectObject DeleteObject DeleteDC SetBkMode SelectPalette RealizePalette 1176->1179 1180 7ffdfb0bf7f3-7ffdfb0bf7fa 1176->1180 1183 7ffdfb0bf7be-7ffdfb0bf7e4 CreateDIBitmap 1177->1183 1182 7ffdfb0bf78a-7ffdfb0bf78e 1178->1182 1178->1183 1184 7ffdfb0bf8cc-7ffdfb0bf8cf 1179->1184 1185 7ffdfb0bf8bd-7ffdfb0bf8ca ReleaseDC 1179->1185 1180->1179 1188 7ffdfb0bf791-7ffdfb0bf7b6 1182->1188 1183->1176 1189 7ffdfb0bf8da-7ffdfb0bf8f9 1184->1189 1190 7ffdfb0bf8d1-7ffdfb0bf8d4 DeleteDC 1184->1190 1185->1189 1191 7ffdfb0bf6a8-7ffdfb0bf6ab 1186->1191 1192 7ffdfb0bf6d6-7ffdfb0bf6df 1186->1192 1187->1172 1188->1188 1193 7ffdfb0bf7b8 1188->1193 1190->1189 1194 7ffdfb0bf6ad-7ffdfb0bf6af 1191->1194 1195 7ffdfb0bf6b1-7ffdfb0bf6b5 1191->1195 1192->1186 1192->1187 1193->1183 1196 7ffdfb0bf6ca-7ffdfb0bf6d4 1194->1196 1197 7ffdfb0bf6b7-7ffdfb0bf6c2 1195->1197 1198 7ffdfb0bf6c4 1195->1198 1196->1191 1196->1192 1199 7ffdfb0bf6c7 1197->1199 1198->1199 1199->1196
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: CreatePaletteSelect$BitmapDeleteObject$ColorModeRealize$CompatibleReleaseText
                                                      • String ID: $Fail to allocate bitmap
                                                      • API String ID: 455095717-3619745282
                                                      • Opcode ID: e8f7df91cba323eb5b641266ae87e1f30962e327d6340d657d6a3a7cae8a3e9a
                                                      • Instruction ID: 42a7e7a173ef5503e0209fb81dd63965716fa162a25c18f8dc494fee4869c912
                                                      • Opcode Fuzzy Hash: e8f7df91cba323eb5b641266ae87e1f30962e327d6340d657d6a3a7cae8a3e9a
                                                      • Instruction Fuzzy Hash: EAA1AF36B1A6828AE714CF25E464A6D77A1FB49B88F14C135DE5E837A8CF3CE455CB00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1200 7ffdfad0bea0-7ffdfad0bef2 call 7ffdfaca12ee EVP_PKEY_CTX_new_id 1203 7ffdfad0bf24-7ffdfad0bf2e EVP_MD_size 1200->1203 1204 7ffdfad0bef4-7ffdfad0bf1f call 7ffdfaca1c94 1200->1204 1206 7ffdfad0bf30-7ffdfad0bf65 call 7ffdfaca1c94 EVP_PKEY_CTX_free 1203->1206 1207 7ffdfad0bf6a-7ffdfad0bfae 1203->1207 1214 7ffdfad0c1c9-7ffdfad0c1e7 call 7ffdfaca191f 1204->1214 1206->1214 1210 7ffdfad0bfb4-7ffdfad0bfbf EVP_MD_CTX_new 1207->1210 1211 7ffdfad0c058-7ffdfad0c062 EVP_PKEY_derive_init 1207->1211 1216 7ffdfad0c174-7ffdfad0c1a2 call 7ffdfaca1c94 EVP_MD_CTX_free 1210->1216 1217 7ffdfad0bfc5-7ffdfad0bfd5 EVP_DigestInit_ex 1210->1217 1212 7ffdfad0c124-7ffdfad0c14a call 7ffdfaca1c94 1211->1212 1213 7ffdfad0c068-7ffdfad0c090 EVP_PKEY_CTX_ctrl 1211->1213 1225 7ffdfad0c14f-7ffdfad0c15f EVP_PKEY_CTX_free 1212->1225 1213->1212 1219 7ffdfad0c096-7ffdfad0c0be EVP_PKEY_CTX_ctrl 1213->1219 1232 7ffdfad0c1a7-7ffdfad0c1af EVP_PKEY_CTX_free 1216->1232 1217->1216 1221 7ffdfad0bfdb-7ffdfad0bff0 EVP_DigestFinal_ex 1217->1221 1219->1212 1224 7ffdfad0c0c0-7ffdfad0c0e5 EVP_PKEY_CTX_ctrl 1219->1224 1221->1216 1226 7ffdfad0bff6-7ffdfad0c041 EVP_MD_CTX_free call 7ffdfaca19fb 1221->1226 1224->1212 1228 7ffdfad0c0e7-7ffdfad0c10c EVP_PKEY_CTX_ctrl 1224->1228 1229 7ffdfad0c170-7ffdfad0c172 1225->1229 1230 7ffdfad0c161-7ffdfad0c16b OPENSSL_cleanse 1225->1230 1235 7ffdfad0c046-7ffdfad0c048 1226->1235 1228->1212 1234 7ffdfad0c10e-7ffdfad0c122 EVP_PKEY_derive 1228->1234 1233 7ffdfad0c1b1-7ffdfad0c1c1 1229->1233 1230->1229 1232->1233 1233->1214 1234->1212 1234->1225 1235->1232 1236 7ffdfad0c04e-7ffdfad0c053 1235->1236 1236->1211
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_sizeX_freeX_new_id
                                                      • String ID: ..\s\ssl\tls13_enc.c$derived
                                                      • API String ID: 669877341-96951260
                                                      • Opcode ID: 6eba0b4d78df8c99f823ece60964211fcc193353b6161a55ed5d43ee0b0afbfe
                                                      • Instruction ID: d04f3d1aa265f5d3f1898ff465c9ffb570778dca89d345e5fac3368ff2864f22
                                                      • Opcode Fuzzy Hash: 6eba0b4d78df8c99f823ece60964211fcc193353b6161a55ed5d43ee0b0afbfe
                                                      • Instruction Fuzzy Hash: 40815B3170879245EB289B22AC20BAA6791FF95BD4F044274EEAD47BDDEF7CD5018B00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1399 655df800-655df839 1400 655df83f-655df842 1399->1400 1401 655dfa9b-655dfaaf call 655dd140 1399->1401 1403 655df848-655df84b 1400->1403 1404 655dfa82-655dfa96 call 655dd140 1400->1404 1406 655dfab4-655dfac4 memcmp 1401->1406 1407 655dfa69-655dfa7d call 655dd140 1403->1407 1408 655df851-655df854 1403->1408 1404->1401 1410 655df9be-655df9c1 free 1406->1410 1411 655dfaca-655dfad0 1406->1411 1407->1404 1412 655df85a-655df866 1408->1412 1413 655dfa50-655dfa64 call 655dd140 1408->1413 1417 655df9c6-655df9cb free 1410->1417 1411->1410 1414 655df868-655df870 1412->1414 1415 655df890-655df893 1412->1415 1413->1407 1414->1415 1418 655df872-655df887 1414->1418 1419 655df895-655df8a5 call 655e1080 1415->1419 1420 655df8a7-655df8d2 1415->1420 1422 655df9d5-655dfa04 1417->1422 1419->1418 1419->1420 1420->1418 1432 655df8d4-655df8e9 malloc 1420->1432 1425 655dfa0a-655dfa1f call 655e37c0 1422->1425 1426 655dfad5-655dfaf0 call 655e37c0 1422->1426 1425->1417 1426->1417 1432->1418 1433 655df8eb-655df912 call 655deb10 1432->1433 1434 655df919-655df91d 1433->1434 1434->1417 1435 655df923-655df928 1434->1435 1436 655df93e-655df941 1435->1436 1437 655df92a-655df939 free 1435->1437 1436->1422 1438 655df947-655df977 malloc 1436->1438 1437->1418 1438->1417 1439 655df979-655df9ac call 655e4050 1438->1439 1439->1410 1442 655df9ae-655df9b1 1439->1442 1443 655dfa21-655dfa42 1442->1443 1444 655df9b3-655df9b8 1442->1444 1445 655dfa48-655dfa4b 1443->1445 1446 655dfaf5-655dfbd3 call 655e10e0 1443->1446 1444->1406 1444->1410 1445->1417 1449 655dfbd5-655dfc20 call 655e10e0 1446->1449 1450 655dfc26-655dfc3d call 655e2210 1446->1450 1449->1450 1455 655dfcbd-655dfcc0 free 1449->1455 1450->1455 1456 655dfc3f-655dfc49 1450->1456 1456->1410 1457 655dfc4f-655dfc67 1456->1457 1457->1410 1458 655dfc6d-655dfc89 memcmp 1457->1458 1458->1410 1459 655dfc8f-655dfc97 1458->1459 1459->1410 1460 655dfc9d-655dfcb2 memcmp 1459->1460 1460->1410 1461 655dfcb8 1460->1461 1461->1411
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: free$memcmp$malloc
                                                      • String ID: `ee$hash != NULL$key != NULL$sig != NULL$src/pk/rsa/rsa_verify_hash.c$stat != NULL
                                                      • API String ID: 2896619906-678541687
                                                      • Opcode ID: 5b8abef50c3ceadf7b7837e67e9482cc59597f24480f9b01a2e04a68547c50f0
                                                      • Instruction ID: e5cc03029139e651cf5b1c215375b18c9e0dc5c9d01c7a9e6e34885f951451ff
                                                      • Opcode Fuzzy Hash: 5b8abef50c3ceadf7b7837e67e9482cc59597f24480f9b01a2e04a68547c50f0
                                                      • Instruction Fuzzy Hash: 26B1AE73708A819AD720CF15E44879AF7A1F788BC8F404216DE894BB18EB7EC954CF45

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: CharObjectSelectTextWidth$FaceMetricsRelease
                                                      • String ID: unicode$utf-16
                                                      • API String ID: 1149465119-3317161374
                                                      • Opcode ID: 35174592a5108521a880005fbe9051792abcb74f6bef279d6261510abd6c8f00
                                                      • Instruction ID: 4f89271474c526acb014be7c73f417fcf9078daeab28d534246ecc9a1b4b61c1
                                                      • Opcode Fuzzy Hash: 35174592a5108521a880005fbe9051792abcb74f6bef279d6261510abd6c8f00
                                                      • Instruction Fuzzy Hash: B3719273B19A8686EB15DF25E460BAA77A0FB58B88F044232DE6D437A8DF3CD445C700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1534 7ffdfaca146a-7ffdface6a54 call 7ffdfaca12ee * 2 1541 7ffdface6a5a-7ffdface6a71 ERR_clear_error SetLastError 1534->1541 1542 7ffdface6df0-7ffdface6e0a 1534->1542 1543 7ffdface6a81-7ffdface6a88 1541->1543 1544 7ffdface6a73-7ffdface6a7a 1541->1544 1545 7ffdface6a8a-7ffdface6a8e 1543->1545 1546 7ffdface6a96-7ffdface6aa3 1543->1546 1544->1543 1547 7ffdface6ab5-7ffdface6aba 1545->1547 1548 7ffdface6a90-7ffdface6a94 1545->1548 1546->1547 1549 7ffdface6aa5-7ffdface6aaf call 7ffdfaca188e 1546->1549 1551 7ffdface6abc-7ffdface6abf 1547->1551 1552 7ffdface6ac6 1547->1552 1548->1546 1548->1547 1549->1542 1549->1547 1554 7ffdface6aca-7ffdface6ad1 1551->1554 1555 7ffdface6ac1 1551->1555 1552->1554 1556 7ffdface6b1b-7ffdface6b30 1554->1556 1557 7ffdface6ad3-7ffdface6ae1 1554->1557 1558 7ffdface6ce1 1555->1558 1562 7ffdface6b32-7ffdface6b3c 1556->1562 1563 7ffdface6b8f-7ffdface6b99 1556->1563 1559 7ffdface6ae3-7ffdface6aea 1557->1559 1560 7ffdface6b0d-7ffdface6b15 1557->1560 1561 7ffdface6ce5-7ffdface6ce8 1558->1561 1559->1560 1566 7ffdface6aec-7ffdface6afb 1559->1566 1560->1556 1567 7ffdface6cea-7ffdface6ced call 7ffdface6520 1561->1567 1568 7ffdface6d07-7ffdface6d0a 1561->1568 1565 7ffdface6ba5-7ffdface6bbb call 7ffdfaca1faa 1562->1565 1569 7ffdface6b3e-7ffdface6b41 1562->1569 1564 7ffdface6b9b-7ffdface6ba3 1563->1564 1563->1565 1570 7ffdface6b52-7ffdface6b70 ERR_put_error 1564->1570 1589 7ffdface6bc7-7ffdface6bce 1565->1589 1590 7ffdface6bbd-7ffdface6bc5 1565->1590 1566->1560 1572 7ffdface6afd-7ffdface6b04 1566->1572 1582 7ffdface6cf2-7ffdface6cf5 1567->1582 1574 7ffdface6d0c-7ffdface6d0f call 7ffdface6ff0 1568->1574 1575 7ffdface6d46-7ffdface6d4a 1568->1575 1576 7ffdface6b4a 1569->1576 1577 7ffdface6b43-7ffdface6b48 1569->1577 1584 7ffdface6b7c-7ffdface6b8a 1570->1584 1585 7ffdface6b72-7ffdface6b76 1570->1585 1572->1560 1581 7ffdface6b06-7ffdface6b0b 1572->1581 1593 7ffdface6d14-7ffdface6d17 1574->1593 1578 7ffdface6d4c-7ffdface6d4f 1575->1578 1579 7ffdface6d51-7ffdface6d77 ERR_put_error 1575->1579 1576->1570 1577->1565 1577->1576 1578->1579 1586 7ffdface6da4-7ffdface6dc1 ERR_put_error 1578->1586 1587 7ffdface6d79-7ffdface6d7d 1579->1587 1588 7ffdface6d7f-7ffdface6d91 1579->1588 1581->1556 1581->1560 1591 7ffdface6cfb-7ffdface6d05 1582->1591 1592 7ffdface6dc6 1582->1592 1594 7ffdface6dc9-7ffdface6dd7 BUF_MEM_free 1584->1594 1585->1584 1585->1594 1586->1592 1587->1586 1587->1588 1588->1586 1595 7ffdface6d93-7ffdface6d9f call 7ffdfaca2176 1588->1595 1596 7ffdface6c10-7ffdface6c1a call 7ffdfaca1f5f 1589->1596 1597 7ffdface6bd0-7ffdface6bdb call 7ffdfad0e7f9 1589->1597 1590->1570 1598 7ffdface6d36-7ffdface6d3c 1591->1598 1592->1594 1600 7ffdface6d19-7ffdface6d24 1593->1600 1601 7ffdface6d26-7ffdface6d29 1593->1601 1594->1542 1599 7ffdface6dd9-7ffdface6de7 1594->1599 1595->1586 1611 7ffdface6c1c 1596->1611 1612 7ffdface6c61-7ffdface6c80 call 7ffdfaca1ee2 1596->1612 1613 7ffdface6bea-7ffdface6bfa BUF_MEM_grow 1597->1613 1614 7ffdface6bdd-7ffdface6be5 1597->1614 1598->1561 1602 7ffdface6d3e-7ffdface6d41 1598->1602 1605 7ffdface6de9 1599->1605 1606 7ffdface6dee 1599->1606 1600->1598 1601->1592 1608 7ffdface6d2f 1601->1608 1602->1592 1605->1606 1606->1542 1608->1598 1615 7ffdface6c24-7ffdface6c42 ERR_put_error 1611->1615 1622 7ffdface6c8c-7ffdface6c90 1612->1622 1623 7ffdface6c82-7ffdface6c8a 1612->1623 1617 7ffdface6c09 1613->1617 1618 7ffdface6bfc-7ffdface6c04 1613->1618 1614->1570 1619 7ffdface6c44-7ffdface6c48 1615->1619 1620 7ffdface6c4e-7ffdface6c5c 1615->1620 1617->1596 1618->1570 1619->1592 1619->1620 1620->1592 1624 7ffdface6c98-7ffdface6c9f 1622->1624 1625 7ffdface6c92-7ffdface6c96 1622->1625 1623->1615 1626 7ffdface6ca1-7ffdface6cae call 7ffdfaca17df 1624->1626 1627 7ffdface6cd4-7ffdface6cdc 1624->1627 1625->1624 1625->1626 1626->1594 1630 7ffdface6cb4-7ffdface6cc2 1626->1630 1627->1558 1631 7ffdface6cc4-7ffdface6ccb 1630->1631 1632 7ffdface6ccd 1630->1632 1631->1627 1631->1632 1632->1627
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$ErrorLastM_freeM_growR_clear_error
                                                      • String ID: ..\s\ssl\statem\statem.c
                                                      • API String ID: 2562538362-2512360314
                                                      • Opcode ID: 78ccfd6b8a83b0bec8db09cf35d9f24f07735e79f233597c9d3392ece07b560d
                                                      • Instruction ID: a077df3df37c49f26da5754b9f587798530ce0bb0156b67f413ea361f9ecfe1b
                                                      • Opcode Fuzzy Hash: 78ccfd6b8a83b0bec8db09cf35d9f24f07735e79f233597c9d3392ece07b560d
                                                      • Instruction Fuzzy Hash: 4DB18F36B1824286E7689F25C8A4B7D36E0EB40B48F5444B5CAA98B6CDDF3DEDC4D701
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: a != NULL$b != NULL$c != NULL$d != NULL$src/math/tfm_desc.c
                                                      • API String ID: 0-1480740242
                                                      • Opcode ID: 2ebd7bf0d5da4f0d9c53dc85af5077e1899cabe1ce4b94f94a3f06f634eaccb9
                                                      • Instruction ID: 542aaeb4082e08e61e8932ae0030b29ceb2b471e9e9e072784f22ac0131e1128
                                                      • Opcode Fuzzy Hash: 2ebd7bf0d5da4f0d9c53dc85af5077e1899cabe1ce4b94f94a3f06f634eaccb9
                                                      • Instruction Fuzzy Hash: 4C920363B1190295FF049BADDC883A9A3B2FBC5386FC0D215DD0A87750EB6EC256CB54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: memcpy$O_clear_flagsO_set_flags
                                                      • String ID: ..\s\ssl\record\rec_layer_s3.c$SSL alert number
                                                      • API String ID: 1692547093-34800109
                                                      • Opcode ID: 2e98e04c356416a80d0b521186f887ae08666fa96d63c64e3aed32f58bbd392e
                                                      • Instruction ID: 4728affc3ff33edefdfe8983858c42cd44cad97f306133fc159ef81abb9f2483
                                                      • Opcode Fuzzy Hash: 2e98e04c356416a80d0b521186f887ae08666fa96d63c64e3aed32f58bbd392e
                                                      • Instruction Fuzzy Hash: 0C42AC3AB0C68282EB7C8A95E570B7D66A0FB41784F144175DB6E4FAD8DF3DE4A18700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2376 7ffdfb0d5d50-7ffdfb0d5d5f 2377 7ffdfb0d5d6b-7ffdfb0d5d7e call 7ffdfb0ccf70 2376->2377 2378 7ffdfb0d5d61-7ffdfb0d73d6 2376->2378 2388 7ffdfb0d5df7-7ffdfb0d5e03 2377->2388 2389 7ffdfb0d5d80-7ffdfb0d5d85 2377->2389 2381 7ffdfb0d7639-7ffdfb0d7642 2378->2381 2382 7ffdfb0d73dc 2378->2382 2384 7ffdfb0d7406-7ffdfb0d741c call 7ffdfb0d76e0 2381->2384 2385 7ffdfb0d7648-7ffdfb0d7656 2381->2385 2386 7ffdfb0d765b-7ffdfb0d7668 call 7ffdfb0c1970 2382->2386 2387 7ffdfb0d73e2-7ffdfb0d73e5 2382->2387 2409 7ffdfb0d766a 2384->2409 2410 7ffdfb0d7422-7ffdfb0d7436 DefWindowProcW 2384->2410 2385->2386 2406 7ffdfb0d766f-7ffdfb0d769f 2386->2406 2391 7ffdfb0d73e7 2387->2391 2392 7ffdfb0d7461-7ffdfb0d7466 2387->2392 2394 7ffdfb0d5d96-7ffdfb0d5d98 2389->2394 2395 7ffdfb0d5d87-7ffdfb0d5d93 2389->2395 2399 7ffdfb0d7632-7ffdfb0d7637 2391->2399 2400 7ffdfb0d73ed-7ffdfb0d73f2 2391->2400 2396 7ffdfb0d762b-7ffdfb0d762d call 7ffdfb0d8300 2392->2396 2397 7ffdfb0d746c-7ffdfb0d7471 2392->2397 2402 7ffdfb0d5d9a-7ffdfb0d5ddc SendMessageW 2394->2402 2403 7ffdfb0d5de2-7ffdfb0d5dea call 7ffdfb0d56f0 2394->2403 2395->2394 2396->2399 2404 7ffdfb0d7606-7ffdfb0d760d 2397->2404 2405 7ffdfb0d7477-7ffdfb0d747a 2397->2405 2399->2406 2407 7ffdfb0d7627-7ffdfb0d7629 2400->2407 2408 7ffdfb0d73f8-7ffdfb0d73fb 2400->2408 2402->2403 2403->2388 2404->2399 2416 7ffdfb0d760f-7ffdfb0d7625 call 7ffdfb0d76e0 2404->2416 2405->2384 2413 7ffdfb0d747c-7ffdfb0d7483 2405->2413 2407->2406 2414 7ffdfb0d743b-7ffdfb0d745c call 7ffdfb0d79c0 DefWindowProcW 2408->2414 2415 7ffdfb0d73fd-7ffdfb0d7400 2408->2415 2409->2406 2410->2406 2418 7ffdfb0d7489-7ffdfb0d7495 ImmGetContext 2413->2418 2419 7ffdfb0d75ed-7ffdfb0d7604 DefWindowProcW 2413->2419 2414->2406 2415->2384 2415->2407 2416->2399 2416->2407 2418->2419 2423 7ffdfb0d749b-7ffdfb0d74b3 ImmGetCompositionStringW 2418->2423 2419->2406 2426 7ffdfb0d74b9-7ffdfb0d757e ImmGetCompositionStringW call 7ffdfb0ccf70 call 7ffdfb0cbb70 GetTickCount 2423->2426 2427 7ffdfb0d75dc-7ffdfb0d75e8 ImmReleaseContext 2423->2427 2433 7ffdfb0d75cf-7ffdfb0d75d6 2426->2433 2434 7ffdfb0d7580-7ffdfb0d7586 2426->2434 2427->2406 2433->2427 2435 7ffdfb0d7590-7ffdfb0d75a4 2434->2435 2435->2433 2436 7ffdfb0d75a6-7ffdfb0d75cd call 7ffdfb111130 * 2 2435->2436 2436->2433 2436->2435
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: CompositionContextProcStringWindow$CountMessageReleaseSendTick
                                                      • String ID:
                                                      • API String ID: 4008441895-0
                                                      • Opcode ID: ff085adabb561743047a4ef4701becfe351342b6efb8f6f8758746e34f8ec804
                                                      • Instruction ID: d761cfcd966fe27e81008faad1cc3109cd78e99d24709165b093f9e49bef5cee
                                                      • Opcode Fuzzy Hash: ff085adabb561743047a4ef4701becfe351342b6efb8f6f8758746e34f8ec804
                                                      • Instruction Fuzzy Hash: 68A1BF32F1A7438AE710CB699464ABD33A1FB4AB88F144135EE6D837EDEE38D4519700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModule$ClassCursorIconRegister
                                                      • String ID: TkTopLevel$Unable to register TkTopLevel class
                                                      • API String ID: 1220223050-2494010311
                                                      • Opcode ID: c0923999ed4cc9b7338c188408aeeb62c0a2598192d10c4c95110e9482fa82c4
                                                      • Instruction ID: fe8671f50be8cb9baffe5052fba586f805f234bca25d5ceb145b17caec1f9e85
                                                      • Opcode Fuzzy Hash: c0923999ed4cc9b7338c188408aeeb62c0a2598192d10c4c95110e9482fa82c4
                                                      • Instruction Fuzzy Hash: 99513E72B0AB4782EB148B00E460A7933A4FB85B95F554235D5AE437F8DF7CE491C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: _stricmp$EnumFamiliesFont
                                                      • String ID: Courier$Helvetica$Times
                                                      • API String ID: 755624294-1931547285
                                                      • Opcode ID: 8f11cfbc86941dad6dc8822b5c0f31ac9476e1bd0a42e77f2bf7848f7ac458c2
                                                      • Instruction ID: 7bf8e27b4137fb5a140fe571401813c574f758784e9eadea552a711ff9db493d
                                                      • Opcode Fuzzy Hash: 8f11cfbc86941dad6dc8822b5c0f31ac9476e1bd0a42e77f2bf7848f7ac458c2
                                                      • Instruction Fuzzy Hash: 82214F62B19A8781FB148F25E861BBA23A1FF49BC8F444531D96D836ECDF6CE1448700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ..\s\ssl\statem\extensions_clnt.c
                                                      • API String ID: 0-592572767
                                                      • Opcode ID: ce63e79dc465d054d35b8ffe083987d14dcf5b6cafa4b26f3d3f50da4c217e90
                                                      • Instruction ID: bcef89e76dce3b70ae57bc2e9b35f7846156f639add9121499277164aa20e30a
                                                      • Opcode Fuzzy Hash: ce63e79dc465d054d35b8ffe083987d14dcf5b6cafa4b26f3d3f50da4c217e90
                                                      • Instruction Fuzzy Hash: A3919176B0865185EB688B16E4606BD77A1FB80BC4F484175DAAD07BDDEF3CE191CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientLongMovePlacementRectVisible
                                                      • String ID: ,
                                                      • API String ID: 2284278383-3772416878
                                                      • Opcode ID: fec93ba8e8cb3e46e73ddd7a2b334128f749a3711153143432947e657c33fd0b
                                                      • Instruction ID: e8201951fddfbb235b10c1084c43f18a8c4f57b4c6851b3f8d8c70027f244231
                                                      • Opcode Fuzzy Hash: fec93ba8e8cb3e46e73ddd7a2b334128f749a3711153143432947e657c33fd0b
                                                      • Instruction Fuzzy Hash: 9FA11A72B056828BE768CF39D564B6C77A0F749B58F044135EE6D876E8CF38E4609B40
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$FaceTextmemset
                                                      • String ID: unicode$utf-16
                                                      • API String ID: 920176757-3317161374
                                                      • Opcode ID: dcbd3b2d222b160ee5f4f2effd0429a048d0dfbfbe8e78730d1ca843ecd2ffb4
                                                      • Instruction ID: 3f253e06799b5c9f52c45f2a1f958280d550b25accc8c32c052b1926bfb0d183
                                                      • Opcode Fuzzy Hash: dcbd3b2d222b160ee5f4f2effd0429a048d0dfbfbe8e78730d1ca843ecd2ffb4
                                                      • Instruction Fuzzy Hash: 78514AB2B06B4691EB588B11E864BAA73A1FB48BD4F058135DE6D477E8DF7CE065C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateHandleLongModule
                                                      • String ID: BUTTON$STATIC
                                                      • API String ID: 4115577067-3385952364
                                                      • Opcode ID: 857e6716b15ef4890199d9618cffe4b0cb858dea5ec010925580daf5bbc2fd1a
                                                      • Instruction ID: 8d2b2f10f56d25dcf188d01ce1b2f43aee7d6e020f81d97d96efe683cf8e1b62
                                                      • Opcode Fuzzy Hash: 857e6716b15ef4890199d9618cffe4b0cb858dea5ec010925580daf5bbc2fd1a
                                                      • Instruction Fuzzy Hash: 2C311932B09B82CBE750CF25E850A5AB7E4F748B98F144135EA9D93B68DF38D4518B00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Palette$ModeRealizeSelect
                                                      • String ID:
                                                      • API String ID: 3073415821-0
                                                      • Opcode ID: 8faf9f438d025fe2bd8a4773709f3ddb629765b6099fa91ef73b37f93b971014
                                                      • Instruction ID: 42a3eedab1c0e996adfc4889df657d040bee5bb2e55ffcbd6951b4d626d995b9
                                                      • Opcode Fuzzy Hash: 8faf9f438d025fe2bd8a4773709f3ddb629765b6099fa91ef73b37f93b971014
                                                      • Instruction Fuzzy Hash: 3B313A26B15B82C1EB58CB16E8A466A7360F749FC4F189432DE5E437A9CE38D4918700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: ObjectStock
                                                      • String ID: FONT$INTERNAL_PROBLEM$ansifixed$failed to allocate font due to internal system font engine problem
                                                      • API String ID: 3428563643-2695973982
                                                      • Opcode ID: 3bf50e5ad75eb11752f0b723d6f2b6441d5cf1d88d7fce1e03b6b6d7f2334cae
                                                      • Instruction ID: 36b478caa7450dd65f58c8e60df1daac1114320e2049613da3f9d93f126798a7
                                                      • Opcode Fuzzy Hash: 3bf50e5ad75eb11752f0b723d6f2b6441d5cf1d88d7fce1e03b6b6d7f2334cae
                                                      • Instruction Fuzzy Hash: 9FD17F76B0AB4696EB64CF16E464A6973A4FB48F88F048535CE5E437A8DF3CE461C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorLongProc
                                                      • String ID: #%04X%04X%04X$Ttk
                                                      • API String ID: 3223664542-2938447076
                                                      • Opcode ID: 99c4d10d1e3fcec791e8b38746ad7f391361fda9ffe284d98070eef17f4e401c
                                                      • Instruction ID: d842be8586ecbe7692c52427c47c6540dd5f778b3fba58a1700e08857ac44fb6
                                                      • Opcode Fuzzy Hash: 99c4d10d1e3fcec791e8b38746ad7f391361fda9ffe284d98070eef17f4e401c
                                                      • Instruction Fuzzy Hash: 1341A136B0AA5682E7108B15E420B7A77A1FB84B88F408035EEAD477ECDF3DD455CB40
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: DeleteObject
                                                      • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup$gray50
                                                      • API String ID: 1531683806-823200916
                                                      • Opcode ID: 3b7e96a6ce40b9df3c159c2e3e0fb5907e12ca96cdce57897884323932e95017
                                                      • Instruction ID: fd4498d24870937cc1e9601e8beadbc656904c03361972eaaf5189d4f43c853a
                                                      • Opcode Fuzzy Hash: 3b7e96a6ce40b9df3c159c2e3e0fb5907e12ca96cdce57897884323932e95017
                                                      • Instruction Fuzzy Hash: 03E153B2B05B868AEB10CF65D0907AD33A5FB48B88F058136DE5C57BA8DF38D495C740
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ..\s\ssl\statem\statem.c
                                                      • API String ID: 0-2512360314
                                                      • Opcode ID: 0fd1227af035e69a8b8f4307e4cd78df7a27efa34d6a37ed1787f0b86bb0efcb
                                                      • Instruction ID: 73f2c6196d405c33c003fc6af49bfb05d618da0df18999802cca4df9a92e642b
                                                      • Opcode Fuzzy Hash: 0fd1227af035e69a8b8f4307e4cd78df7a27efa34d6a37ed1787f0b86bb0efcb
                                                      • Instruction Fuzzy Hash: F5A18D3AB1868285EB688F15D8A4BBD37A0EB44B48F044076CAAD4B7DCDF7DD885C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: DeleteObject
                                                      • String ID: unicode$utf-16
                                                      • API String ID: 1531683806-3317161374
                                                      • Opcode ID: c60797b1542d4fd6972a4b2a454828e70e554c962c1ccce3523fcd8e462a9309
                                                      • Instruction ID: f614d86e42a6dd94237c4cdb8dbb6e55d00981b1ad04db334847cb4d4f2d3a8f
                                                      • Opcode Fuzzy Hash: c60797b1542d4fd6972a4b2a454828e70e554c962c1ccce3523fcd8e462a9309
                                                      • Instruction Fuzzy Hash: 3D513736B16B4A81EB488B06D564A7977A0FB88F80F094436CA6E437F8DF79E465C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateHandleModule
                                                      • String ID: TkChild
                                                      • API String ID: 1084761317-227893619
                                                      • Opcode ID: 7a62c55992fbcbf6ed3e4b251bfeaaffb2160c89fa5d2e0555a0a13e8e40b345
                                                      • Instruction ID: f6ce2513706b786237d9245d711b10df27515890b3f90186732eb3e52246798f
                                                      • Opcode Fuzzy Hash: 7a62c55992fbcbf6ed3e4b251bfeaaffb2160c89fa5d2e0555a0a13e8e40b345
                                                      • Instruction Fuzzy Hash: 55210C76B197818BE760CF29E450A1AB7E0F748B94F145239EB9D43B68DF3CE4508B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: C_get_current_jobR_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 4281227279-1080266419
                                                      • Opcode ID: 8f083c8a184d4fd3118b2df8a8c15317da89aba9ac76828985e5f07a173d9a40
                                                      • Instruction ID: c1322edcb8e092b9711cea0e3a93c44b1e35e7b5d0f0a816298a9a6fb7babb40
                                                      • Opcode Fuzzy Hash: 8f083c8a184d4fd3118b2df8a8c15317da89aba9ac76828985e5f07a173d9a40
                                                      • Instruction Fuzzy Hash: 3D21C436F1868282E744DB26E4206AD63A0FFC8B84F594271EE6D477C9EF3CE1818640
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Release_stricmp
                                                      • String ID:
                                                      • API String ID: 2299790007-0
                                                      • Opcode ID: b7c64329de79d41068600671a2efeaf343f886913cc0d0e4e61e05153839555b
                                                      • Instruction ID: 0d5c636a399df5b99e060c05e57e05570a2760532f3a98ecfc15c6bc50651e37
                                                      • Opcode Fuzzy Hash: b7c64329de79d41068600671a2efeaf343f886913cc0d0e4e61e05153839555b
                                                      • Instruction Fuzzy Hash: 25516F62B1BB4382EB55AB12946097AA3A0BF4AFC4F484135DE6D17BF8DF3CE4519200
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: LongWindow
                                                      • String ID:
                                                      • API String ID: 1378638983-0
                                                      • Opcode ID: 81fb86b1a844e5065c58641122e34c04a371df7b671e54312514a4734b980b85
                                                      • Instruction ID: a42af3097321c07ad197d6fdda1cadddbad795617822a80b705459f4381b68f7
                                                      • Opcode Fuzzy Hash: 81fb86b1a844e5065c58641122e34c04a371df7b671e54312514a4734b980b85
                                                      • Instruction Fuzzy Hash: 72519C36B0AA8786E7148F51E860AB937A1FB49794F184035FEAD537ECCE7CE4449700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\statem\statem.c
                                                      • API String ID: 1767461275-2512360314
                                                      • Opcode ID: c66e4d878d4e220bd67dca2ed57f54926d61c525e573d1344473012ca7939b10
                                                      • Instruction ID: ad7f03690229ec6982d7b7c976c16ffabd91d4cb082857867ec76eb7e69ffe25
                                                      • Opcode Fuzzy Hash: c66e4d878d4e220bd67dca2ed57f54926d61c525e573d1344473012ca7939b10
                                                      • Instruction Fuzzy Hash: 8C917E3A71864286EBA88F2AD4A4BBD23A1FF40B48F440176DA5D47AD8DF3DD985C700
                                                      APIs
                                                      • GetSystemMetrics.USER32 ref: 00007FFDFB0E364A
                                                        • Part of subcall function 00007FFDFB0B6890: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFDFB0B68DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem__stdio_common_vsprintf
                                                      • String ID: pathName ?-option value ...?
                                                      • API String ID: 2968932569-1831586811
                                                      • Opcode ID: 47a56bdbafacf27a9fdb6d99d509a2c4cc2b1391b7019c196ea0342b3d84a513
                                                      • Instruction ID: 59e0f19c1cb6d31f813e372182b67b4ca32fa6994682f0d80a1ad7569f553bb8
                                                      • Opcode Fuzzy Hash: 47a56bdbafacf27a9fdb6d99d509a2c4cc2b1391b7019c196ea0342b3d84a513
                                                      • Instruction Fuzzy Hash: 8EA1267AA06B8685D7409F21F9507DA33A8F745B8CF484139DE994B3A8CF78D0A9E314
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ButtonProc called on an invalid HWND
                                                      • API String ID: 0-237202145
                                                      • Opcode ID: 0be62edd70a93127788975da0d3d16b0fba35739c56e52aee4b2d0086fbc6ad7
                                                      • Instruction ID: ec777dd4c7da2ae12018aced9ff0fb0a21d36aaba5fb1b210103160f90651583
                                                      • Opcode Fuzzy Hash: 0be62edd70a93127788975da0d3d16b0fba35739c56e52aee4b2d0086fbc6ad7
                                                      • Instruction Fuzzy Hash: 3C11B662B0AB4686EB149B16E870FB96360BF95BC4F448031DD5D477F9EE3CD4429700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: strchrstrncpy
                                                      • String ID:
                                                      • API String ID: 3824778938-0
                                                      • Opcode ID: c1b7f7f9854ceca299def4ec269ade493b7d2e46ce927aadd4c9205569bda401
                                                      • Instruction ID: 3277a410600acb2e584d5575bce108c443367dadd14d61adf9609e240cd5ac26
                                                      • Opcode Fuzzy Hash: c1b7f7f9854ceca299def4ec269ade493b7d2e46ce927aadd4c9205569bda401
                                                      • Instruction Fuzzy Hash: 0781913BB06A46C6EB64CF19D560A6A37A1FB85B9CB444431CE2D477ADCF38D951C700
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c4c2904de79a5311d24a280db9180121a06792ce8bc52dd813d60a93972c109
                                                      • Instruction ID: d7376b634265efba55d0b48c4243c3e4ea1aca370731002a3e551face6f9f90f
                                                      • Opcode Fuzzy Hash: 9c4c2904de79a5311d24a280db9180121a06792ce8bc52dd813d60a93972c109
                                                      • Instruction Fuzzy Hash: A8411F63B06B4381EB658F55D860BA977A1FB84F88F08853ADE1D4B7AADF38D440C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: a816552e71fadee9afb63e3e519801a83d88db330619432cb018bf26502ad68b
                                                      • Instruction ID: bb76a216293c57a45354a543c7f2a5d1ca4b565192936a278ef250b5414b19ce
                                                      • Opcode Fuzzy Hash: a816552e71fadee9afb63e3e519801a83d88db330619432cb018bf26502ad68b
                                                      • Instruction Fuzzy Hash: D4313B72B1968286EB64CF15E0947AAB7A0FB89B88F044135DA9D477E9DF3CD440DB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModule$ClassCursorIconRegisterShowWindow
                                                      • String ID:
                                                      • API String ID: 3163394910-0
                                                      • Opcode ID: f90de97afad66ea11c02e709b31a7bec116550207db85d13ab11c4fe6dd1f453
                                                      • Instruction ID: c7297755524fd66c3806867ec381eda4c21bfe005df66904f098aca34fcbff2c
                                                      • Opcode Fuzzy Hash: f90de97afad66ea11c02e709b31a7bec116550207db85d13ab11c4fe6dd1f453
                                                      • Instruction Fuzzy Hash: FD21A372F0968382EB648F15D0A4BB927A0EB89B94F184035DB2D473E9CF78E985D700
                                                      APIs
                                                      • memcpy.VCRUNTIME140(?,?,?,?,00000008,00000000,000000D0,?,?,00007FFDFB14BCC2), ref: 00007FFDFB14CE5B
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID:
                                                      • API String ID: 3510742995-0
                                                      • Opcode ID: 1d0ea6f8b58e166b1403f1f5555346340e46a15ebde85784e01d1d1befdaf410
                                                      • Instruction ID: 1610bcc5a24d8c325f0a69169387326efe741a332fa7ff1be7d63e1c4dab127f
                                                      • Opcode Fuzzy Hash: 1d0ea6f8b58e166b1403f1f5555346340e46a15ebde85784e01d1d1befdaf410
                                                      • Instruction Fuzzy Hash: F2F11BB7A02F45CACB60CF09E4905ADBBB4F788B88B55812ACB5E43764DF39D595C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID:
                                                      • API String ID: 2221118986-0
                                                      • Opcode ID: e74d781beeba70443377cc54e8dc89fe99b30deb64ed9bc94750147b23a5e519
                                                      • Instruction ID: 946944e96fd2fac0106794c3cb472bd84c1b82b0ab38a8f2fe105de2b9dd40fd
                                                      • Opcode Fuzzy Hash: e74d781beeba70443377cc54e8dc89fe99b30deb64ed9bc94750147b23a5e519
                                                      • Instruction Fuzzy Hash: 42F10071B0A64B86E7448B18E8A076533A1FB857A5F584639F57DC72F8DF3CE9409B00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID:
                                                      • API String ID: 1767461275-0
                                                      • Opcode ID: 9939f8286bd76e136ddf70f6b0c03d9fd162aa04723856165e66f46745857cf1
                                                      • Instruction ID: dd5f9003ee6f9f91b4933a08c00d3177e08c824ccbe496fea34111d7a300f233
                                                      • Opcode Fuzzy Hash: 9939f8286bd76e136ddf70f6b0c03d9fd162aa04723856165e66f46745857cf1
                                                      • Instruction Fuzzy Hash: B301D13672824186E7698F29D464B6D66E0FB84B8CF144175EAA8477EDEE3DDC81CB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 6a0b96f425a5ee0d893630f5dd57aa4e560a504ee9335403cda252f2fab9335b
                                                      • Instruction ID: 0817b06166f8969a4386b6aacb06e2ca54bb0460e2beaa57cc5da192f9aedbba
                                                      • Opcode Fuzzy Hash: 6a0b96f425a5ee0d893630f5dd57aa4e560a504ee9335403cda252f2fab9335b
                                                      • Instruction Fuzzy Hash: E4F062B1F0554386FB714A1584A4BB91251DBA6715F288031C5285E3FCDF39DCDAA602
                                                      APIs
                                                      • OPENSSL_sk_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFE7D5
                                                      • OPENSSL_sk_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFE7DE
                                                      • CRYPTO_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFE7F3
                                                      • CRYPTO_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFE808
                                                      • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFEA0F
                                                      • OPENSSL_sk_num.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFEADF
                                                      • OPENSSL_sk_value.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFEAF6
                                                      • OPENSSL_sk_num.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDFACFFB25), ref: 00007FFDFACFEB52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_freeL_sk_numO_free$L_sk_valuememcmp
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c$@$P
                                                      • API String ID: 1579232405-1224705267
                                                      • Opcode ID: 5c6a68af4b433e16ca8adca9ff4cd8330f51ea81c8b46b3817939b04aaed013e
                                                      • Instruction ID: 5e5cea9e06dccdfb3818efb806cfcf1eca46dc31304c9efaad4039faad3721da
                                                      • Opcode Fuzzy Hash: 5c6a68af4b433e16ca8adca9ff4cd8330f51ea81c8b46b3817939b04aaed013e
                                                      • Instruction Fuzzy Hash: DB72733AB0868285EB588F25D460BBD27A1FB84B88F184175DE6D4B7D9DF3CE580C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Digest$Init_exL_cleanse$D_sizeFinal_exX_freeX_newY_free
                                                      • String ID: ..\s\ssl\statem\extensions.c$ext binder$res binder
                                                      • API String ID: 3409567581-999040457
                                                      • Opcode ID: 63637d66021c9fa90ee44de2d2a8ff2797bfe052b3a1239d6eef0564990fb5e3
                                                      • Instruction ID: 62f43826816bb905ed17f7235e4dfb8bcdff2b44d2895de405208cf452d8b404
                                                      • Opcode Fuzzy Hash: 63637d66021c9fa90ee44de2d2a8ff2797bfe052b3a1239d6eef0564990fb5e3
                                                      • Instruction Fuzzy Hash: 11C1A13E70879285EB788A12A864BBE67A5EB84784F444176DEAD47EDDDF3CD140CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_set_init$O_clear_flagsO_get_dataR_put_error$O_freeO_get_initO_pushO_set_nextO_set_shutdownO_up_refO_zalloc
                                                      • String ID: ..\s\ssl\bio_ssl.c$=
                                                      • API String ID: 2608601196-3341019427
                                                      • Opcode ID: 9f8a5afc2c3a4201c34a94a68da72c78de737977bd8e18c9460f781fc46890a1
                                                      • Instruction ID: 0c47f4ff69155c363d2360d049cbc098f6dc4c698b5365c767b007a3148deb33
                                                      • Opcode Fuzzy Hash: 9f8a5afc2c3a4201c34a94a68da72c78de737977bd8e18c9460f781fc46890a1
                                                      • Instruction Fuzzy Hash: BF313D15B0D66241FB1CE6669A31ABD56919F85FD0F0881B2ED7D0BBDEEF2CE5038204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_Format$malloc
                                                      • String ID: %s (%d:%d)
                                                      • API String ID: 1817594650-1595188566
                                                      • Opcode ID: e372b7582e79f4aaff04c3da24ee78153362490d1d12ccc318199ba0f7aa12b4
                                                      • Instruction ID: 85cd19b82df6648280ea008116bffe17e3c22ac5eabed54cdeea08dae0d89b1e
                                                      • Opcode Fuzzy Hash: e372b7582e79f4aaff04c3da24ee78153362490d1d12ccc318199ba0f7aa12b4
                                                      • Instruction Fuzzy Hash: 9F02D171329B4481EF04CB6AD89875937A2FB85BC9F84485ECE6E07B51DF39C191C782
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Cleanup$closesocketntohlsetsockopt$gethostbynamehtonsrecvfromsendtosocket
                                                      • String ID:
                                                      • API String ID: 4173868332-0
                                                      • Opcode ID: 24adc586a4574c2bc06a4c0dfb7c2646fb5d90426492496d0646bf1a51b5e00a
                                                      • Instruction ID: ab828c251473161cc3cb2b6f0852a2139a441c6e3c075224b42cfd03df4426d6
                                                      • Opcode Fuzzy Hash: 24adc586a4574c2bc06a4c0dfb7c2646fb5d90426492496d0646bf1a51b5e00a
                                                      • Instruction Fuzzy Hash: F551A032305A8086E7109B29F91831AB7A2F789BB5F440329EE7947BE4DF7EC444CB05
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X_iv_length
                                                      • String ID: ..\s\ssl\record\ssl3_record_tls13.c$M
                                                      • API String ID: 507009519-1371881060
                                                      • Opcode ID: c39c208b24c1e58d44d09def6d7f21fd9820e64c0c171c53c5598e0e7beea608
                                                      • Instruction ID: b13238d9a247a7f76b11e19b0bfea45b97915775ad60496939ca61c8584c2824
                                                      • Opcode Fuzzy Hash: c39c208b24c1e58d44d09def6d7f21fd9820e64c0c171c53c5598e0e7beea608
                                                      • Instruction Fuzzy Hash: 11E1C32AB0868289FB289B65D420BBD37A1FB54788F044176DE6D4BACDDF3DD465C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Cryptclock$Context$Acquire$RandomRelease
                                                      • String ID: ($Microsoft Base Cryptographic Provider v1.0$out != NULL$src/prngs/rng_get_bytes.c
                                                      • API String ID: 2525729555-3762154145
                                                      • Opcode ID: df99ce4dff9fd0c8d7af48840fbca60671ad45095334dd37e2e934be85ba187a
                                                      • Instruction ID: 895d6f00062a5d18b69e2853914bbea0b9b4d155a1fa9049b759e87a251092c1
                                                      • Opcode Fuzzy Hash: df99ce4dff9fd0c8d7af48840fbca60671ad45095334dd37e2e934be85ba187a
                                                      • Instruction Fuzzy Hash: 9B31FC72708B50C1E710CB66FC4875A76A6B789B94F409026DE8647714EFBAC447C741
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_cleanse$O_free$D_lock_newO_mallocO_strdupO_strndupX509_chain_up_refX509_up_ref_time64memcpy
                                                      • String ID: ..\s\ssl\statem\extensions_srvr.c$D:\a\1\s\ssl\packet_local.h
                                                      • API String ID: 2801444773-2178723975
                                                      • Opcode ID: efba1e18f2bdcda67f50107f010bac30fccca9259d7259b91766c30014915d19
                                                      • Instruction ID: 6bd50d200b3d7f3913a8649106b9a13e33f9e52fc079692870864da7ec7ce84e
                                                      • Opcode Fuzzy Hash: efba1e18f2bdcda67f50107f010bac30fccca9259d7259b91766c30014915d19
                                                      • Instruction Fuzzy Hash: E312E376B0868285E7688B21E964ABD67A0FB84B84F044175DEAD577CCDF7DE980C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_free$memcpy$L_cleanseO_mallocmemset
                                                      • String ID: ..\s\ssl\s3_lib.c
                                                      • API String ID: 2649524955-4238427508
                                                      • Opcode ID: c8176c414889550db18000435abb5a1deba6356550613b413f080dcc09cb8534
                                                      • Instruction ID: 1d9b035b8ddc50a22c32a1452ddf3446bee5a281c484f94445cc5992fdaec642
                                                      • Opcode Fuzzy Hash: c8176c414889550db18000435abb5a1deba6356550613b413f080dcc09cb8534
                                                      • Instruction Fuzzy Hash: BC51BD36709B8196EB589F16E850AAE67A4FB44FC4F088072DEAD47798DF3DE061C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_mem_ctrl$L_sk_newL_sk_pushL_sk_sortO_mallocP_get_nameP_get_typeP_zlib
                                                      • String ID: ..\s\ssl\ssl_ciph.c
                                                      • API String ID: 680475741-1847046956
                                                      • Opcode ID: 62ee42c7a7c76134d40cdec2259d5c75cc418fa19301ec1af2a8b91bded5920c
                                                      • Instruction ID: 2e143ba39de328cb2f468bb40c9414066005b060d9005596dbef6776389a2543
                                                      • Opcode Fuzzy Hash: 62ee42c7a7c76134d40cdec2259d5c75cc418fa19301ec1af2a8b91bded5920c
                                                      • Instruction Fuzzy Hash: CE111820F0971281FB08AB92EC35BB86795EF80B84F0884B5E96D473DEEE7DE4508601
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID:
                                                      • API String ID: 1649606143-0
                                                      • Opcode ID: 98f52b6337070ba2003eff1c74b65ff3ecd04ed43030bd47901021b998995126
                                                      • Instruction ID: a2f426f2fa1a4029c4ceb9b7534bd8116e035cf5ea28af8f525a32ecce43dbf8
                                                      • Opcode Fuzzy Hash: 98f52b6337070ba2003eff1c74b65ff3ecd04ed43030bd47901021b998995126
                                                      • Instruction Fuzzy Hash: F7219D77F3060367F7082B61A8E16686252FFE8726F974938C61F432A58F7E88624610
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freememcpy$O_zalloc
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c
                                                      • API String ID: 150470908-348624464
                                                      • Opcode ID: 7ed8261e18c647449998ee15a0f58b8ac9be81ac96b5578fa55dbb528074d4ad
                                                      • Instruction ID: 27c62359ef2c17a79aec21e699411c17b559c88f37e9d7eadb85b99cf5cf0d7c
                                                      • Opcode Fuzzy Hash: 7ed8261e18c647449998ee15a0f58b8ac9be81ac96b5578fa55dbb528074d4ad
                                                      • Instruction Fuzzy Hash: F002A572B0869181EB288B11E864B7D7BA5EB45B94F18C175EBAD076DDEF3CE190C700
                                                      APIs
                                                      • BN_bin2bn.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF03D7
                                                      • BN_bin2bn.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF03EB
                                                      • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF05A8
                                                      • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF05B0
                                                      • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF05B8
                                                      • DH_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF05C0
                                                      • EVP_PKEY_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDFACEE15A), ref: 00007FFDFACF05C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: N_free$N_bin2bn$H_freeY_free
                                                      • String ID: ..\s\ssl\statem\statem_clnt.c
                                                      • API String ID: 2982095754-1507966698
                                                      • Opcode ID: 5b26efb0f1d9fd9473064d21a1459186114b52cb0849ada1c677f9fa0fd7a3e6
                                                      • Instruction ID: 0c0e7ffd15e04be2aca2b65c31ee64914106a780651dea96eb93f95eda7e7ee3
                                                      • Opcode Fuzzy Hash: 5b26efb0f1d9fd9473064d21a1459186114b52cb0849ada1c677f9fa0fd7a3e6
                                                      • Instruction Fuzzy Hash: B991EA66B087D145EB649B15A820BBE67A0FB85B84F048070EE9D57BCDEF7CE5908B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_unlockD_write_lockH_deleteH_retrieveO_clear_flagsO_freeO_set_flagsO_snprintfR_add_error_datamemcpy
                                                      • String ID: ..\s\ssl\record\rec_layer_d1.c$SSL alert number
                                                      • API String ID: 928870745-720991377
                                                      • Opcode ID: b0c2367399d4bc5fd70d7f63f443ab87af3f5d07c1579e33928aa2e7ea6bd7ea
                                                      • Instruction ID: b5293907ec2d1dc357a29b8719ae07e782a6845da3a946fe1c3d4c3e137e0226
                                                      • Opcode Fuzzy Hash: b0c2367399d4bc5fd70d7f63f443ab87af3f5d07c1579e33928aa2e7ea6bd7ea
                                                      • Instruction Fuzzy Hash: B812947AB18A4285FB688F659434BBD26E0EB44B48F084176DE6D4F6CDDF7CE4428710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_zalloc$J_nid2snP_get_digestbyname
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 4284552970-1080266419
                                                      • Opcode ID: f6cc87e6b05e7f55d33cb5daac34941b4575cab0649bc418a77131c6fd7575bc
                                                      • Instruction ID: 17a79e4c96b35ed4164ba00f489d0adcca4034c6add87e44da70d219442a3ef3
                                                      • Opcode Fuzzy Hash: f6cc87e6b05e7f55d33cb5daac34941b4575cab0649bc418a77131c6fd7575bc
                                                      • Instruction Fuzzy Hash: E631E025B08BD186EB189B25E860BBD77A0EB40784F4841B5EEAD077DEEE7DE111C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_mem_ctrl$L_sk_newL_sk_pushL_sk_sortO_mallocP_get_type
                                                      • String ID: ..\s\ssl\ssl_ciph.c
                                                      • API String ID: 2525466407-1847046956
                                                      • Opcode ID: 633e3f8a5b1f2117c4688fb6f59ea72fef34a6c0fab0f04b0c1034370f3ab914
                                                      • Instruction ID: 2e1534569ae0012e90de9fc286e74ceec9e5116a3295f7942c27fc470439f34b
                                                      • Opcode Fuzzy Hash: 633e3f8a5b1f2117c4688fb6f59ea72fef34a6c0fab0f04b0c1034370f3ab914
                                                      • Instruction Fuzzy Hash: C4112A20F0961241FB08AB52EC35BB86655EF80B80F4844B5E96D473DFEE7DE4508600
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Mem_$SubtypeType_$DataFreeFromKindMallocReallocUnicode_
                                                      • String ID:
                                                      • API String ID: 1742244024-0
                                                      • Opcode ID: 2d17a493920b6b36c6fa0658f81e569c9b995c639d436fc25a26417b6e17d25f
                                                      • Instruction ID: 7857e4f4c3683264016164c9d5762b5346db51276db53e722c5cec7188be07a9
                                                      • Opcode Fuzzy Hash: 2d17a493920b6b36c6fa0658f81e569c9b995c639d436fc25a26417b6e17d25f
                                                      • Instruction Fuzzy Hash: EA020272B08BC282E76D8B15D474A7937A1EF44744F1441B6DABE8A7D8EF2DE44AC310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 313767242-0
                                                      • Opcode ID: d5821aaf4936ad9aa18e348792a4e6496cc638c229f42c96d8f2983ca85ed40f
                                                      • Instruction ID: bc26b98743fd5b47aea9aa982208efe0cead957efec10bbba9b8b7aa852cbc34
                                                      • Opcode Fuzzy Hash: d5821aaf4936ad9aa18e348792a4e6496cc638c229f42c96d8f2983ca85ed40f
                                                      • Instruction Fuzzy Hash: 13314D72709BC289EBA88F60E860BED7364FB84744F44403ADA5E47A98DF38D64DC714
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_flagsO_set_dataO_set_initO_zallocR_put_error
                                                      • String ID: ..\s\ssl\bio_ssl.c$=
                                                      • API String ID: 3341103989-3341019427
                                                      • Opcode ID: 48d02881f3e19af4b2fca5a1682b77c9912c6a67a56c44d3c613b17f343fb1eb
                                                      • Instruction ID: f20447e27d4858a756b9510e2fd4fa98ccf503eb03a38734d8514faa22557677
                                                      • Opcode Fuzzy Hash: 48d02881f3e19af4b2fca5a1682b77c9912c6a67a56c44d3c613b17f343fb1eb
                                                      • Instruction Fuzzy Hash: 3811E3667181C381D7059F39E8606EC6B61DB4AB94F0CC1B1EBE8036CAEE2CD954CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: memcpy$O_memcmpX_freeX_new
                                                      • String ID: ..\s\ssl\statem\statem_lib.c$l
                                                      • API String ID: 1067491572-3956761411
                                                      • Opcode ID: 36408464f3e90efd755dc524d1c4b01bbc5d2b6dc59a81f20e2b25272c1d4117
                                                      • Instruction ID: 885663ff05a67ee54f642125f84f466bd3c83ac893e88a74aa49e0c78861f21a
                                                      • Opcode Fuzzy Hash: 36408464f3e90efd755dc524d1c4b01bbc5d2b6dc59a81f20e2b25272c1d4117
                                                      • Instruction Fuzzy Hash: 6491AD36B0868286EB688B15D460BBD37A0FB84F88F184075DA9D4B6DDDF3CE580D761
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c$D:\a\1\s\ssl\packet_local.h
                                                      • API String ID: 0-1534007912
                                                      • Opcode ID: 270747481b80c7071de28a7253d6d596a10d01aaa112001c6c67a617bda65a7e
                                                      • Instruction ID: 5d73faf5fe216d787d556b76a1269918e5bd9aabdc09cce74dd2fde76d14c62f
                                                      • Opcode Fuzzy Hash: 270747481b80c7071de28a7253d6d596a10d01aaa112001c6c67a617bda65a7e
                                                      • Instruction Fuzzy Hash: BD518072B18A9195F7648B11E860BEA7760FB84B84F488171DAAC17BDDEF3CD685C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_memdup
                                                      • String ID: ..\s\ssl\statem\extensions_cust.c
                                                      • API String ID: 3962629258-3973221358
                                                      • Opcode ID: 39bba86c631204e598ff62e639f37f5f73046ccd44f2d89d291084cdaa1d33ad
                                                      • Instruction ID: 6aa61f8be1db331eaf3b680cf9113158a2741dd789ab24dd68ba406339e67b44
                                                      • Opcode Fuzzy Hash: 39bba86c631204e598ff62e639f37f5f73046ccd44f2d89d291084cdaa1d33ad
                                                      • Instruction Fuzzy Hash: 2741A23AB09B4281EB59DB51E8A0AAD63A4FF84784F064076DEAC477D8EF7CD581C340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: F_parse_listR_put_error
                                                      • String ID: ..\s\ssl\t1_lib.c
                                                      • API String ID: 2930615231-1643863364
                                                      • Opcode ID: e69b323ae78e1e14498b2200c6138549e17e8fb2c7405859ec6477f961b4a127
                                                      • Instruction ID: cdc2ec97b0a286b79d7a2b5e39c823e7aa149d53285482f561afdcd65b1243fb
                                                      • Opcode Fuzzy Hash: e69b323ae78e1e14498b2200c6138549e17e8fb2c7405859ec6477f961b4a127
                                                      • Instruction Fuzzy Hash: 22416F22B096A286E7688B11EC20BEA7761FB84740F498175DE6D077CDEF7CF5458700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$D_lock_newO_freeO_zalloc
                                                      • String ID: ..\s\ssl\ssl_cert.c$B
                                                      • API String ID: 3411496311-1824687510
                                                      • Opcode ID: 889f6ff03f0a5cde185c8a82e368881b76037717ce5f1044877cf7ef1abf095c
                                                      • Instruction ID: d9891dbcec6480b25c55e60e152f0960649da71d97e843c53531c32c8da75d04
                                                      • Opcode Fuzzy Hash: 889f6ff03f0a5cde185c8a82e368881b76037717ce5f1044877cf7ef1abf095c
                                                      • Instruction Fuzzy Hash: 47118E31B0965282F759DF21D820BE937A0EB44708F884175DA6C4B3CAEF7EE685CB54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_flagsO_freeO_get_dataO_get_initO_get_shutdownO_set_init
                                                      • String ID: ..\s\ssl\bio_ssl.c
                                                      • API String ID: 3531300166-4039210333
                                                      • Opcode ID: b42fafa9bfc7a4b513fe56510db0a8dc245545e9252ab44829cdd493434299b0
                                                      • Instruction ID: 02fba5e7fdb69716c166b7104e36348df3d710126e60f5e5a5fd5020744110a4
                                                      • Opcode Fuzzy Hash: b42fafa9bfc7a4b513fe56510db0a8dc245545e9252ab44829cdd493434299b0
                                                      • Instruction Fuzzy Hash: 10012118F1969241FB5CA6765A72B7D02919F85B90F0891B1ED3E8B7CEEE1CE4518200
                                                      APIs
                                                      • CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFAD0255C
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_malloc.LIBCRYPTO-1_1 ref: 00007FFDFACB88C9
                                                        • Part of subcall function 00007FFDFACA1C08: memset.VCRUNTIME140 ref: 00007FFDFACB88F7
                                                        • Part of subcall function 00007FFDFACA1C08: memcpy.VCRUNTIME140 ref: 00007FFDFACB8933
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB8956
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB89BD
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB8A38
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_free$O_mallocmemcpymemset
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c
                                                      • API String ID: 2470733610-348624464
                                                      • Opcode ID: 50b3bad1abb4b9d846e0e758135b3a2cec863cf1ab3c48fa19741f9eb94a6d44
                                                      • Instruction ID: 658b568c1bca94fe4c1bb25854a51814c9302b524bbbb887ca9ee082bf5ca3ac
                                                      • Opcode Fuzzy Hash: 50b3bad1abb4b9d846e0e758135b3a2cec863cf1ab3c48fa19741f9eb94a6d44
                                                      • Instruction Fuzzy Hash: 2161C231B0969285E7688B16D864BBD2A91EF80B94F1C8171CF6D4B7DDEF3CE5418700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_malloc
                                                      • String ID: ..\s\ssl\statem\extensions_clnt.c
                                                      • API String ID: 2609694610-592572767
                                                      • Opcode ID: 9d69b8015897f1e9bedce570a2950d973765c3608f8158ad4e0e97ed20bf38b4
                                                      • Instruction ID: 1662f583af08e94c7110b4ca2f23a58c733a1a24996ce49bcfd3830d5f4af7b9
                                                      • Opcode Fuzzy Hash: 9d69b8015897f1e9bedce570a2950d973765c3608f8158ad4e0e97ed20bf38b4
                                                      • Instruction Fuzzy Hash: 7B619C76B09A8181E7558F16E4A06AD77A4FB84BD8F088271DFAC47BD8DF78D291C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_reallocR_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1389097454-1080266419
                                                      • Opcode ID: 63e2663c754880bb106e37b339aa22cddf3303fbb3ecde4b0085c37ec793007d
                                                      • Instruction ID: e543dc4be28d744e39a7480545897be234f96ac9f6cd63d4cf8db85e57d362dc
                                                      • Opcode Fuzzy Hash: 63e2663c754880bb106e37b339aa22cddf3303fbb3ecde4b0085c37ec793007d
                                                      • Instruction Fuzzy Hash: C0310136B097D596E719CB25A914AAE6790FB44788F488171EE6C037E8EF3CE152C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free$O_mallocR_put_error
                                                      • String ID: ..\s\ssl\t1_lib.c
                                                      • API String ID: 2563039504-1643863364
                                                      • Opcode ID: f48377fe411956e23c2321321ebbe80bd26c650d6c1dc80da4a23891d7b107f2
                                                      • Instruction ID: 7ff1b58aeaf1f52e36f7ec7367bc1ffed2f6c9990fb8073efb0cf655907e21a2
                                                      • Opcode Fuzzy Hash: f48377fe411956e23c2321321ebbe80bd26c650d6c1dc80da4a23891d7b107f2
                                                      • Instruction Fuzzy Hash: 33316132B08BA681E7148B11D920AADB761EB85B84F488171DA6C43BDDFF7DF501C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free$L_sk_pop_free
                                                      • String ID: ..\s\ssl\ssl_conf.c
                                                      • API String ID: 1650471521-1527728938
                                                      • Opcode ID: 931636c360a65359e9d0292b47e619b5ca8f2a780e46915865d3cef0e9c9ef19
                                                      • Instruction ID: e8ec41fc4cf6aeb940ee81546c1b22bc865662fd865dddd00097be0068a0dba6
                                                      • Opcode Fuzzy Hash: 931636c360a65359e9d0292b47e619b5ca8f2a780e46915865d3cef0e9c9ef19
                                                      • Instruction Fuzzy Hash: 9001B935B1869291EB48A761EC60AF86750FF45B80F489072EA9D477DDDE2CD205C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free$X_free
                                                      • String ID: ..\s\ssl\statem\statem_dtls.c
                                                      • API String ID: 306345296-3140652063
                                                      • Opcode ID: d7588cd2e04481a81dce5643a63bc09e4554256382223ed5415a887bddb999a0
                                                      • Instruction ID: eadaf2fcbf5dfaf720697a810c9b896e7e68cc8843ba7e49d7bac94af4b5fd1b
                                                      • Opcode Fuzzy Hash: d7588cd2e04481a81dce5643a63bc09e4554256382223ed5415a887bddb999a0
                                                      • Instruction Fuzzy Hash: 56F03C65F1825684FB18AB25C871FB81761EF44B84F0490B1EE2D4B6DEEE1ED9518710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_malloc$O_free
                                                      • String ID: ..\s\ssl\record\ssl3_buffer.c
                                                      • API String ID: 2640950527-837614940
                                                      • Opcode ID: d741ff2e5a711ab41dbdd4ba2af614ecfe72f57be2cc44fb9e64ebc82e881251
                                                      • Instruction ID: 3e0f0d2900e91db5cfde74b1272471693b58be5cdd2201de6d3ebde0d8cb3780
                                                      • Opcode Fuzzy Hash: d741ff2e5a711ab41dbdd4ba2af614ecfe72f57be2cc44fb9e64ebc82e881251
                                                      • Instruction Fuzzy Hash: 4D418A76B08B9186FB289B21E9607BD62A1FB84B88F084534DE9C4BBCDDF3CD5418744
                                                      APIs
                                                      • CRYPTO_realloc.LIBCRYPTO-1_1(?,?,?,00007FFDFACDFDFA,?,?,?,00007FFDFACDF8CE), ref: 00007FFDFACDFBF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_realloc
                                                      • String ID: ..\s\ssl\statem\extensions_cust.c$3$t3
                                                      • API String ID: 3931833713-171970420
                                                      • Opcode ID: b392fcddb5250a26411051d839e1c0e5e1ae8f0fb2f26dcddbe2083a83bb6419
                                                      • Instruction ID: a95515b656617bc636b072d74c431be63314dfbe2c91cb38a29f24d0dda8c091
                                                      • Opcode Fuzzy Hash: b392fcddb5250a26411051d839e1c0e5e1ae8f0fb2f26dcddbe2083a83bb6419
                                                      • Instruction Fuzzy Hash: D641B076B08B8281EB688F0A94A063DB7A0FB48B84F144175DEAD437E8DF3DD552C314
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_memdup
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c$D:\a\1\s\ssl\packet_local.h
                                                      • API String ID: 3962629258-1534007912
                                                      • Opcode ID: 912c18b4b738ef83e4d1abd1b3bd56bc7977daccbf4dcb0854bb1b9939390f36
                                                      • Instruction ID: 89ddd26727233a045aa51ca0080dc377023d9172affcd065885bc77b276f3129
                                                      • Opcode Fuzzy Hash: 912c18b4b738ef83e4d1abd1b3bd56bc7977daccbf4dcb0854bb1b9939390f36
                                                      • Instruction Fuzzy Hash: 8441A276B19B9185E7448B11E850ABAB7A4FB88784F088235EF9D47B9DFF3CD1908700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: M_growO_zallocR_put_error
                                                      • String ID: ..\s\ssl\packet.c
                                                      • API String ID: 1461889847-1434567093
                                                      • Opcode ID: 1f47639709bcac93299381c1e6b7fc42ff1df6717c50211d7f67010c57566ac4
                                                      • Instruction ID: fa957053bdc21ae88987addd83da7698c9fb87545cab4bc5942b93f2bf56557c
                                                      • Opcode Fuzzy Hash: 1f47639709bcac93299381c1e6b7fc42ff1df6717c50211d7f67010c57566ac4
                                                      • Instruction Fuzzy Hash: 7E415B26709A4582EF18CF25E56077DA3A0EB48BA8F144236DF6D477D8EF38E4918300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_mallocR_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 2160744234-1080266419
                                                      • Opcode ID: 566b95f80fe8c065b060eaeee4154ac787cd45fc6970969ddcc41688409e8c77
                                                      • Instruction ID: 55c18ccb8164a70a94b020ea03236914231a5ce1017b279e9e870a3e19dd13a2
                                                      • Opcode Fuzzy Hash: 566b95f80fe8c065b060eaeee4154ac787cd45fc6970969ddcc41688409e8c77
                                                      • Instruction Fuzzy Hash: 0F31D036B0979181EB59CF14D66467C67A2FB84B80F4998B1DAAD03BD8EF7DE541C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_mallocmemcpy
                                                      • String ID: ..\s\ssl\statem\statem_lib.c$J
                                                      • API String ID: 1834057931-671735911
                                                      • Opcode ID: 34f5634b694e926d620c959cb5180fa818f51c2cb60d9578e5404ae5361f0932
                                                      • Instruction ID: 3f2b3767d3e1a33a9f1f9db0d795d8e73e26c8ffeea23cb760e548a3ece32d42
                                                      • Opcode Fuzzy Hash: 34f5634b694e926d620c959cb5180fa818f51c2cb60d9578e5404ae5361f0932
                                                      • Instruction Fuzzy Hash: 1321A122B18B8192E710CF15E9106ADB720FB98BC4F449261EF9C4775AEF38E2D5C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_malloc
                                                      • String ID: ..\s\ssl\record\ssl3_buffer.c
                                                      • API String ID: 2609694610-837614940
                                                      • Opcode ID: 15d75eb3ed5d2e6069904f1d373d05e1aad43397cb4edfdab485537f9ab1bfc2
                                                      • Instruction ID: 190a6834054eaef7df55cc33dbf08def0438c739a860b8b81f60abfc98a215d1
                                                      • Opcode Fuzzy Hash: 15d75eb3ed5d2e6069904f1d373d05e1aad43397cb4edfdab485537f9ab1bfc2
                                                      • Instruction Fuzzy Hash: 6631CD36B09B5186EB24AB61E820BBD62A5FB44BD4F084534EEAC0BBCCDF3CD5508740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 2581946324-1080266419
                                                      • Opcode ID: 4253ae8c874d11bea1108d07e1bfadb9617e7f09e6be4afada3a6f124a05c2d5
                                                      • Instruction ID: b1926782f6e9fc640cbe2d570630b61b187daa44c60168bc6c76f55322ed658e
                                                      • Opcode Fuzzy Hash: 4253ae8c874d11bea1108d07e1bfadb9617e7f09e6be4afada3a6f124a05c2d5
                                                      • Instruction Fuzzy Hash: 3921C435F2469282E7588B20F825F6D67A2EF80B88F594071DE5C07BC8EF2EE152C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_malloc
                                                      • String ID: ..\s\ssl\record\ssl3_buffer.c$F
                                                      • API String ID: 1457121658-4203526889
                                                      • Opcode ID: bc4d42b0d2b80e4de7f0d2e3c57499cf57e551f4add88f94e2ce3cfbc6a2e80c
                                                      • Instruction ID: 8e201497bfb611ab9949b1660ea0b2b25798f94fdd5d24d75d51d1593d573b19
                                                      • Opcode Fuzzy Hash: bc4d42b0d2b80e4de7f0d2e3c57499cf57e551f4add88f94e2ce3cfbc6a2e80c
                                                      • Instruction Fuzzy Hash: 4411AF36B09A9181E7149B15E9107AD67A0FB88BC4F084135EF9C87BCDDF3DD5818B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_free
                                                      • String ID: ..\s\ssl\statem\statem_clnt.c$@
                                                      • API String ID: 2011826501-1207107681
                                                      • Opcode ID: fd5f480ad1edc1114eb5b1ecb6a23b489712910ceeab22f547824a3889f100b3
                                                      • Instruction ID: 564ef9d18705bbba8fbc162e0edefdaa91fa8d3c5c9e7b9c69fc84c64649ffdb
                                                      • Opcode Fuzzy Hash: fd5f480ad1edc1114eb5b1ecb6a23b489712910ceeab22f547824a3889f100b3
                                                      • Instruction Fuzzy Hash: 32211F29B0878185E7688B129A64ABD7795EB45FD4F0840B1CE5D1BBDDCF3DF5819300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_strdup
                                                      • String ID: ..\s\ssl\s3_lib.c
                                                      • API String ID: 2148955802-4238427508
                                                      • Opcode ID: 4fcc587332fcd85da71337ecb7517b00310b11705aad0983c4cd1313d0b66de5
                                                      • Instruction ID: bbdb48373fbdf5be8b7d764b671c30ad78d7d7b687bc6920f5df38d3066e7b05
                                                      • Opcode Fuzzy Hash: 4fcc587332fcd85da71337ecb7517b00310b11705aad0983c4cd1313d0b66de5
                                                      • Instruction Fuzzy Hash: 54110429B0C66245F7685B46E420BBCA750FB81B84F040076DADC0B7CCDF7EE6528705
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_memdup
                                                      • String ID: ..\s\ssl\s3_lib.c
                                                      • API String ID: 3962629258-4238427508
                                                      • Opcode ID: 3108a5092fda8c8bee01f408271f6aa1c4df9363ff0874777839b1e8f9030971
                                                      • Instruction ID: eb91da5de5a2c7a9fb8e3beb2294e4a1800fe84e1431bac7125921595f26153b
                                                      • Opcode Fuzzy Hash: 3108a5092fda8c8bee01f408271f6aa1c4df9363ff0874777839b1e8f9030971
                                                      • Instruction Fuzzy Hash: 7C016131B0AB9251EB999B15E8507E9A690FF48BC0F484075EF6C47B99EF3CE5618700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_memdup
                                                      • String ID: ..\s\ssl\ssl_sess.c
                                                      • API String ID: 3962629258-2868363209
                                                      • Opcode ID: 2dc206ac1897eba174e4d68926f44c31a7b3390a93b44d875a904ad68d885eb1
                                                      • Instruction ID: a664023d930a1f984fd5dfbb7ce9ab62b6f51329af3494596e37c23a52fb746e
                                                      • Opcode Fuzzy Hash: 2dc206ac1897eba174e4d68926f44c31a7b3390a93b44d875a904ad68d885eb1
                                                      • Instruction Fuzzy Hash: AC018E25B19B8141E7959B1ABD546AC62A0EF44BC4F084171EE6D5BBCDEF3CD4418314
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\statem\extensions_cust.c
                                                      • API String ID: 2581946324-3973221358
                                                      • Opcode ID: 3cf5db9897d16314f6c406a7537cbdf5f713d31316b71214a26921031eca8072
                                                      • Instruction ID: 09a1d4448dc66fe856a2e294ef9d714646d039a531105d2776d8a94619260920
                                                      • Opcode Fuzzy Hash: 3cf5db9897d16314f6c406a7537cbdf5f713d31316b71214a26921031eca8072
                                                      • Instruction Fuzzy Hash: 2C01A135B59A8280E7549B15ECA0AAD6760FF44B84F088076EEAD47ADDEF3CD580C740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_memdup
                                                      • String ID: D:\a\1\s\ssl\packet_local.h
                                                      • API String ID: 3962629258-373350680
                                                      • Opcode ID: 6eceafe0f9ac89be950eaf40397fa8a42b0b463cabdcf8e0bbc67e2867511beb
                                                      • Instruction ID: 79f3f4442672940e27155db4ed17467048c4ce089dfe6919845c90ed05e15cec
                                                      • Opcode Fuzzy Hash: 6eceafe0f9ac89be950eaf40397fa8a42b0b463cabdcf8e0bbc67e2867511beb
                                                      • Instruction Fuzzy Hash: 42012C32B16B9280EB548F12EC90A5967A4EB58BC0F089471EFAC97B89EE3CD551C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_zallocR_put_error
                                                      • String ID: ..\s\ssl\packet.c
                                                      • API String ID: 2718799170-1434567093
                                                      • Opcode ID: 59326ab27369182db2ce9892aaeb255d9a41e7f068212e692eec0036cf6bba17
                                                      • Instruction ID: a03929a4214897225a4b72166d9162a14667627da7903769b6ca4f6444344ca4
                                                      • Opcode Fuzzy Hash: 59326ab27369182db2ce9892aaeb255d9a41e7f068212e692eec0036cf6bba17
                                                      • Instruction Fuzzy Hash: 09017C7670AA0586FB18CF24E8207AC33A0EB04B18F644034DA1C473D9EF3DE996C740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_strdup
                                                      • String ID: ..\s\ssl\ssl_sess.c
                                                      • API String ID: 2148955802-2868363209
                                                      • Opcode ID: dc3d2fc0f14784eb2e146324ee3a97f3f81b5d0262eaa536f718f385f35f1364
                                                      • Instruction ID: 3470e4663d5e55f6324d4f1931bfdddd0fd4e79498caf1b3a0ea60f3d10e7221
                                                      • Opcode Fuzzy Hash: dc3d2fc0f14784eb2e146324ee3a97f3f81b5d0262eaa536f718f385f35f1364
                                                      • Instruction Fuzzy Hash: CFF0F921B0864141EB98CB16FD90AAD6291DF48BD0F08C171DE6C477DDEE2CD1918200
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_strndup
                                                      • String ID: D:\a\1\s\ssl\packet_local.h
                                                      • API String ID: 2641571835-373350680
                                                      • Opcode ID: 4da2ad94cbdcd89c89d071f6cd9ad530b8028bab093b2de902632526adc10d13
                                                      • Instruction ID: 5bb1c99400b0ce6c315d9423e95a25b45180fab042bd03a26a9298f220eae26e
                                                      • Opcode Fuzzy Hash: 4da2ad94cbdcd89c89d071f6cd9ad530b8028bab093b2de902632526adc10d13
                                                      • Instruction Fuzzy Hash: 9AF0A731B04A8681EB089B62EC61AEC5361DF48BD4F088036EE1D877DDDE3CD5518300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\record\rec_layer_d1.c
                                                      • API String ID: 2581946324-1306860146
                                                      • Opcode ID: b744f287a583ebc406d5d1e8af1339cdfdc21cdaa138d3438ff3db7c8e82df2b
                                                      • Instruction ID: 4ae6e03c61ab94a27f121c0d9ae2eb4dcd9dd87f0bc7473e0d198b2a88cfac26
                                                      • Opcode Fuzzy Hash: b744f287a583ebc406d5d1e8af1339cdfdc21cdaa138d3438ff3db7c8e82df2b
                                                      • Instruction Fuzzy Hash: FC51712A71964281EB589F66D4706BD63A0EF44FC4F184172EE6E8F7D9DF2DE4428310
                                                      APIs
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA93F5
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA940B
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA9455
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA946B
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA94B5
                                                        • Part of subcall function 00007FFDFACA1933: CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA94CB
                                                      • CRYPTO_free.LIBCRYPTO-1_1 ref: 00007FFDFACA6502
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\d1_lib.c
                                                      • API String ID: 2581946324-490761327
                                                      • Opcode ID: f8d941385c68614edf806b7a4375bc955e813e478e731d940c92b0d396df59e7
                                                      • Instruction ID: c6695799d606f43e8ac0bdde002b852926ddf0b6892b87174e7da92c5d9069e2
                                                      • Opcode Fuzzy Hash: f8d941385c68614edf806b7a4375bc955e813e478e731d940c92b0d396df59e7
                                                      • Instruction Fuzzy Hash: C0F0AF2AB4868240EB58ABA1D8757FD2721EF84F48F084075EE6E4F2DBDF2CE1418351
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\record\ssl3_record.c
                                                      • API String ID: 2581946324-2721125279
                                                      • Opcode ID: 309ac8ddcce84b15061a267a37eda474b70396621fe7370d901befdeee5a4623
                                                      • Instruction ID: aae10eb7a0f9c1c9553ec4a8f3849b1324cb24e4a86a5abaff5613f8c0dd57e4
                                                      • Opcode Fuzzy Hash: 309ac8ddcce84b15061a267a37eda474b70396621fe7370d901befdeee5a4623
                                                      • Instruction Fuzzy Hash: 63F0B436B2866180EB546B10E8A067C67A4EF48BD0F585071FE5D8778CEE38D040C740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\statem\extensions.c
                                                      • API String ID: 2581946324-1165805907
                                                      • Opcode ID: c154ed0c23af4f4a2ab3c94700327fb069ddd3c2668019da7fb3bde8ec48adac
                                                      • Instruction ID: 29dfc1e2a1b12430a74d7f531f327926876aa6464aedc2645bd168b76766e495
                                                      • Opcode Fuzzy Hash: c154ed0c23af4f4a2ab3c94700327fb069ddd3c2668019da7fb3bde8ec48adac
                                                      • Instruction Fuzzy Hash: 8DF0E5B2B026418AF7909B3998547982290DB84728F180230DE3C8B3C4EF2B84E2C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_free
                                                      • String ID: ..\s\ssl\s3_enc.c
                                                      • API String ID: 2011826501-1839494539
                                                      • Opcode ID: 3e56d6e5097e9e77bbd94c0740dce32d0ddc086580798f7b128f31d64f16f7fc
                                                      • Instruction ID: e109d0dbdb9e66fb2629e67232d562bb387ea94cab6a74d6a794a8c235d211d7
                                                      • Opcode Fuzzy Hash: 3e56d6e5097e9e77bbd94c0740dce32d0ddc086580798f7b128f31d64f16f7fc
                                                      • Instruction Fuzzy Hash: 35F06D76B08B8094EB849B69E8997EC3360EB48F94F584172DE1D8B3E5CF29D097C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\statem\extensions.c
                                                      • API String ID: 2581946324-1165805907
                                                      • Opcode ID: 8150e764a444205da16b7e6d16c2451858097d1fc5ab2b90cb2f68dd08693227
                                                      • Instruction ID: 8de67b00ab7acabcc4ae0f4d9cfce30dda325ab92b76cfe096b81d0311f46f36
                                                      • Opcode Fuzzy Hash: 8150e764a444205da16b7e6d16c2451858097d1fc5ab2b90cb2f68dd08693227
                                                      • Instruction Fuzzy Hash: A0E0C266B0264048F7809B64CC117D42294DF48B14F0800319E2CCBBCAFE3AC1A18314
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_free
                                                      • String ID: ..\s\ssl\statem\extensions.c
                                                      • API String ID: 2581946324-1165805907
                                                      • Opcode ID: 891db287cd659d7b8d35944e732a7309ebfc8684a9206ef12554e0065cf9a329
                                                      • Instruction ID: e707df4a48c7ac9eba82f2ec2c2c52380c704a1167c8ab34480e3254641640f4
                                                      • Opcode Fuzzy Hash: 891db287cd659d7b8d35944e732a7309ebfc8684a9206ef12554e0065cf9a329
                                                      • Instruction Fuzzy Hash: BDD0A7AAF0564141F7146765D8257E81620EF08B58F485072EE2C8F7CBEF5DE1818710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_read_lockD_unlock
                                                      • String ID:
                                                      • API String ID: 102331797-0
                                                      • Opcode ID: 2ff2ebcb5037ab26e8a38da5322c7b59402f116b98e94c0871d5cd4b7a151772
                                                      • Instruction ID: b7509888287cca2f88ce0c736cd1e9e37d39d39ac13b1d680e949228bc63f042
                                                      • Opcode Fuzzy Hash: 2ff2ebcb5037ab26e8a38da5322c7b59402f116b98e94c0871d5cd4b7a151772
                                                      • Instruction Fuzzy Hash: B1E06D22B0948141EB485A22E955ABCA270EF44B84F0C4071FF3D873CEDE28D4924600
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_run_once
                                                      • String ID:
                                                      • API String ID: 1403826838-0
                                                      • Opcode ID: d055155e7dfa394d9151ded48a12c15ff788ed91f46543e9f8dab3fed7f81b86
                                                      • Instruction ID: ad4695af6bbdb216a4fa4a69fc31c5f3f63d80609b41a1ed2cfb45c4fc424d46
                                                      • Opcode Fuzzy Hash: d055155e7dfa394d9151ded48a12c15ff788ed91f46543e9f8dab3fed7f81b86
                                                      • Instruction Fuzzy Hash: B5D0C728F09603D6F74CA779DC769F56650EF45350F4044B6E41EC35E9ED1CE9568B00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_run_once
                                                      • String ID:
                                                      • API String ID: 1403826838-0
                                                      • Opcode ID: 50386b0b5eefdba10866bde5667da4eefc104fd624e264bf7722bf74b99ec935
                                                      • Instruction ID: 9ec3dd4a95ec30d9f540a05b542848e3095bfd58583cdacefe29637ad88923a7
                                                      • Opcode Fuzzy Hash: 50386b0b5eefdba10866bde5667da4eefc104fd624e264bf7722bf74b99ec935
                                                      • Instruction Fuzzy Hash: 29D09258F09506A0FB086BAAD8719B92220AF40744F9045B2E42D872EAED2CA5668740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$L_sk_set_cmp_funcX509_$E_freeM_read_bio_O_freeX509X509_free$E_dupErrorL_sk_findL_sk_pushLastO_ctrlO_newO_s_fileO_snprintfR_add_error_dataR_clear_errorR_endR_readX509_get_subject_name_errno
                                                      • String ID: %s/%s$..\s\ssl\ssl_cert.c$OPENSSL_DIR_read(&ctx, '
                                                      • API String ID: 1034648778-4291904164
                                                      • Opcode ID: a7cf95bfd1c764363c01ec8f1d230014cc7145455fcf0bd5d17db932bca30e03
                                                      • Instruction ID: 39cf416df59cf85690042a08cc22863a4734ceb9ead821593975bb3feb5363ae
                                                      • Opcode Fuzzy Hash: a7cf95bfd1c764363c01ec8f1d230014cc7145455fcf0bd5d17db932bca30e03
                                                      • Instruction Fuzzy Hash: E171A755B1C69286FB289B21D831BBE6250FF84784F445072EA9D07BDEEF3DE5518700
                                                      APIs
                                                      Strings
                                                      • Can't remove argname from kwargs, xrefs: 655D1396
                                                      • missing required positional arguments, xrefs: 655D12B1
                                                      • missing kwonly required arguments, xrefs: 655D153A
                                                      • too many positional arguments, xrefs: 655D15A4
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Dict_Err_ItemString$DeallocTuple_
                                                      • String ID: Can't remove argname from kwargs$missing kwonly required arguments$missing required positional arguments$too many positional arguments
                                                      • API String ID: 2174600326-1903473336
                                                      • Opcode ID: 4be98821050a6a9fb2a4ceed42bc04d1c973a961b7a7a26d963f475c790bfc9f
                                                      • Instruction ID: 9e17506d6e48a444836fa7d15d4c096a8e1efe437c387026695c9e2e19b0f359
                                                      • Opcode Fuzzy Hash: 4be98821050a6a9fb2a4ceed42bc04d1c973a961b7a7a26d963f475c790bfc9f
                                                      • Instruction Fuzzy Hash: 22B18973209B80C1DB25CF5AE85835AB366F785BE8F548612DEAE43B68CF39C095C305
                                                      APIs
                                                      Strings
                                                      • cannot unpack non-iterable %.200s object, xrefs: 655CF806
                                                      • too many values to unpack (expected %d), xrefs: 655CF840
                                                      • not enough values to unpack (expected at least %d, got %d), xrefs: 655CF878
                                                      • not enough values to unpack (expected %d, got %d), xrefs: 655CF8E1
                                                      • not enough values to unpack (expected at least %d, got %zd), xrefs: 655CF893
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Sequence_$CheckDeallocErr_FormatIterIter_ListNextObject_
                                                      • String ID: cannot unpack non-iterable %.200s object$not enough values to unpack (expected %d, got %d)$not enough values to unpack (expected at least %d, got %d)$not enough values to unpack (expected at least %d, got %zd)$too many values to unpack (expected %d)
                                                      • API String ID: 3840349905-1344257351
                                                      • Opcode ID: 4b4bbaedd3be082cdccd5b313c9e6c7478a8fd13fdec7f6d91502005affe88e0
                                                      • Instruction ID: 4caf667350cd9e7613cc124efa41e75dde5944fcf3db263f0d854d5a19b56138
                                                      • Opcode Fuzzy Hash: 4b4bbaedd3be082cdccd5b313c9e6c7478a8fd13fdec7f6d91502005affe88e0
                                                      • Instruction Fuzzy Hash: 3281ED72715E4482DF04CFA9E8087AA3362FB44F89F85965ACE6A17324DF39C494C382
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: Class$LongMessageSend$HandleLoadModule$CursorIconRegister
                                                      • String ID: Can't set icon; window has no wrapper.$FAILED$ICON$LOOKUP$TOPLEVEL$Unable to set icon$WRAPPER$window "%s" isn't a top-level window
                                                      • API String ID: 3636279047-342970489
                                                      • Opcode ID: 00a33a114b96047e7b44c57dc76a09d9494fa9e4dbc6cb1768352b83b3718d4b
                                                      • Instruction ID: 4de7abf49fa5a457e59f611bdbce961b5b1638e9c2b056cd821d97e6c4d1c293
                                                      • Opcode Fuzzy Hash: 00a33a114b96047e7b44c57dc76a09d9494fa9e4dbc6cb1768352b83b3718d4b
                                                      • Instruction Fuzzy Hash: FCB160B2B0A64785EB649B11E460ABA3361FB56BC4F095236DA2E437E9CF7CE441D300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$R_add_error_data$conf_ssl_get_cmdconf_ssl_name_find
                                                      • String ID: )$, arg=$, cmd=$..\s\ssl\ssl_mcnf.c$name=$section=$system_default
                                                      • API String ID: 1136227658-3150877160
                                                      • Opcode ID: de54f06d0a5ad61313ac3c5f2a910e846887ce29ff7eae0f94fcbb296ca8278f
                                                      • Instruction ID: ed76ce87a482c2fe04d2b83c86bdd088e183f531269aa11645cb055bf19b7fe9
                                                      • Opcode Fuzzy Hash: de54f06d0a5ad61313ac3c5f2a910e846887ce29ff7eae0f94fcbb296ca8278f
                                                      • Instruction Fuzzy Hash: 2A51C326B0878685EB289B55A820AFD63A0EF85784F448075EE6D47BCEEF3CE501C750
                                                      APIs
                                                      Strings
                                                      • read() returned too much data: %zd bytes requested, %zd returned, xrefs: 655C86DB
                                                      • EOF read where not expected, xrefs: 655C8747
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_$Mem_Memory$BufferBuffer_CallDeallocFillFormatFromInfoMallocMethodNumber_Object_OccurredReallocSsize_tView_
                                                      • String ID: EOF read where not expected$read() returned too much data: %zd bytes requested, %zd returned
                                                      • API String ID: 4179280635-3742967138
                                                      • Opcode ID: 42e24d7d84f9acdd83606c722aaac3679e13722c17a06f370d83a3ba49cb5ef2
                                                      • Instruction ID: 4bed1c19af07dfee186c2fe52134620f8fa025dabe304e53a8a94f5f81e42681
                                                      • Opcode Fuzzy Hash: 42e24d7d84f9acdd83606c722aaac3679e13722c17a06f370d83a3ba49cb5ef2
                                                      • Instruction Fuzzy Hash: 63418362305E0485EB018FA5ED0839823A2B748FEAF844679DD2D577A4EF79C5DAC343
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Unicode_$CompareString$With$DeallocErr_Ready
                                                      • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                                                      • API String ID: 1067165228-3528878251
                                                      • Opcode ID: a97fda713efcdaed74d0f15b89fc759eef65b993e3755085a36f180e1a2a6872
                                                      • Instruction ID: c86b1b8c3890059967267a7927575cd9b7bcc01741730a785937a3bfb57d9de5
                                                      • Opcode Fuzzy Hash: a97fda713efcdaed74d0f15b89fc759eef65b993e3755085a36f180e1a2a6872
                                                      • Instruction Fuzzy Hash: D9414E21B0CB8386EB5C9B12A860A3973A4BF45B84F8545B5CD6E877DCDF2DE04A9304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_errorconf_ssl_getconf_ssl_get_cmdconf_ssl_name_find
                                                      • String ID: !$, arg=$, cmd=$..\s\ssl\ssl_mcnf.c$section=$system_default
                                                      • API String ID: 636194058-1492845798
                                                      • Opcode ID: 8c2dc6a9b36d40a36d9a9e1908edb44156f67eeda263a40d35ab8a40e0650799
                                                      • Instruction ID: 4d5e2223253ea2b5ef5f314b170fa0b64945cea9c431e97a0a8cadd6008be437
                                                      • Opcode Fuzzy Hash: 8c2dc6a9b36d40a36d9a9e1908edb44156f67eeda263a40d35ab8a40e0650799
                                                      • Instruction Fuzzy Hash: E0417F26B0868285EB689B55A820BFDA3A0FB84790F448075EEAD47BCDDF3CE545C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Module_$Dealloc$ObjectObject_$Capsule_ConstantFromMallocMem_SpecStringTrackTypeType_
                                                      • String ID: 14.0.0$_ucnhash_CAPI$ucd_3_2_0$unidata_version
                                                      • API String ID: 288921926-1430584071
                                                      • Opcode ID: 34ac006824e125b38f87d2d071ae01d9c336cf72669efd439cdbfbf994d14880
                                                      • Instruction ID: 2cfcb7537c697c8571c3f2b3989bd4b91d93a1a8cf79a5e7ba93e7ee83fbfe90
                                                      • Opcode Fuzzy Hash: 34ac006824e125b38f87d2d071ae01d9c336cf72669efd439cdbfbf994d14880
                                                      • Instruction Fuzzy Hash: EA210A61F0DB8391FB1D5B25A8309797398AF4AB90B4851B4D93E4A6DCDF2CF40E8710
                                                      APIs
                                                      • strchr.VCRUNTIME140(?,?,?,?,00000000,?,00000000,00007FFDFB114488), ref: 00007FFDFB117BC2
                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,?,00000000,00007FFDFB114488), ref: 00007FFDFB117BD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: isspacestrchr
                                                      • String ID: FONT$FONT_STYLE$LOOKUP$font "%s" doesn't exist$normal$overstrike$roman$underline$unknown font style "%s"
                                                      • API String ID: 2446454806-3998826473
                                                      • Opcode ID: 2c922afe8f19234197c38261dfecdb65bb56e7c30e1d089a20187d9484067c09
                                                      • Instruction ID: a9c1805168eabdb7bf4bb10b1bcaf3584c9eddae24520e88474f906c02d2c2ef
                                                      • Opcode Fuzzy Hash: 2c922afe8f19234197c38261dfecdb65bb56e7c30e1d089a20187d9484067c09
                                                      • Instruction Fuzzy Hash: 9D028D73F0AA47A5EB508B22D460AB933A5FB45B8CF485032DE2D437A9DF38E595C340
                                                      APIs
                                                      • EVP_PKEY_CTX_new.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD00575
                                                      • X509_get0_pubkey.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD005E6
                                                      • ERR_clear_error.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD005FF
                                                      • ASN1_item_d2i.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD0061E
                                                      • ASN1_TYPE_get.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD0063B
                                                      • EVP_PKEY_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD006EE
                                                      • EVP_PKEY_CTX_free.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD00744
                                                      • ASN1_item_free.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDFAD02510), ref: 00007FFDFAD00753
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_malloc.LIBCRYPTO-1_1 ref: 00007FFDFACB88C9
                                                        • Part of subcall function 00007FFDFACA1C08: memset.VCRUNTIME140 ref: 00007FFDFACB88F7
                                                        • Part of subcall function 00007FFDFACA1C08: memcpy.VCRUNTIME140 ref: 00007FFDFACB8933
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB8956
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB89BD
                                                        • Part of subcall function 00007FFDFACA1C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDFACB8A38
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_free$E_getN1_item_d2iN1_item_freeO_mallocR_clear_errorX509_get0_pubkeyX_ctrlX_freeX_newmemcpymemset
                                                      • String ID: $..\s\ssl\statem\statem_srvr.c$Q
                                                      • API String ID: 2622237655-4085857157
                                                      • Opcode ID: 5f9394593163b431ca9c9304f3552c2da4da832b2f4af1edcc49d405f8051761
                                                      • Instruction ID: f2696e31ff6c2ade796818b78eca0f7695a9ce99372e223467212649a9e1bc08
                                                      • Opcode Fuzzy Hash: 5f9394593163b431ca9c9304f3552c2da4da832b2f4af1edcc49d405f8051761
                                                      • Instruction Fuzzy Hash: C0619171B08B5285EB289B15E864BB967A0EF84B84F488075DEAD477DDEF3CE5418B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: CompareStringUnicode_With$Mem_$FreeMallocSubtypeType_
                                                      • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                                                      • API String ID: 1723213316-3528878251
                                                      • Opcode ID: c1d1483b359176232031dcda17eceefdd4cd98cc21702f49892afc3e67e82068
                                                      • Instruction ID: 7cce68b680c865ca5834fa9bec13bccaeed483a71aa4dee65619f2d01ef6b8f5
                                                      • Opcode Fuzzy Hash: c1d1483b359176232031dcda17eceefdd4cd98cc21702f49892afc3e67e82068
                                                      • Instruction Fuzzy Hash: 87514A21B0C79341FF6D8B12A824A7AB7A4AF51BC4F0450B5DE7E47AC9DF2DE40A8704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Digest$SignY_new_raw_private_key$FinalInitL_cleanseUpdateX_freeX_newY_free
                                                      • String ID: ..\s\ssl\tls13_enc.c$finished
                                                      • API String ID: 2202177965-3224497825
                                                      • Opcode ID: 166123bba42b708f2dab18c00ad5c8f546e7789dfe085f21497c016d76a20a03
                                                      • Instruction ID: 433843beee8f97fac23016a59e8f8ac3dafd341ad253aa81e5c8412ab835113f
                                                      • Opcode Fuzzy Hash: 166123bba42b708f2dab18c00ad5c8f546e7789dfe085f21497c016d76a20a03
                                                      • Instruction Fuzzy Hash: 2B518F2170DA9295E768DB62E820BEEA350FF84B80F488071EE6D47B8DEF7CD5018740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: strncmp$atoi$strrchr
                                                      • String ID: %s %d$backbytes$byteindex$forwbytes$insert
                                                      • API String ID: 834745059-3026567289
                                                      • Opcode ID: 2267793edff32a7ff04bd462629248bba15f76abea788871b37ed6690f68402a
                                                      • Instruction ID: 80ac6d5f0d7e01b2cadd21a491ae8c0e36b46078a7c851a66560223d94f47125
                                                      • Opcode Fuzzy Hash: 2267793edff32a7ff04bd462629248bba15f76abea788871b37ed6690f68402a
                                                      • Instruction Fuzzy Hash: ADE13C37F0AB578AEB148B65D460ABD33A2EB84F88F154035CE2D877A8DE39E455C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: T_free$P_resp_count$E_freeL_sk_new_nullP_freeP_get1_ext_d2iP_resp_get0P_response_get1_basicR_put_errorX509_get_ext_d2id2i_
                                                      • String ID:
                                                      • API String ID: 2393059476-0
                                                      • Opcode ID: ac31e9deb06ce2136bb9c38efabbda777b1c585deeb9762998fa061c95772b83
                                                      • Instruction ID: 6270e06f7b08532ea817bbb5fc4651c7c4f06c66cac56f7006a74ee46dc21f6b
                                                      • Opcode Fuzzy Hash: ac31e9deb06ce2136bb9c38efabbda777b1c585deeb9762998fa061c95772b83
                                                      • Instruction Fuzzy Hash: F841F225F0DB9242EF58AAA66465BBE6390DF90BC0F484474DE6E477CAEF6DF4008700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$X509_get0_pubkey
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 2083351937-2723262194
                                                      • Opcode ID: ebe6d218d256f2b93a931c41f9664656afb9b2d4bbfeeb00eff9d52bac07fb99
                                                      • Instruction ID: fefa0201667ba37c2ff8b6ac68aef630348343a6d26510dfbd9dcf636b28dff0
                                                      • Opcode Fuzzy Hash: ebe6d218d256f2b93a931c41f9664656afb9b2d4bbfeeb00eff9d52bac07fb99
                                                      • Instruction Fuzzy Hash: 98417036B08A5681EF08DB16E8606BDA760FB88B88F484171EA6D437DDEF7CE545C700
                                                      APIs
                                                      Strings
                                                      • bad marshal data (list size out of range), xrefs: 655CB041
                                                      • NULL object in marshal data for list, xrefs: 655CB5C8
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_List_Occurred
                                                      • String ID: NULL object in marshal data for list$bad marshal data (list size out of range)
                                                      • API String ID: 1902535023-3453879413
                                                      • Opcode ID: 6077b2d28630d8b338ff3c116ea4c08cf24873e4a8e18c23a6e6d4e374e8422c
                                                      • Instruction ID: e9cf2b2a8e7003dc6d45695e52819d6bb607b8bed00b13d8b0fa95bc1e753c5c
                                                      • Opcode Fuzzy Hash: 6077b2d28630d8b338ff3c116ea4c08cf24873e4a8e18c23a6e6d4e374e8422c
                                                      • Instruction Fuzzy Hash: E0314F31349A51C2EB15DFE5EC9871D23A6FB4ABAAF808469CE0E07714EF39D459C342
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$Y_freeY_new
                                                      • String ID: ..\s\ssl\s3_lib.c$b
                                                      • API String ID: 1220942454-2522393336
                                                      • Opcode ID: 8a933b611ca1d037401981aeb5c2c7ac1fed2e98a26f8ebfe6c6a97711fd6726
                                                      • Instruction ID: 0b00780e745317c19a2a185895a649c3136b4d459c75fa0de7f2ae25e5c4445d
                                                      • Opcode Fuzzy Hash: 8a933b611ca1d037401981aeb5c2c7ac1fed2e98a26f8ebfe6c6a97711fd6726
                                                      • Instruction Fuzzy Hash: 0F21A325B0856685F728AB62DD20BBD5291EB84BC0F0440B6DE6D47BCEEE3DE5014711
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_Unicode_$ArgumentCheckDigitErr_PositionalReadyString
                                                      • String ID: a unicode character$argument 1$digit$not a digit
                                                      • API String ID: 3305933226-4278345224
                                                      • Opcode ID: f3312c4d2492d42c6bf8c5b24e15dccd6aa38fe551f57dd252bb694573ee7750
                                                      • Instruction ID: 64c1a9a65e0dcfaa768c6509427cb18123564daa48ce928eb37f975ace399462
                                                      • Opcode Fuzzy Hash: f3312c4d2492d42c6bf8c5b24e15dccd6aa38fe551f57dd252bb694573ee7750
                                                      • Instruction Fuzzy Hash: C6214D21B08B9392EF5C9B21D86497973A4FF44B88F4545B1DA2E876ECDF2DE44AC300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                      • String ID:
                                                      • API String ID: 349153199-0
                                                      • Opcode ID: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                      • Instruction ID: cf156fbce7c9503b798545ef44f860a7907f252041aca5e2937de95a6ae94174
                                                      • Opcode Fuzzy Hash: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                      • Instruction Fuzzy Hash: F5819D21F087C346FB6CAB669461AB977A0AF45780F5481B5D96C873DEDE3CE84F8600
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Digest$UpdateX_free$D_sizeFinalR_flagsSignX_cipherX_copyX_mdX_new
                                                      • String ID:
                                                      • API String ID: 109953546-0
                                                      • Opcode ID: 5eda2657ad5c4029def291e57046639475e8b225bdd7a6b805cf2cc3cf152cd9
                                                      • Instruction ID: cb52efc2428bc1a16f0591bf5215cb0cb6daa066f79a59449747cc88fde93c3b
                                                      • Opcode Fuzzy Hash: 5eda2657ad5c4029def291e57046639475e8b225bdd7a6b805cf2cc3cf152cd9
                                                      • Instruction Fuzzy Hash: 2161D226B0C78185EB188B16D820A7D67A4FB45BC4F084072EE9D477DADE3DE451C700
                                                      APIs
                                                      • EVP_MD_size.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0A7D1
                                                      • EVP_CIPHER_flags.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0A839
                                                      • EVP_CipherInit_ex.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0A964
                                                      • EVP_CIPHER_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0A97B
                                                      • EVP_CIPHER_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0A997
                                                      • OPENSSL_cleanse.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDFAD0C94F), ref: 00007FFDFAD0AA00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X_ctrl$CipherD_sizeInit_exL_cleanseR_flags
                                                      • String ID: ..\s\ssl\tls13_enc.c$key
                                                      • API String ID: 3239367310-4187096943
                                                      • Opcode ID: e9b37caaee1b8003f487b6f6f5d73ed8f67a36fcf4c8f736fe4ba21693aa3570
                                                      • Instruction ID: a3cdd8fefbdf231ea950adfe5fccac457ac26dcfe7181ca90d0aabefdd02f1f9
                                                      • Opcode Fuzzy Hash: e9b37caaee1b8003f487b6f6f5d73ed8f67a36fcf4c8f736fe4ba21693aa3570
                                                      • Instruction Fuzzy Hash: 3C61843271879585E7688B12E860BAA77A4FB84B94F488135EE9D47B9DEF3CD141CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Y_free
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c
                                                      • API String ID: 1282063954-348624464
                                                      • Opcode ID: 8b654115e388183261af55680d1b999c5dabc7ee9bc17420485ce8ad0bb87d7a
                                                      • Instruction ID: 3532770cbd314790e47724ca1918b97c96adcf2891a3604545e02c5d3a217c1f
                                                      • Opcode Fuzzy Hash: 8b654115e388183261af55680d1b999c5dabc7ee9bc17420485ce8ad0bb87d7a
                                                      • Instruction Fuzzy Hash: 1441936170876185EB28DB62E864B7A6790FF84B94F088171EE6D4BBDDEF3CE5418700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: signal
                                                      • String ID: CCG
                                                      • API String ID: 1946981877-1584390748
                                                      • Opcode ID: 629d8fe17d2a94cd1b682f2ae893682d3c64eaa038fe5736a28606792868f15a
                                                      • Instruction ID: 5c293828b378bd5bdc5362689e24037a86abcebc20c72c7e86ed39d87f53fa1b
                                                      • Opcode Fuzzy Hash: 629d8fe17d2a94cd1b682f2ae893682d3c64eaa038fe5736a28606792868f15a
                                                      • Instruction Fuzzy Hash: F6316F307494204BFB3586B9845036E1002BBFA338F64CA15CA3ECFBE5CE6DA4D5C216
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrlO_freeO_newO_s_fileR_put_error
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 2618924202-2723262194
                                                      • Opcode ID: 82e72bf08e5634df306e47dd7fb16ea1f425d4c52a2aa7bf79802e3d9df4c8f6
                                                      • Instruction ID: 8eff2b0757a0053106f3fbc229f3acd37c754f2c119eafc9b5f192631b55893f
                                                      • Opcode Fuzzy Hash: 82e72bf08e5634df306e47dd7fb16ea1f425d4c52a2aa7bf79802e3d9df4c8f6
                                                      • Instruction Fuzzy Hash: BF316125B0C69286F7289B539820ABD7691FF84B84F184075EEAD0BBCDEF3DE5418744
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrlO_freeO_newO_s_fileR_put_error
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 2618924202-2723262194
                                                      • Opcode ID: 5bf913154e57e5bef80a77c4fef9c3d6f5b7e6f7af4c1a40c17be97fa2123d7d
                                                      • Instruction ID: aebe01cd0095dea13ae544359195b7a5dde2cf9097c48ca0064810b0944edc89
                                                      • Opcode Fuzzy Hash: 5bf913154e57e5bef80a77c4fef9c3d6f5b7e6f7af4c1a40c17be97fa2123d7d
                                                      • Instruction Fuzzy Hash: 0F31A625B0875686FB289F579424ABE6661EB85784F044075EE7E0BBCDEF3CE5008744
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Unicode_$Arg_$ArgumentCompareReadyStringWith$CheckPositionalSubtypeType_
                                                      • String ID: argument 1$argument 2$normalize$str
                                                      • API String ID: 3621440800-1320425463
                                                      • Opcode ID: 94348148c340fa5468beab9ef1746397c69e42e894d14843631ab3fa4ea44381
                                                      • Instruction ID: 5c0cef98c983dea4f62cdf84421d52688f36d6577c7770d57f3e4a3be5cd840d
                                                      • Opcode Fuzzy Hash: 94348148c340fa5468beab9ef1746397c69e42e894d14843631ab3fa4ea44381
                                                      • Instruction Fuzzy Hash: E1214D61B08BC395E75C8B25A4649B93360AF44B98F5942B5C97D4B6ECCF2CE44BD300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_$ArgumentReadyUnicode_$CheckPositional
                                                      • String ID: argument 1$argument 2$is_normalized$str
                                                      • API String ID: 396090033-184702317
                                                      • Opcode ID: c961abb42e83fbff4e8e9473619491438f798cfd5e47330d0c83c04a8f602896
                                                      • Instruction ID: b13dcce9cee4636462a257239bc4333b6377b861fbc8f616bdbe40b2ff9746c3
                                                      • Opcode Fuzzy Hash: c961abb42e83fbff4e8e9473619491438f798cfd5e47330d0c83c04a8f602896
                                                      • Instruction Fuzzy Hash: 65214F21B08BC796EB5C8B55E460AB83360AF44B98F5942B1D97D476ECCF2CE44BC340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: name != NULL$src/misc/crypt/crypt_find_prng.c
                                                      • API String ID: 1004003707-2030105502
                                                      • Opcode ID: e39e807f7844bb1b9e063fd33bf6aeb909ba0c99061e5deaa7131697d7604fb5
                                                      • Instruction ID: 8f10e190a4c89473c6a4a577e3b40fe6fcc0045804364dfb3e539d42d5bc1d2a
                                                      • Opcode Fuzzy Hash: e39e807f7844bb1b9e063fd33bf6aeb909ba0c99061e5deaa7131697d7604fb5
                                                      • Instruction Fuzzy Hash: 3E31642330AA5689EF14DE56D9D87B9A312FF45BDCF408210CE2B4F945EB18E146C758
                                                      APIs
                                                      Strings
                                                      • src/misc/crypt/crypt_find_cipher.c, xrefs: 655DD2E1
                                                      • name != NULL, xrefs: 655DD2E8
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: name != NULL$src/misc/crypt/crypt_find_cipher.c
                                                      • API String ID: 1004003707-679692990
                                                      • Opcode ID: 691be8db6bbd4a0010f7338928836738c67b60369ef3121cb6c9319839da9e47
                                                      • Instruction ID: c1cfdf3198d41dbd5ca2dfd53fe7c30ab2160987ff028f894341b6e943902ac4
                                                      • Opcode Fuzzy Hash: 691be8db6bbd4a0010f7338928836738c67b60369ef3121cb6c9319839da9e47
                                                      • Instruction Fuzzy Hash: 3731472330A58689FF15DFD6D9987FAA316FF417D8F0082109E678BA44EF14D146C758
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_freeO_new
                                                      • String ID:
                                                      • API String ID: 4227620691-0
                                                      • Opcode ID: 324cfc69550d3b93fac5b35c3839389ffd21f261a349a1ba0c04531d6b5b3189
                                                      • Instruction ID: e7748983d3123e25c4889e064114dfa8557493810693cd6ac648a13f3c1b176b
                                                      • Opcode Fuzzy Hash: 324cfc69550d3b93fac5b35c3839389ffd21f261a349a1ba0c04531d6b5b3189
                                                      • Instruction Fuzzy Hash: 21210A14F0D29245FB5CA7626A71A7D26919F45BC4F4880B5EE7E8BBCEEE3CE4019300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: , value=$..\s\ssl\ssl_conf.c$cmd=
                                                      • API String ID: 1767461275-2539137415
                                                      • Opcode ID: 6f5fa976fdc21c662024ae26816687f03e4be8bcdd26a407f4cb266dff922d12
                                                      • Instruction ID: 19326738695036856d2d593b543edf5d7bb29ada5b2c5d24d614d671a6e7f7c4
                                                      • Opcode Fuzzy Hash: 6f5fa976fdc21c662024ae26816687f03e4be8bcdd26a407f4cb266dff922d12
                                                      • Instruction Fuzzy Hash: 65519076B0854682FB589B19E820BBD63A0FB88784F484176DB6C077EDDF3DD9858700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: 8$@$MD5$in != NULL$md != NULL$src/hashes/md5.c
                                                      • API String ID: 39653677-1219784974
                                                      • Opcode ID: 9a45769587e8619f18d36dd9e7a8754485164c0fa36d7d4079a4207dc7fcd1d8
                                                      • Instruction ID: 6f161674fb53dd03b57d508f405289925b698afbd45d4948ab46342f5ef3d985
                                                      • Opcode Fuzzy Hash: 9a45769587e8619f18d36dd9e7a8754485164c0fa36d7d4079a4207dc7fcd1d8
                                                      • Instruction Fuzzy Hash: E9D1DBB36082C18AE701CB1EE458B2EFFA1F79238CF446609DE821BB44D77AC445CB46
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: _strnicmp$strchr
                                                      • String ID: ISOEncode$/%s findfont %d scalefont%s setfont$CANVAS$FONTMAP$Symbol$bad font map entry for "%s": "%s"
                                                      • API String ID: 1737111242-3406053624
                                                      • Opcode ID: db29e8f8edaacdf31afc2b49bfcbc427a55fc21ddd54826393cd905d9ffec45b
                                                      • Instruction ID: ef53e2ffac377e5b4bdffc45451be1e434e53c064db211b5a16ffaca19c624b6
                                                      • Opcode Fuzzy Hash: db29e8f8edaacdf31afc2b49bfcbc427a55fc21ddd54826393cd905d9ffec45b
                                                      • Instruction Fuzzy Hash: B1918332B0AA8785EB418F11E460AAA7361FB49FC8F454132DD5E577A8EF7CE455C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: P_resp_count$E_freeL_sk_new_nullP_freeP_get1_ext_d2iP_resp_get0P_response_get1_basicR_put_errorT_freed2i_
                                                      • String ID:
                                                      • API String ID: 4245524859-0
                                                      • Opcode ID: 741c6e6be6a0707780ebfb8c2d7050555c9a934290be2e2d2d38b17e810f51c1
                                                      • Instruction ID: bfc25913e3e6c23d6694d3d55f04b7d7657c7691f45e24e2acfdea767904844a
                                                      • Opcode Fuzzy Hash: 741c6e6be6a0707780ebfb8c2d7050555c9a934290be2e2d2d38b17e810f51c1
                                                      • Instruction Fuzzy Hash: 8C21F425F0D7A242EF18A6666531A7D16D0EFC8BC0F4944B5EE2D877CEEE6DE4028340
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_set_flags$O_set_retry_reason$O_clear_flagsO_get_retry_reason
                                                      • String ID:
                                                      • API String ID: 3610643084-0
                                                      • Opcode ID: 7c2e9297198fbe8bbaa2a4c3eec53a66c110abc671760b54cd415acdbed01445
                                                      • Instruction ID: bf30c566858cf61287e04b4139613547ba09566cd22508a51d747269c2e44750
                                                      • Opcode Fuzzy Hash: 7c2e9297198fbe8bbaa2a4c3eec53a66c110abc671760b54cd415acdbed01445
                                                      • Instruction Fuzzy Hash: 81112E15F1D16282F72CE23A5A31A7D52829F81B80F1884B6E9294BBCFED2DF5434205
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Y_id
                                                      • String ID: ..\s\ssl\t1_lib.c
                                                      • API String ID: 239174422-1643863364
                                                      • Opcode ID: 92ed0e8bff7197f36b33208dbaaee88f7410c31c32216dcb3d7c4b56a064be01
                                                      • Instruction ID: d19156788a6e3874b0ed6a5d29bdaf8bbcce27bb1a752ba3c8b88354ea5eee53
                                                      • Opcode Fuzzy Hash: 92ed0e8bff7197f36b33208dbaaee88f7410c31c32216dcb3d7c4b56a064be01
                                                      • Instruction Fuzzy Hash: C8B1C531B0C26286EB688B16D870B7D66A0EB40788F5C8075DA6D477DDFEBCE981C705
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Unicode_$Arg_ArgumentFromReadyStringSubtypeType_
                                                      • String ID: a unicode character$argument$category
                                                      • API String ID: 2803103377-2068800536
                                                      • Opcode ID: c9d1e3034f28ed3d090bffcd2b1c2b74113939870b399ed50bdb72791e912429
                                                      • Instruction ID: de0b60663d0a0e1ef544a935c3af34f622b9dd3fa5eb70c0842685f78e8e535f
                                                      • Opcode Fuzzy Hash: c9d1e3034f28ed3d090bffcd2b1c2b74113939870b399ed50bdb72791e912429
                                                      • Instruction Fuzzy Hash: 2D51C262B08B8641EB1D8B19D5B0A7933A1EF44B84F584175DA6E477DCDF2DE84AC340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Unicode_$Arg_ArgumentFromReadyStringSubtypeType_
                                                      • String ID: a unicode character$argument$bidirectional
                                                      • API String ID: 2803103377-2110215792
                                                      • Opcode ID: 79e1f8ae2df2e93481f857dbc231cf2a034c20faf15badcceea9109bcd0af3e1
                                                      • Instruction ID: 86836ea8ac2f7a67bb2b77791da742b7aab22d2fba8f57504166ae45a68f60b5
                                                      • Opcode Fuzzy Hash: 79e1f8ae2df2e93481f857dbc231cf2a034c20faf15badcceea9109bcd0af3e1
                                                      • Instruction Fuzzy Hash: 3D41C261B18B8282EB9D8B15C860A7973A1EF44B84F584175DB7E472DCDF3CE84AD340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_$_errno$ClearFormatOccurred_time64
                                                      • String ID: %s (%d:%d)$N+
                                                      • API String ID: 3602238506-2748867177
                                                      • Opcode ID: 6d2e1783ff2c5c3231eafa412139b543756fe96298cf0b3fff08213be2f9d294
                                                      • Instruction ID: ba945edc31b8ab779e49716951482c77db83f303dad15d7c5e82d67b9be05f4b
                                                      • Opcode Fuzzy Hash: 6d2e1783ff2c5c3231eafa412139b543756fe96298cf0b3fff08213be2f9d294
                                                      • Instruction Fuzzy Hash: BE313721348650C1EB00CFB5D498B9837A1F781B9AF88835ADEE90B3D4CF2AD155C312
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: FromStringUnicode_$S_snprintfSizeSubtypeType_memcpy
                                                      • String ID: $%04X
                                                      • API String ID: 762632776-4013080060
                                                      • Opcode ID: 86c188bc8851d71fee5143397eab43a3575e426cb52b14b86a1d2f1ad77da2b4
                                                      • Instruction ID: a1894368d7bcea2ead758ce288b8ffdd8c855e68708be9da4d660594061cd020
                                                      • Opcode Fuzzy Hash: 86c188bc8851d71fee5143397eab43a3575e426cb52b14b86a1d2f1ad77da2b4
                                                      • Instruction Fuzzy Hash: DF318262B08AC142EB2D9B14D824BB977A1FB45BA5F480375D97E477D8DF2CE94A8300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrlO_freeO_newO_s_fileR_put_error
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 2618924202-2723262194
                                                      • Opcode ID: 8367bb06c8e1e8bcb61a0d3760235559917016d7b1681aa2aab4693b5f389584
                                                      • Instruction ID: 54fc6d75a7fa0f0aca06f114759083778be69ac3ad787f5b5d1f6743ca33ac5a
                                                      • Opcode Fuzzy Hash: 8367bb06c8e1e8bcb61a0d3760235559917016d7b1681aa2aab4693b5f389584
                                                      • Instruction Fuzzy Hash: 6A316625B0C75186F7289B179920ABE6691FB45B84F184075EEBE1BBCEDF3CE5018740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_sizeDigestFinal_exX_copy_exX_freeX_mdX_new
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 2082763299-1080266419
                                                      • Opcode ID: 9665b04ea7a40d6a4f60335c5160d95a6e56a7d83758f357575f01697b27d342
                                                      • Instruction ID: bb0fecc47097b4b8efeb9beab086c6a2c439aee62d6a474aefe121a268b3c889
                                                      • Opcode Fuzzy Hash: 9665b04ea7a40d6a4f60335c5160d95a6e56a7d83758f357575f01697b27d342
                                                      • Instruction Fuzzy Hash: 6C21C435B0C3A281E728DA56BC60A7E6691EB85BC4F194070EE6D47BDEEE3CD0418700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_f_bufferO_int_ctrlO_newO_push
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1655923927-1080266419
                                                      • Opcode ID: ab03b8435c53bbb2385763fffbc927048ad75653c08c6005caab1ccea8af9f44
                                                      • Instruction ID: 14e6600aa50cc9ecb1c60680a445071d17a485cc0700ba61eacfd50a5475c90b
                                                      • Opcode Fuzzy Hash: ab03b8435c53bbb2385763fffbc927048ad75653c08c6005caab1ccea8af9f44
                                                      • Instruction Fuzzy Hash: A3118622F0525282EB549B25F921BAD63A0EF45780F484571EB5D47BDDEF3DE5908600
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_ArgumentErr_FromLongLong_OccurredReadyUnicode_
                                                      • String ID: a unicode character$argument$mirrored
                                                      • API String ID: 3097524968-4001128513
                                                      • Opcode ID: c10d4c018a97ffc3e2d3961057942d7e2c7a14af83ba5a253b81f33c79b69d04
                                                      • Instruction ID: fec162e5cb750a667bf5f677ee7f2dc3bad3b3de55314a096ead98a809fb8363
                                                      • Opcode Fuzzy Hash: c10d4c018a97ffc3e2d3961057942d7e2c7a14af83ba5a253b81f33c79b69d04
                                                      • Instruction Fuzzy Hash: 44016510B08BC342EB5CAB21A4609783364EF45B54F4552B6D93E462DDDF3CE48E8304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_ArgumentErr_FromLongLong_OccurredReadyUnicode_
                                                      • String ID: a unicode character$argument$combining
                                                      • API String ID: 3097524968-4202047184
                                                      • Opcode ID: 8dcec4442920f3b8f18acdd6a11acb662b49feb7bbe0bfb657696819d5b5ca8f
                                                      • Instruction ID: ff16b51b322955c0d0b3072fcfb21a60aed754a5025d60023345cb055fb90f11
                                                      • Opcode Fuzzy Hash: 8dcec4442920f3b8f18acdd6a11acb662b49feb7bbe0bfb657696819d5b5ca8f
                                                      • Instruction Fuzzy Hash: FA016124B08BC346EF5C9B65A860A7837A0AF49B94F5451B1D93E472DDDF3CE44E8300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_peek_error
                                                      • String ID:
                                                      • API String ID: 3623038435-0
                                                      • Opcode ID: 31121c69614d8e7fd63340a17520f9e788e283dfe8a188e224bb13118655cecc
                                                      • Instruction ID: 626c7189d062c11cc8a888728bbbfab274754239f66b83237545652a960d36fa
                                                      • Opcode Fuzzy Hash: 31121c69614d8e7fd63340a17520f9e788e283dfe8a188e224bb13118655cecc
                                                      • Instruction Fuzzy Hash: A3419566F1918282FB6C96118661B3E1291EFC5B90F095070DE5D87BCDEF1CF9D18700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_flagsO_get_dataO_set_flagsO_set_retry_reason
                                                      • String ID:
                                                      • API String ID: 3836630899-0
                                                      • Opcode ID: 0657600688c88f7dbd994915641526f6ec11eadcdc6ba18dc5d8e5d557d44d07
                                                      • Instruction ID: aa81699739297b860d7c5bccd963ce94267d706de6519769d6be41b27d2d8b1f
                                                      • Opcode Fuzzy Hash: 0657600688c88f7dbd994915641526f6ec11eadcdc6ba18dc5d8e5d557d44d07
                                                      • Instruction Fuzzy Hash: 2D41F83AF0825242E71CAB36A935A7DA651EF40FC8F148171DE294BBCEDE3CE8519740
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                      • API String ID: 0-2292843906
                                                      • Opcode ID: 4679316237c22435e48590a0b18ff9341d64bb2dbbb98a48b6ba2c1b70102618
                                                      • Instruction ID: 00663ae0938877ac480af21465ccc72fd795c47d963fa45e1a4da543535c0ed5
                                                      • Opcode Fuzzy Hash: 4679316237c22435e48590a0b18ff9341d64bb2dbbb98a48b6ba2c1b70102618
                                                      • Instruction Fuzzy Hash: 2E02AA72B06B868AE750CF24E464BA977B5FB49B88F144136DE6D477A8DF38E480C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Mem_$MallocSubtypeType_$DeallocErr_FreeMemory
                                                      • String ID:
                                                      • API String ID: 4139299733-0
                                                      • Opcode ID: b618ed634e65c7a0afdbbdfe658f43664214b0bdfe946ac4b4ba603eb4efd133
                                                      • Instruction ID: e5019feeb116fe038d9f5f2e73ef5fef359a76c76aca9e2213c8c3bf3d305fef
                                                      • Opcode Fuzzy Hash: b618ed634e65c7a0afdbbdfe658f43664214b0bdfe946ac4b4ba603eb4efd133
                                                      • Instruction Fuzzy Hash: 87D18AB2B08B9281EB6D8B15D06497973A5FB45784F5401B1DBBE8A6C8DF7CE84AC700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Y_free
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c
                                                      • API String ID: 1282063954-348624464
                                                      • Opcode ID: 3eba6f20e22074cf876a32363cca50077ec926760ec6c31e60f16c7b099af10b
                                                      • Instruction ID: 13bcd09a15a38e04785f08ea924b69f8cccb0faf8dc8fea917d9aef8fa70d47a
                                                      • Opcode Fuzzy Hash: 3eba6f20e22074cf876a32363cca50077ec926760ec6c31e60f16c7b099af10b
                                                      • Instruction Fuzzy Hash: 2541BE7270875196E7248B01E860AAD77A0EB84BC4F488174DE5C0BBDDEF3CE6458704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_num$L_sk_valueX509_i2d_
                                                      • String ID: ..\s\ssl\statem\statem_lib.c$2
                                                      • API String ID: 3754435392-3488551833
                                                      • Opcode ID: b4fda117620910c532f4b172edd7df99a5e134b983beff484adab937af6dda05
                                                      • Instruction ID: 18329c9a3ddd2b3f5c0575e72524ca2770b73fc6c27c66c264026b337637a66a
                                                      • Opcode Fuzzy Hash: b4fda117620910c532f4b172edd7df99a5e134b983beff484adab937af6dda05
                                                      • Instruction Fuzzy Hash: 1331E339B0829241FB289B62A93097E5795AF84BD0F044470ED6D47BDEEE3CE5428710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrlO_freeX_new
                                                      • String ID: ..\s\ssl\s3_enc.c
                                                      • API String ID: 22238829-1839494539
                                                      • Opcode ID: b86d9e00eb916670b8f82ea2edc3d6313e21bdee77705e4ecef471cf6d96f819
                                                      • Instruction ID: 5a8857a51525ec31370ca3a7e58778ad3a6cb5b4f609f240da32e2bbff109908
                                                      • Opcode Fuzzy Hash: b86d9e00eb916670b8f82ea2edc3d6313e21bdee77705e4ecef471cf6d96f819
                                                      • Instruction Fuzzy Hash: 1141B236708A8185EB50CB15E8607AE63A0EB88BC4F188471DE5D4B7DDEF3DD5968700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_num$L_sk_pop_freeL_sk_valueR_put_error
                                                      • String ID: ..\s\ssl\ssl_cert.c
                                                      • API String ID: 732311666-349359282
                                                      • Opcode ID: ab10a35f01cc659bf1d8b89c5a6f0d2dffd631ccd2e4279cb355084bd3584024
                                                      • Instruction ID: 4ce21979fdcbcbd8f49d575eed71643aff485d86829514628b0661570fd9d7b0
                                                      • Opcode Fuzzy Hash: ab10a35f01cc659bf1d8b89c5a6f0d2dffd631ccd2e4279cb355084bd3584024
                                                      • Instruction Fuzzy Hash: 1E21B225B0C69186EB58DB26A860AFD6690EF88BD0F044472EE6D87BDEDE3CD1518700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_numL_sk_pop_free$L_sk_new_reserveL_sk_valueR_put_errorX509_free
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1042751175-1080266419
                                                      • Opcode ID: c8709bc90463c25e43f5416343c086df3d95b911cc0f9f76808430255535cb40
                                                      • Instruction ID: 16f1f7fcae48e477849427c0be66ac01cb6527e4769e1158a3a34363430aacf2
                                                      • Opcode Fuzzy Hash: c8709bc90463c25e43f5416343c086df3d95b911cc0f9f76808430255535cb40
                                                      • Instruction Fuzzy Hash: 6131A036B08A8286E718DB61D4607AE6761EBC5B80F098575EE9D537CEDE3CE4408700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_push$L_sk_new_nullL_sk_popR_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1161573302-1080266419
                                                      • Opcode ID: bda7fbef5f85bf2da651fee9b55fbaaa1bdd381d02e10f8cf18bd424cfbb4574
                                                      • Instruction ID: ad198cd60389bcae3e3bde8f4ff0c14306f157816a6c90ecca866b97bf999a6e
                                                      • Opcode Fuzzy Hash: bda7fbef5f85bf2da651fee9b55fbaaa1bdd381d02e10f8cf18bd424cfbb4574
                                                      • Instruction Fuzzy Hash: 79214F35B0D69281FB58DB16982097E63A4EF84B84F494175EBAC47BCEEF3CE5118700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                      • String ID: a unicode character$argument 1$name
                                                      • API String ID: 3545102714-4190364640
                                                      • Opcode ID: dd7e525c6f15f79c0475ece0fbfed555bc2cf029fe1f0485a725b85a65e47b36
                                                      • Instruction ID: f31c721905845a75244a199c41a4ed5c43fd01772baf279868ebd51b9cc86522
                                                      • Opcode Fuzzy Hash: dd7e525c6f15f79c0475ece0fbfed555bc2cf029fe1f0485a725b85a65e47b36
                                                      • Instruction Fuzzy Hash: A9218131B08BC296EB5CDF15E460AA97360EB44B84F4941B2DA6D477DDCF2CE84AC300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                      • String ID: a unicode character$argument 1$numeric
                                                      • API String ID: 3545102714-2385192657
                                                      • Opcode ID: 35c9d41c65e7a6057b424292e649dab30af98cc9056b9a63245a5d832090e137
                                                      • Instruction ID: c6736605b99a3243a3a566a12e458c3b45d2c37d0e48a88818052a6395d9ed7b
                                                      • Opcode Fuzzy Hash: 35c9d41c65e7a6057b424292e649dab30af98cc9056b9a63245a5d832090e137
                                                      • Instruction Fuzzy Hash: DA21AE31B08BC286EB5C9F16E4609A93360EB44B84F584072DA2D473EDCF2CE45BC700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                      • String ID: a unicode character$argument 1$decimal
                                                      • API String ID: 3545102714-2474051849
                                                      • Opcode ID: 37a4153ce9cd5952ba336a7a13e7d13d1a4106d113bef46bdc421c90457116d1
                                                      • Instruction ID: da4af0a8fe1a372f8b5a430d43e0b127b09ae9fcc9459f1d747445749475c106
                                                      • Opcode Fuzzy Hash: 37a4153ce9cd5952ba336a7a13e7d13d1a4106d113bef46bdc421c90457116d1
                                                      • Instruction Fuzzy Hash: EF216F31B18BC296EB5C9B11E4609B97364FB44B88F484271DE6D477ADCF2CE44AC300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_num$L_sk_new_nullL_sk_pushL_sk_value
                                                      • String ID:
                                                      • API String ID: 542606518-0
                                                      • Opcode ID: 45e2f6b10577ecd7920a06ad24a4fc6e3860420013ab6b207b4ccb3cd9d89438
                                                      • Instruction ID: 1d893a4d3fd96375491dfcf7c90736f805778679ad6bc122327ebb5f0d713092
                                                      • Opcode Fuzzy Hash: 45e2f6b10577ecd7920a06ad24a4fc6e3860420013ab6b207b4ccb3cd9d89438
                                                      • Instruction Fuzzy Hash: A5218525F0D6A281FB5C9A265870A7E5694DF84F80F0D40B1EE6D57BDEEE2CF4424700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Dict_Item$Eval_Globals
                                                      • String ID:
                                                      • API String ID: 298195719-0
                                                      • Opcode ID: 945963a1126d02bc4301117889f40fdb99f125d0e6066e7142d9d68a8c3398ce
                                                      • Instruction ID: a60d86c4042285c0e8c615bc0c74b08bfc9c012f8a45083f258c0999cf8bac4f
                                                      • Opcode Fuzzy Hash: 945963a1126d02bc4301117889f40fdb99f125d0e6066e7142d9d68a8c3398ce
                                                      • Instruction Fuzzy Hash: 36119193F4B61542EE4A979AFC283868056BB89FD4F8D8526CD0A07724FD29D8C3C215
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X_free
                                                      • String ID:
                                                      • API String ID: 2268491255-0
                                                      • Opcode ID: 6493352eb6d6ed3341580a2395efd01224b6157228b4c69fa8689b251ece88ee
                                                      • Instruction ID: 1001ec7b7f25426c508bfa5b7f608cd4a27b8005035b056095494be86e8c997c
                                                      • Opcode Fuzzy Hash: 6493352eb6d6ed3341580a2395efd01224b6157228b4c69fa8689b251ece88ee
                                                      • Instruction Fuzzy Hash: 99015272718A8141DB44AF21DC606BC63A4EF90F88F0C4075DF5D4B6DEDF28D0508325
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ..\s\ssl\statem\statem_clnt.c
                                                      • API String ID: 0-1507966698
                                                      • Opcode ID: b2dc92272df5d2294881d286fe1eea17c90c1f5965a20d8c2b5b28423e28561b
                                                      • Instruction ID: c6ad5e26fca3ec30acdd9c79d680c5d421dd2e1c8f9c06ceb96251cf1bf4ab6d
                                                      • Opcode Fuzzy Hash: b2dc92272df5d2294881d286fe1eea17c90c1f5965a20d8c2b5b28423e28561b
                                                      • Instruction Fuzzy Hash: D1B1B269B0C64281F7689B22D8B0BBE2691AF85BC4F084071DF6D5B6DDDF3CE9818744
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Sleep_amsg_exit
                                                      • String ID: `fe
                                                      • API String ID: 1015461914-3353273076
                                                      • Opcode ID: 5a5ba86425c9dcad4cf6e9f7420296ee745c77997db3fae12ec2bc7795a13987
                                                      • Instruction ID: ebe36c89c8b13b0efd7e2406ff23d13c170e39e72a9799f5cbcbfd8205334e5d
                                                      • Opcode Fuzzy Hash: 5a5ba86425c9dcad4cf6e9f7420296ee745c77997db3fae12ec2bc7795a13987
                                                      • Instruction Fuzzy Hash: 3141D233745A4486F702CF5AEC5075523A2B784BDAF84847AEE1C47390EE3ED892C342
                                                      APIs
                                                      • strtod.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,00007FFDFB1499ED), ref: 00007FFDFB149CB2
                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00007FFDFB1499ED), ref: 00007FFDFB149CD3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1778218400.00007FFDFB0B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDFB0B0000, based on PE: true
                                                      • Associated: 00000001.00000002.1778196667.00007FFDFB0B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778294222.00007FFDFB1B1000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778330221.00007FFDFB1F8000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778354573.00007FFDFB1F9000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778375535.00007FFDFB1FD000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778396262.00007FFDFB1FE000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778416919.00007FFDFB200000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000001.00000002.1778437725.00007FFDFB202000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfb0b0000_4.jbxd
                                                      Similarity
                                                      • API ID: isspacestrtod
                                                      • String ID: DISTANCE$VALUE$bad screen distance "%s"
                                                      • API String ID: 858613365-734856420
                                                      • Opcode ID: 567975ac094f1acdfbb5a9c03fe1517f65c178da47e4b4681fc1be6a20a4b671
                                                      • Instruction ID: 7414f2b9a46c54de4b3cfd348f45de5b9b556166a1548086af762eeb3a4d9392
                                                      • Opcode Fuzzy Hash: 567975ac094f1acdfbb5a9c03fe1517f65c178da47e4b4681fc1be6a20a4b671
                                                      • Instruction Fuzzy Hash: 47518E72A0AB8685EB048F15E4606BA67A1EB86BD8F084132DA6D473FCCF7CD585C740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: DoubleErr_Float_FromNumericStringSubtypeType_Unicode_
                                                      • String ID: not a numeric character
                                                      • API String ID: 1034370217-2058156748
                                                      • Opcode ID: e94a4cbcbf0e5bcd60c879edbbe527308af40d50addda8a0dc073dd71fed3554
                                                      • Instruction ID: 81525d42532af40a400347e91445fcfd983afb1b3dbafc23ddcc081b0f7363f1
                                                      • Opcode Fuzzy Hash: e94a4cbcbf0e5bcd60c879edbbe527308af40d50addda8a0dc073dd71fed3554
                                                      • Instruction Fuzzy Hash: 0F117525B0DBD782FB5C8B11A43093977A5AF44B84F1581B2C93E566DDDF2CE88B8700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: DecimalDigitErr_FromLongLong_StringSubtypeType_Unicode_
                                                      • String ID: not a decimal
                                                      • API String ID: 3750391552-3590249192
                                                      • Opcode ID: 1cd0ce8ce41aec67d618eaf50ce9a381a57b186b45043069d79b570d0f92dffd
                                                      • Instruction ID: 951b56cdcbfd96b61e67caca274da5ae05f2aa3942ea4b80346db7dd168f0a07
                                                      • Opcode Fuzzy Hash: 1cd0ce8ce41aec67d618eaf50ce9a381a57b186b45043069d79b570d0f92dffd
                                                      • Instruction Fuzzy Hash: 9B114F21B18BC682EB1C9B56E46493977A1AF44B84F4885B1DE6F866DCDF2CE45B8300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_ArgumentReadyUnicode_
                                                      • String ID: a unicode character$argument$decomposition
                                                      • API String ID: 1875788646-2471543666
                                                      • Opcode ID: 8e092fff27016ad70a75c21de804b5fd7f142a4693611c384d04bc395b3b3e7a
                                                      • Instruction ID: f7539db675c7bac822cd60cf11842510d4a37396f2b3f58c44ffbb8f081152db
                                                      • Opcode Fuzzy Hash: 8e092fff27016ad70a75c21de804b5fd7f142a4693611c384d04bc395b3b3e7a
                                                      • Instruction Fuzzy Hash: 70018B61B08BC397EF5C9B11E460AB833A0AF05B94F4951B1D97E576DDDF2CE48A8300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Arg_ArgumentReadyUnicode_
                                                      • String ID: a unicode character$argument$east_asian_width
                                                      • API String ID: 1875788646-3913127203
                                                      • Opcode ID: 1cd4da9dc117a34be79d860a1371cb1431d82210e1bfc1e6159635a71f123b29
                                                      • Instruction ID: 1ec45e6f07823ea8f2aa44426d6409b9f2feb901170cdc19855786add03d5cf0
                                                      • Opcode Fuzzy Hash: 1cd4da9dc117a34be79d860a1371cb1431d82210e1bfc1e6159635a71f123b29
                                                      • Instruction Fuzzy Hash: 4501A260F08BC396EF5C9B21A96097833A0AF06B94F445171D93E472DCDF2CE48A8300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Mem_$Capsule_Err_FreeMallocMemory
                                                      • String ID: unicodedata._ucnhash_CAPI
                                                      • API String ID: 3673501854-3989975041
                                                      • Opcode ID: 9c8937bca7593cf83dc6e6686b6a5b89807f230b44c95862bfa962c91a770e15
                                                      • Instruction ID: 8aefc3f804c032f832eba7a3121e33998bd2490c797393ede4350b83b5d04efe
                                                      • Opcode Fuzzy Hash: 9c8937bca7593cf83dc6e6686b6a5b89807f230b44c95862bfa962c91a770e15
                                                      • Instruction Fuzzy Hash: 3FF01960B09BC391EF4D9B15A8609B873A9BF18B84F4410B2C96E063DCEF3CE04E8310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: A_sizeD_sizeP_get_curve_nameR_pop_to_markY_get0_Y_get0_group
                                                      • String ID:
                                                      • API String ID: 2524731747-0
                                                      • Opcode ID: 6075d711208a0826b2fa15ed87acc049cad3210ebe7160a18e31799764006937
                                                      • Instruction ID: 751df34e307f6fde6aeea52fd98a223674814791ec0fc5e92cddc0066d6e7915
                                                      • Opcode Fuzzy Hash: 6075d711208a0826b2fa15ed87acc049cad3210ebe7160a18e31799764006937
                                                      • Instruction Fuzzy Hash: 30519462B09A5245EB58EE12AD60DB923E0EF85B84F4CC579DE2E473CDEE38F4418300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: H_freeO_ctrlO_freeO_newO_s_file
                                                      • String ID:
                                                      • API String ID: 1469330667-0
                                                      • Opcode ID: 765682f01ae3238ac3c1be456cf880ce6809dc705244a3b53d6733a7d88ebe25
                                                      • Instruction ID: 3fee4557657c44564df541a015f2b566b89c891665a98e6c431df839875dba8b
                                                      • Opcode Fuzzy Hash: 765682f01ae3238ac3c1be456cf880ce6809dc705244a3b53d6733a7d88ebe25
                                                      • Instruction Fuzzy Hash: D721C716B1959146FB69EB669861E7D2290EF84FC0F098171EF6D87BCEEE3CD8014740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X509_$E_dupE_freeL_sk_new_nullL_sk_pushX509_get_subject_name
                                                      • String ID:
                                                      • API String ID: 2231116090-0
                                                      • Opcode ID: 019af44cfb1c0b4768685177c1041a10eb430569b491c32d9ce366f41598f14d
                                                      • Instruction ID: 099627eb2b53acc5403515062d9397d3a1e194d2a44058cc16fb511f1e3e1df2
                                                      • Opcode Fuzzy Hash: 019af44cfb1c0b4768685177c1041a10eb430569b491c32d9ce366f41598f14d
                                                      • Instruction Fuzzy Hash: E0018F15F1964241FF9CA62AA575B7D52909F58BC0F0C4071EDAD8B7CEFE2DE4904200
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X509_$E_dupE_freeL_sk_new_nullL_sk_pushX509_get_subject_name
                                                      • String ID:
                                                      • API String ID: 2231116090-0
                                                      • Opcode ID: 82492383bb986031a130ce332d8c4117b49648594df4aaa9f1e28b13961d9d88
                                                      • Instruction ID: 08676ca8bd4dcd54d9d1b184ebc46fbf896db985c5c98fd2b79a037e841def7d
                                                      • Opcode Fuzzy Hash: 82492383bb986031a130ce332d8c4117b49648594df4aaa9f1e28b13961d9d88
                                                      • Instruction Fuzzy Hash: 35018F25F1964281FF9DAA26A525BBC52909F48BC0F0C4071EDBD4B7DEFE6DD4900200
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X509_$E_dupE_freeL_sk_new_nullL_sk_pushX509_get_subject_name
                                                      • String ID:
                                                      • API String ID: 2231116090-0
                                                      • Opcode ID: bbc04d1e51418fb5c88a6b4dbe813e7d522ff76cdc6b637606cc085351d25ffc
                                                      • Instruction ID: 878077643a32d8a28c0c529ea981b826297c1cd4414a28ef3c7d63b7a0af2a08
                                                      • Opcode Fuzzy Hash: bbc04d1e51418fb5c88a6b4dbe813e7d522ff76cdc6b637606cc085351d25ffc
                                                      • Instruction Fuzzy Hash: EC018F15F2A74241FF58A626A934BBD5290EF44BC0F0C6071EDAD8B7CEFE2DD4904600
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_size$_time64
                                                      • String ID: ..\s\ssl\statem\extensions_clnt.c
                                                      • API String ID: 2874025382-592572767
                                                      • Opcode ID: 3bb05089cdb05f957eb42d2de23b793f5514eebe7f9cd89615b320e47f4c4615
                                                      • Instruction ID: 5a1f0037639d8313baa7fc8e2c0968d7af31ff7f742520b420743e4b8ac5d2ea
                                                      • Opcode Fuzzy Hash: 3bb05089cdb05f957eb42d2de23b793f5514eebe7f9cd89615b320e47f4c4615
                                                      • Instruction Fuzzy Hash: F9B1A07A70C78282EB689B269560ABE6695EF44B84F040075EF6D47BDDDF7CE442CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: abortfwrite
                                                      • String ID: '$illegal index register
                                                      • API String ID: 1067672060-451399654
                                                      • Opcode ID: e96206c87d04c8ae897ccec997946a937721a608cf1bd284c20599d27f62ed74
                                                      • Instruction ID: 6cdca3b68099c893baa0fde9b68b955e488c81d7a4cb2816f5f7b3cfe690c820
                                                      • Opcode Fuzzy Hash: e96206c87d04c8ae897ccec997946a937721a608cf1bd284c20599d27f62ed74
                                                      • Instruction Fuzzy Hash: BF919D7361AB99C4DB228F3DE890A4C3B75E395F88B9AC112CB4C47B54CA7EC456C351
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1767461275-1080266419
                                                      • Opcode ID: 9c69d3e6be98beb030fa5cf9360c523eb2394a07a3783dabf1ec6d20db28155b
                                                      • Instruction ID: 78cbfaac87d85f3140d6b6d6613b1d602804b304700fe33611b2f93ad04bff9d
                                                      • Opcode Fuzzy Hash: 9c69d3e6be98beb030fa5cf9360c523eb2394a07a3783dabf1ec6d20db28155b
                                                      • Instruction Fuzzy Hash: B1118276F1964686EB58DB60CC20AAE67A0FBC0B04F848174DA5C437D8FF7DE606DA40
                                                      APIs
                                                      • PyErr_SetString.PYTHON311(?,?,?,?,?,00007FFDFAAF1EDC), ref: 00007FFDFAAF3B6F
                                                        • Part of subcall function 00007FFDFAAF1FD0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAAF2008
                                                        • Part of subcall function 00007FFDFAAF1FD0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAAF2026
                                                      • PyErr_Format.PYTHON311 ref: 00007FFDFAAF1F53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_strncmp$FormatString
                                                      • String ID: name too long$undefined character name '%s'
                                                      • API String ID: 3882229318-4056717002
                                                      • Opcode ID: 8b8c9c862c8556266a26c0415d30d38fd4fd6db163ae40366dde064f1277ed55
                                                      • Instruction ID: 46a658a88c05176944765281dadb265327dcdbd0829ab2b4c6964dac73512ce2
                                                      • Opcode Fuzzy Hash: 8b8c9c862c8556266a26c0415d30d38fd4fd6db163ae40366dde064f1277ed55
                                                      • Instruction Fuzzy Hash: E9111F65B18B8781EB0C9B14D4A4AB47364FB88748F8405B2CA2D472E8DF6DE24FC700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: A_freePrivateR_put_errord2i_
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 2825407714-2723262194
                                                      • Opcode ID: c797c086c4c14c8afdfb1bfc91e587b6a922f9977db26de9d9ec10b4d27710e4
                                                      • Instruction ID: 6550df5b76a0c143df880aab56f220ecd797e2c9a1fa66a9c60a199d99f40501
                                                      • Opcode Fuzzy Hash: c797c086c4c14c8afdfb1bfc91e587b6a922f9977db26de9d9ec10b4d27710e4
                                                      • Instruction Fuzzy Hash: D6F0F925B0820241EB089B25F9205BEE7A0EF887C0F584071EA6D477DEEE3CD5408600
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: strncmp
                                                      • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                                                      • API String ID: 1114863663-87138338
                                                      • Opcode ID: 8de3eb989cf6c62dcbce841305c01691443b1373284778389dc9e239678f53b6
                                                      • Instruction ID: 3498238a39d9d6308ff7bdd588422342d0a2098e01860dfef46ca175b4b544a5
                                                      • Opcode Fuzzy Hash: 8de3eb989cf6c62dcbce841305c01691443b1373284778389dc9e239678f53b6
                                                      • Instruction Fuzzy Hash: CA61F872B1878246E76CCA19A820ABA7752FB80790F444275EA7D47ACDDF7CD90F8704
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X509_$E_dupE_freeL_sk_pushX509_get_subject_name
                                                      • String ID:
                                                      • API String ID: 417592659-0
                                                      • Opcode ID: a33559d7b79354cf1b9566eba69a9061181642d9b4ea7565fb5e1ae7af5deea5
                                                      • Instruction ID: f154126ccf9f0041da853d89eeeecc24518e9ac513bfbb20e95669264024c111
                                                      • Opcode Fuzzy Hash: a33559d7b79354cf1b9566eba69a9061181642d9b4ea7565fb5e1ae7af5deea5
                                                      • Instruction Fuzzy Hash: D701A265F2964241FF9CA666A565BBC5290DF84BC4F0C8072EDBD4B7CEFE2DD4900200
                                                      APIs
                                                        • Part of subcall function 655C8C20: memcpy.MSVCRT ref: 655C8C79
                                                        • Part of subcall function 655C8C20: PyOS_string_to_double.PYTHON311 ref: 655C8C8B
                                                      • PyErr_Occurred.PYTHON311 ref: 655CA474
                                                      • PyFloat_FromDouble.PYTHON311 ref: 655CA614
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: DoubleErr_Float_FromOccurredS_string_to_doublememcpy
                                                      • String ID:
                                                      • API String ID: 1362591179-0
                                                      • Opcode ID: 695b78044db29a2a0ce2267fbe23439ce6da968bbd818b5b38907627a70014aa
                                                      • Instruction ID: 5e673ff01375e32e15cbb72af6efca52e0d8a5e4e3bff4ab2edb968a41afd4bb
                                                      • Opcode Fuzzy Hash: 695b78044db29a2a0ce2267fbe23439ce6da968bbd818b5b38907627a70014aa
                                                      • Instruction Fuzzy Hash: 20015EB1604640C6DB05DBE0C85CF1A37BBEB56796F429A9CCE0207220DB34E485C3C2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: L_sk_free$F_parse_listL_sk_new_null
                                                      • String ID:
                                                      • API String ID: 4265814531-0
                                                      • Opcode ID: 7df82fb949e12bf4a216ac0d1243a055229da8c8e7b3ff2f6a825a281c0e489e
                                                      • Instruction ID: aa466911c9e3ca1e5e03799fce68ccdba8307cef1813c3053da815618cb92eee
                                                      • Opcode Fuzzy Hash: 7df82fb949e12bf4a216ac0d1243a055229da8c8e7b3ff2f6a825a281c0e489e
                                                      • Instruction Fuzzy Hash: CB017125B08A5285F7559F15F8206AD63A0EF44BC0F4840B1EFAC47BDEEE3ED8A18700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_FromLongLong_Occurred
                                                      • String ID:
                                                      • API String ID: 4098471257-0
                                                      • Opcode ID: aabbc7cbffecf350cc0debdd91c005997631cacfd57ba68f9ec502ffa48558b6
                                                      • Instruction ID: 1591b0ae57af41b13a8604c5782a0bd1aecd88abb56c1f95849ce37046daff50
                                                      • Opcode Fuzzy Hash: aabbc7cbffecf350cc0debdd91c005997631cacfd57ba68f9ec502ffa48558b6
                                                      • Instruction Fuzzy Hash: 2601FBA1305610C2E704DBE5C86CB1A33BBEB96B96F5299ACCE1607604DF35E885C3C2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: X_free
                                                      • String ID:
                                                      • API String ID: 2268491255-0
                                                      • Opcode ID: 0501fa589575d6f3eaf730ced008f5909f2c3022fc05dda30cca060b699d4e5a
                                                      • Instruction ID: a4f61d6b3f978a29238c967b38d5517bbe4458ad64da1d8ae808404ec9669a1f
                                                      • Opcode Fuzzy Hash: 0501fa589575d6f3eaf730ced008f5909f2c3022fc05dda30cca060b699d4e5a
                                                      • Instruction Fuzzy Hash: E8F0C86270868180EB48AF65D8A06BC6364EFC0B88F0C0479EF1D8B6CEDE2CD0418325
                                                      APIs
                                                      • memcpy.VCRUNTIME140 ref: 00007FFDFACF28D7
                                                        • Part of subcall function 00007FFDFACA1267: EVP_CIPHER_CTX_cipher.LIBCRYPTO-1_1 ref: 00007FFDFACF1496
                                                        • Part of subcall function 00007FFDFACA1267: EVP_CIPHER_flags.LIBCRYPTO-1_1 ref: 00007FFDFACF149E
                                                        • Part of subcall function 00007FFDFACA1267: EVP_MD_CTX_md.LIBCRYPTO-1_1 ref: 00007FFDFACF14B0
                                                        • Part of subcall function 00007FFDFACA1267: EVP_MD_size.LIBCRYPTO-1_1 ref: 00007FFDFACF14B8
                                                        • Part of subcall function 00007FFDFACA1267: EVP_CIPHER_CTX_cipher.LIBCRYPTO-1_1 ref: 00007FFDFACF14D1
                                                        • Part of subcall function 00007FFDFACA1267: EVP_CIPHER_flags.LIBCRYPTO-1_1 ref: 00007FFDFACF14D9
                                                        • Part of subcall function 00007FFDFACA1267: EVP_CIPHER_CTX_block_size.LIBCRYPTO-1_1 ref: 00007FFDFACF14EF
                                                        • Part of subcall function 00007FFDFACA1267: BIO_ctrl.LIBCRYPTO-1_1 ref: 00007FFDFACF156D
                                                      • BIO_ctrl.LIBCRYPTO-1_1 ref: 00007FFDFACF2A07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrlR_flagsX_cipher$D_sizeX_block_sizeX_mdmemcpy
                                                      • String ID: ..\s\ssl\statem\statem_dtls.c
                                                      • API String ID: 1483294773-3140652063
                                                      • Opcode ID: f6f1225df6da9857974aae5f0d83e5a90a655bab5c8b9d774c8ec9638ca7f507
                                                      • Instruction ID: abd542e3c58f84584787573bb787c13e3d03013d0632674bf01b58ad713e9e08
                                                      • Opcode Fuzzy Hash: f6f1225df6da9857974aae5f0d83e5a90a655bab5c8b9d774c8ec9638ca7f507
                                                      • Instruction Fuzzy Hash: AC617936314BC492D798DB16E990BAE77A8FB88B80F144126EFAC47799DF38D460C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_ctrl
                                                      • String ID: ..\s\ssl\d1_lib.c
                                                      • API String ID: 3605655398-490761327
                                                      • Opcode ID: 374a9ab09d6f5e84d2d8ea56c736a76c1bde39e4b9d46e7b74b8078d9425694c
                                                      • Instruction ID: ea3209f26addae7926bd4c2dcc880fb39686013a154f61d76d2d4538b3f01279
                                                      • Opcode Fuzzy Hash: 374a9ab09d6f5e84d2d8ea56c736a76c1bde39e4b9d46e7b74b8078d9425694c
                                                      • Instruction Fuzzy Hash: 8D517C3AB1438686DB58CB25C264BFD77A2FB85B88F5441B1DA7D4B7E9CF3890518B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Time$System$File
                                                      • String ID: gfff
                                                      • API String ID: 2838179519-1553575800
                                                      • Opcode ID: 5bab4889fdff038a34dd7d6efd02d934e11c3433e8613633f5b88581a3d60216
                                                      • Instruction ID: 8d80d0e875424497a007d38fff0daac39ab69c59d1ae8b8325c8e7bc758d9a0b
                                                      • Opcode Fuzzy Hash: 5bab4889fdff038a34dd7d6efd02d934e11c3433e8613633f5b88581a3d60216
                                                      • Instruction Fuzzy Hash: E3216176B0464786DB988F29E5207BD7AE0EB88B98F448075DA9D8B79DEE3CD1508700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: D_bytes_time64
                                                      • String ID: DOWNGRD
                                                      • API String ID: 3543108242-2922851170
                                                      • Opcode ID: badda77ca74e05cbb1b9a1913239d2957b81495fa8a0d3fb60bfa0f44542addb
                                                      • Instruction ID: b9db094fd4d6e88b1b68d72a555d3116b8981bf57d13c957dbdb9a4e2c783a3e
                                                      • Opcode Fuzzy Hash: badda77ca74e05cbb1b9a1913239d2957b81495fa8a0d3fb60bfa0f44542addb
                                                      • Instruction Fuzzy Hash: 6221D836B1868283EB5C8729E97197D6291EB94784F544179EB2F877C9DE2DF8B0C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: O_clear_flagsO_set_flags
                                                      • String ID: ..\s\ssl\statem\statem_srvr.c
                                                      • API String ID: 3946675294-348624464
                                                      • Opcode ID: 4b3a9d5648761a30f2a74924cfa7a94449ef5792fa18d33c1a6b7f79d56e4658
                                                      • Instruction ID: 5af1521134dd1f16a6e16e68092edb1d3f8c1e65a5c38fea7121a5a048304a4a
                                                      • Opcode Fuzzy Hash: 4b3a9d5648761a30f2a74924cfa7a94449ef5792fa18d33c1a6b7f79d56e4658
                                                      • Instruction Fuzzy Hash: B1210326B082828AE7589B11D864BBD3B90FB84748F4840B6EA5D877DACF7CE445C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_Format
                                                      • String ID: %s (%d:%d)
                                                      • API String ID: 376477240-1595188566
                                                      • Opcode ID: 9c1740d484fed628f48a0c578d54d93dbd62a74178a83dd6b6a572e122247c55
                                                      • Instruction ID: de346be165aa614436dc4087497ac056e48ee28c5b7fb5124db3f5767cfe8f52
                                                      • Opcode Fuzzy Hash: 9c1740d484fed628f48a0c578d54d93dbd62a74178a83dd6b6a572e122247c55
                                                      • Instruction Fuzzy Hash: 40016837B04B1485EB009B69DC6439A3391FB86B51FCA416ACD5E27361CF2EC882C383
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error$R_add_error_data$conf_ssl_get_cmdconf_ssl_name_find
                                                      • String ID: !$..\s\ssl\ssl_mcnf.c
                                                      • API String ID: 1136227658-1677383339
                                                      • Opcode ID: 7024b6112d44a401bdb0f3d32813959a5e408be8cf8b68b193383ec4148f1dbf
                                                      • Instruction ID: eca145edefbad1ef164dbb9d14cbea38d2460f2f02859d664709810df54e7627
                                                      • Opcode Fuzzy Hash: 7024b6112d44a401bdb0f3d32813959a5e408be8cf8b68b193383ec4148f1dbf
                                                      • Instruction Fuzzy Hash: 2701F567B0928142F7289B95A825FBE51A0AF80BD4F01C078FE2D4BBC9DF3CD5928650
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1767461275-1080266419
                                                      • Opcode ID: db5c5e32c28ca2a2d510f84eb8fc12137c23db9f08decfc8fea4a1f60878925a
                                                      • Instruction ID: ae968b1c98d2b483c3a36b684f45b318d13235da9fc41ad4d42d6891818a7944
                                                      • Opcode Fuzzy Hash: db5c5e32c28ca2a2d510f84eb8fc12137c23db9f08decfc8fea4a1f60878925a
                                                      • Instruction Fuzzy Hash: CC117C69F1968282F75897609820BBE22D5AF84304F4581B4DD2C877DDEF3CE691C214
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1767461275-1080266419
                                                      • Opcode ID: 313acef978bffea86714e02ae65a3a584ea264f2087be210df51fc1ee6c682e6
                                                      • Instruction ID: 8ce1325d3b452ec0209171975cfc3b14ea67081582ac6168547c6a61e2a7d42f
                                                      • Opcode Fuzzy Hash: 313acef978bffea86714e02ae65a3a584ea264f2087be210df51fc1ee6c682e6
                                                      • Instruction Fuzzy Hash: 5D01D876F18281C6F3589B54EC28B9D2691F740708F448174DA5C873E9CF7DD586CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1767461275-1080266419
                                                      • Opcode ID: a3402959f9b8482732006edcbc1b967c4b4a5d664d34c2b69162fbf4fa25a2fd
                                                      • Instruction ID: 0ae4373c76ea6ae6ad43dbccb2df0be8785fefa9ea517db06815c5e0d90a529f
                                                      • Opcode Fuzzy Hash: a3402959f9b8482732006edcbc1b967c4b4a5d664d34c2b69162fbf4fa25a2fd
                                                      • Instruction Fuzzy Hash: 6601D4B2F182818AF7589B94D828B9D2791FB80B44F448174EA5C477E9DFBDE586CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_errorY_free
                                                      • String ID: ..\s\ssl\ssl_rsa.c
                                                      • API String ID: 3485142574-2723262194
                                                      • Opcode ID: a8b50999a1deb4f36001f735a94d71a96bf2baf49509506769d5e8e0f44de373
                                                      • Instruction ID: 691ad63f118c345c2a82e859e77e458d6221bf27111b17b52ae9ce5cce9f10fb
                                                      • Opcode Fuzzy Hash: a8b50999a1deb4f36001f735a94d71a96bf2baf49509506769d5e8e0f44de373
                                                      • Instruction Fuzzy Hash: 4A01F926B0828146E708DB65F9105BEA3A0EF88BC4F484071EA6C47BCEEF3CD500CB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: String$Err_FromUnicode_
                                                      • String ID: no such name
                                                      • API String ID: 3678473424-4211486178
                                                      • Opcode ID: 0bad81046192c5090e63041fc1c0adfcc3ec090d4373e4d8dfd61f48ff6f657e
                                                      • Instruction ID: 7226b2806bf2dd2510b1828454a747e1e0f07f6a245e02996359ecae3a5b5f0f
                                                      • Opcode Fuzzy Hash: 0bad81046192c5090e63041fc1c0adfcc3ec090d4373e4d8dfd61f48ff6f657e
                                                      • Instruction Fuzzy Hash: 8A016231B18B8682FB2D9B11E860BB97364BF98B44F405071DA6E467DCDF2CE10E8600
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: Y_get0_group
                                                      • String ID: {
                                                      • API String ID: 3268241200-4087598719
                                                      • Opcode ID: e33d06e3be94e0a184dbb4d4c60d0bab2df72c9bf962c9d4d93606db3ef6c6e7
                                                      • Instruction ID: 9c58816d12ccd342823fdc9a7c4273d70878189b62db130fe6280b2e14b65ca3
                                                      • Opcode Fuzzy Hash: e33d06e3be94e0a184dbb4d4c60d0bab2df72c9bf962c9d4d93606db3ef6c6e7
                                                      • Instruction Fuzzy Hash: 80F0D129B0C65285FB289A11E020ABCA750FB807D4F440572DEAC476DDDF7EE1558B14
                                                      APIs
                                                      Strings
                                                      • LTC_ARGCHK '%s' failure on line %d of file %s, xrefs: 655DD156
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: __iob_funcabort
                                                      • String ID: LTC_ARGCHK '%s' failure on line %d of file %s
                                                      • API String ID: 1307436159-2823265812
                                                      • Opcode ID: 46087975afcaa622477c847d165131ce8b09b70f85f8d085bbba04eb67a60273
                                                      • Instruction ID: 09c1a028bca6351ed2b6738e4ea82db35224b0e59f95f82dc5db8e7a1562facb
                                                      • Opcode Fuzzy Hash: 46087975afcaa622477c847d165131ce8b09b70f85f8d085bbba04eb67a60273
                                                      • Instruction Fuzzy Hash: 08D05EA0330AA951EB105B16AC00B599B61FB6DFE8F848121ED4D8BB145B24C616C341
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_errormemcpy
                                                      • String ID: ..\s\ssl\ssl_sess.c
                                                      • API String ID: 1385177007-2868363209
                                                      • Opcode ID: 30f9734ecd00a7bffa40890edf63c63ac05f31dd9d01e44b878c104969c93cc2
                                                      • Instruction ID: 5e3ed1538ad38d74c898883644119eb356bd67817657754f1be6adc87e286843
                                                      • Opcode Fuzzy Hash: 30f9734ecd00a7bffa40890edf63c63ac05f31dd9d01e44b878c104969c93cc2
                                                      • Instruction Fuzzy Hash: B0F0EC39F1509387F764A795DD25FFD17A0EF80340F8005B4E22D47AC9DE2D66468B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_errormemcpy
                                                      • String ID: ..\s\ssl\ssl_sess.c
                                                      • API String ID: 1385177007-2868363209
                                                      • Opcode ID: 17e013de3809daf3472b70231a7f22976cbc54be5ed0b8d231b0a7578bd7facd
                                                      • Instruction ID: 3c1d361b96d1c8bf6e5be8923018e5559e77daa912ca9cfc5fc400ae86f4f0d3
                                                      • Opcode Fuzzy Hash: 17e013de3809daf3472b70231a7f22976cbc54be5ed0b8d231b0a7578bd7facd
                                                      • Instruction Fuzzy Hash: 2AF0E53AF1905283F768A7A4D925FEC27A0EF40340FC040B0F62C476D9DE2D67868B10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_errormemcpy
                                                      • String ID: ..\s\ssl\ssl_lib.c
                                                      • API String ID: 1385177007-1080266419
                                                      • Opcode ID: 5fe9283d2c71ab4161b7334fd32eb3f44c3a3402327cdb9bd1134ce8e9508b8e
                                                      • Instruction ID: 0d3ec8d3015b7a7fc3d5b4bfbc885eb94dcd8f633f7132906abb6dc4b010f5eb
                                                      • Opcode Fuzzy Hash: 5fe9283d2c71ab4161b7334fd32eb3f44c3a3402327cdb9bd1134ce8e9508b8e
                                                      • Instruction Fuzzy Hash: 8FE06D66F1809A86F364A7A49C22BAE26A0EB84340FC001B0E51D476C9DE6EA656CB00
                                                      APIs
                                                      • _PyObject_GC_New.PYTHON311(?,?,00000000,00007FFDFAAF2533), ref: 00007FFDFAAF25B6
                                                      • PyObject_GC_Track.PYTHON311(?,?,00000000,00007FFDFAAF2533), ref: 00007FFDFAAF25E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777037310.00007FFDFAAF1000.00000020.00000001.01000000.00000019.sdmp, Offset: 00007FFDFAAF0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777016741.00007FFDFAAF0000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAAF5000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB52000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAB9E000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA1000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFABA6000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777059170.00007FFDFAC00000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777255110.00007FFDFAC03000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777277150.00007FFDFAC05000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaaf0000_4.jbxd
                                                      Similarity
                                                      • API ID: Object_$Track
                                                      • String ID: 3.2.0
                                                      • API String ID: 16854473-1786766648
                                                      • Opcode ID: 767dd7ab98994f43239e4e329e749c2ad7475791c86a6fb4d160e6b955e6c056
                                                      • Instruction ID: 26046400d5b02e8146bb3af3158c27b508b0c8b103f804cd5e3db495208b6cac
                                                      • Opcode Fuzzy Hash: 767dd7ab98994f43239e4e329e749c2ad7475791c86a6fb4d160e6b955e6c056
                                                      • Instruction Fuzzy Hash: 21E0ED24B05B8695EF1D9B11E46446833A8BF08704B440175CD6D02398EF3CE16EC240
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: Err_Format
                                                      • String ID: %s (%d:%d)$V(
                                                      • API String ID: 376477240-3100289930
                                                      • Opcode ID: d9991739fddf0b59a5afcf03b16f565913d77941ade88f4d70cf633e4cab829c
                                                      • Instruction ID: ef55750f9bc179eb88acf30f4fcb7695c3518fa0e95a251e8f8aa5b4a86e5272
                                                      • Opcode Fuzzy Hash: d9991739fddf0b59a5afcf03b16f565913d77941ade88f4d70cf633e4cab829c
                                                      • Instruction Fuzzy Hash: 0AE04634200E4485EB50CB4AECA87192322F7C5BC5F805149DC4E07B60CF3EC551C342
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1777491240.00007FFDFACA1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFDFACA0000, based on PE: true
                                                      • Associated: 00000001.00000002.1777470732.00007FFDFACA0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777491240.00007FFDFAD14000.00000020.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777559458.00007FFDFAD16000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777590026.00007FFDFAD39000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD3E000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD44000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      • Associated: 00000001.00000002.1777611828.00007FFDFAD4B000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffdfaca0000_4.jbxd
                                                      Similarity
                                                      • API ID: R_put_error
                                                      • String ID: ..\s\ssl\s3_lib.c$m
                                                      • API String ID: 1767461275-297842231
                                                      • Opcode ID: dabded245b1138d054d01c0e447c6de338ca7fe595687a8483ebc962513b1b14
                                                      • Instruction ID: eabf9094cd987941d6514e7ca8d6a9cf42335479a897e33bcf6f64a6fcf02422
                                                      • Opcode Fuzzy Hash: dabded245b1138d054d01c0e447c6de338ca7fe595687a8483ebc962513b1b14
                                                      • Instruction Fuzzy Hash: FBD0C227B0891586F310DF41F8005DA6320F788350F440432EF5C036D9DF3DE4468A10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1771189569.00000000655C1000.00000020.00000001.01000000.00000022.sdmp, Offset: 655C0000, based on PE: true
                                                      • Associated: 00000001.00000002.1771168901.00000000655C0000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771240113.0000000065642000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771260843.0000000065646000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771344054.0000000065647000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771421778.000000006565F000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771510917.0000000065662000.00000004.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771530794.0000000065664000.00000008.00000001.01000000.00000022.sdmpDownload File
                                                      • Associated: 00000001.00000002.1771550422.0000000065668000.00000002.00000001.01000000.00000022.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_655c0000_4.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeavefree
                                                      • String ID:
                                                      • API String ID: 4020351045-0
                                                      • Opcode ID: a6b364ecbfa2b34290d298149fd33260da1a653da3fa5711295226c5094af852
                                                      • Instruction ID: 2d4b5674ca0f39f8353189b13fbd2970ebce720dfb1b753f0b14710529dfaab1
                                                      • Opcode Fuzzy Hash: a6b364ecbfa2b34290d298149fd33260da1a653da3fa5711295226c5094af852
                                                      • Instruction Fuzzy Hash: F3017C61316F10C2EB08CB65ED8036923A2F7A4B76FD09536D9198B720EF39C4A5C351