Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HxYqlJEUcq.exe

Overview

General Information

Sample name:HxYqlJEUcq.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:FD43184BBFEB84EDE2569054E8DF15F7A0FD8D00F96652558F020D5E61046563
Analysis ID:1541052
MD5:f42027e450d51ce5b48df6496678bd14
SHA1:95955705c4fcd65bf9fc4c548b2f96727b746740
SHA256:fd43184bbfeb84ede2569054e8df15f7a0fd8d00f96652558f020d5e61046563
Infos:

Detection

Score:33
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Found pyInstaller with non standard icon
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • HxYqlJEUcq.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\HxYqlJEUcq.exe" MD5: F42027E450D51CE5B48DF6496678BD14)
    • HxYqlJEUcq.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\HxYqlJEUcq.exe" MD5: F42027E450D51CE5B48DF6496678BD14)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: HxYqlJEUcq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: select.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991292369.00007FFE11EDB000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.15 3 Sep 20243.0.15built on: Wed Sep 4 15:52:04 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_p
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991292369.00007FFE11EDB000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991453361.00007FFE126ED000.00000002.00000001.01000000.0000000A.sdmp, _bz2.pyd.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1738803397.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2992074031.00007FFE13314000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: HxYqlJEUcq.exe, 00000000.00000003.1738803397.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2992074031.00007FFE13314000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: HxYqlJEUcq.exe, 00000001.00000002.2991937038.00007FFE13238000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python313.pdb source: HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmp
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C9280 FindFirstFileExW,FindClose,0_2_00007FF6110C9280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF6110C83C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C9280 FindFirstFileExW,FindClose,1_2_00007FF6110C9280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF6110C83C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI74202\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\Jump to behavior
Source: HxYqlJEUcq.exe, 00000000.00000003.1739637664.000002176367C000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739637664.000002176367C000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: HxYqlJEUcq.exe, 00000000.00000003.1739637664.000002176367C000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: _bz2.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: HxYqlJEUcq.exe, 00000000.00000003.1739637664.000002176367C000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: HxYqlJEUcq.exe, 00000000.00000003.1739637664.000002176367C000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: HxYqlJEUcq.exe, 00000001.00000002.2985533099.0000028979E8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip.tcl.tk/48)
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, tcl86t.dll.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: HxYqlJEUcq.exe, 00000001.00000002.2991769172.00007FFE13227000.00000008.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.zlib.net/D
Source: http-2.9.8.tm.0.drString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Connection
Source: HxYqlJEUcq.exe, 00000001.00000002.2986467654.0000028979FF0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://docs.python.org/3/howto/mro.html.
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
Source: HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
Source: HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: HxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: HxYqlJEUcq.exe, 00000001.00000003.1802731734.0000028979BB1000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2986552991.000002897A104000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://peps.python.org/pep-0205/
Source: HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
Source: HxYqlJEUcq.exe, 00000001.00000002.2988363730.000002897A786000.00000004.00000020.00020000.00000000.sdmp, tk.tcl.0.drString found in binary or memory: https://support.apple.com/en-us/HT201236
Source: libcrypto-3.dll.0.drString found in binary or memory: https://www.openssl.org/H
Source: HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.python.org/psf/license/)
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013087B0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GetLocaleInfoA,GlobalUnlock,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,1_2_00007FFE013087B0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01308D00 GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,1_2_00007FFE01308D00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01308ED0 OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00007FFE01308ED0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013087B0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GetLocaleInfoA,GlobalUnlock,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,1_2_00007FFE013087B0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013179A0 ClientToScreen,GetSystemMetrics,GetAsyncKeyState,GetAsyncKeyState,TrackPopupMenu,GetCursorPos,WindowFromPoint,1_2_00007FFE013179A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0131BA40 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,1_2_00007FFE0131BA40
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E69640_2_00007FF6110E6964
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C89E00_2_00007FF6110C89E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E5C000_2_00007FF6110E5C00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E08C80_2_00007FF6110E08C8
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C10000_2_00007FF6110C1000
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110DDA5C0_2_00007FF6110DDA5C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CA2DB0_2_00007FF6110CA2DB
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D19440_2_00007FF6110D1944
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D21640_2_00007FF6110D2164
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D39A40_2_00007FF6110D39A4
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CA4740_2_00007FF6110CA474
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CACAD0_2_00007FF6110CACAD
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D5D300_2_00007FF6110D5D30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D1B500_2_00007FF6110D1B50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D2C100_2_00007FF6110D2C10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E3C100_2_00007FF6110E3C10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E08C80_2_00007FF6110E08C8
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E64180_2_00007FF6110E6418
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E5E7C0_2_00007FF6110E5E7C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D9EA00_2_00007FF6110D9EA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110DDEF00_2_00007FF6110DDEF0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E97280_2_00007FF6110E9728
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D1D540_2_00007FF6110D1D54
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110DE5700_2_00007FF6110DE570
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D35A00_2_00007FF6110D35A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E18740_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E40AC0_2_00007FF6110E40AC
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D80E40_2_00007FF6110D80E4
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D17400_2_00007FF6110D1740
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D1F600_2_00007FF6110D1F60
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110D87940_2_00007FF6110D8794
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C98000_2_00007FF6110C9800
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E69641_2_00007FF6110E6964
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C10001_2_00007FF6110C1000
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110DDA5C1_2_00007FF6110DDA5C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CA2DB1_2_00007FF6110CA2DB
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D19441_2_00007FF6110D1944
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D21641_2_00007FF6110D2164
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D39A41_2_00007FF6110D39A4
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C89E01_2_00007FF6110C89E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CA4741_2_00007FF6110CA474
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CACAD1_2_00007FF6110CACAD
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D5D301_2_00007FF6110D5D30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D1B501_2_00007FF6110D1B50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D2C101_2_00007FF6110D2C10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E3C101_2_00007FF6110E3C10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E5C001_2_00007FF6110E5C00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E08C81_2_00007FF6110E08C8
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E64181_2_00007FF6110E6418
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E5E7C1_2_00007FF6110E5E7C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D9EA01_2_00007FF6110D9EA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110DDEF01_2_00007FF6110DDEF0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E97281_2_00007FF6110E9728
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D1D541_2_00007FF6110D1D54
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110DE5701_2_00007FF6110DE570
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D35A01_2_00007FF6110D35A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E18741_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E40AC1_2_00007FF6110E40AC
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E08C81_2_00007FF6110E08C8
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D80E41_2_00007FF6110D80E4
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D17401_2_00007FF6110D1740
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D1F601_2_00007FF6110D1F60
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110D87941_2_00007FF6110D8794
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C98001_2_00007FF6110C9800
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2D1FA01_2_00007FFDFF2D1FA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF266E801_2_00007FFDFF266E80
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2553EF1_2_00007FFDFF2553EF
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2F7C401_2_00007FFDFF2F7C40
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF33F2801_2_00007FFDFF33F280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF3A12301_2_00007FFDFF3A1230
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2B41F01_2_00007FFDFF2B41F0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2437611_2_00007FFDFF243761
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF264FD01_2_00007FFDFF264FD0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF305FE01_2_00007FFDFF305FE0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2708501_2_00007FFDFF270850
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2D36701_2_00007FFDFF2D3670
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2E66D01_2_00007FFDFF2E66D0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2B6EB01_2_00007FFDFF2B6EB0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF26F6A01_2_00007FFDFF26F6A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2FCEA01_2_00007FFDFF2FCEA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2977101_2_00007FFDFF297710
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF365F001_2_00007FFDFF365F00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF25C7391_2_00007FFDFF25C739
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF307F301_2_00007FFDFF307F30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2EC5701_2_00007FFDFF2EC570
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2CBE001_2_00007FFDFF2CBE00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2716401_2_00007FFDFF271640
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF3944C01_2_00007FFDFF3944C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF25646C1_2_00007FFDFF25646C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF36BC801_2_00007FFDFF36BC80
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2BA4A01_2_00007FFDFF2BA4A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2585101_2_00007FFDFF258510
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2D45101_2_00007FFDFF2D4510
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF26ED001_2_00007FFDFF26ED00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF361D401_2_00007FFDFF361D40
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF366D401_2_00007FFDFF366D40
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2FECE01_2_00007FFDFF2FECE0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2E4D501_2_00007FFDFF2E4D50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF262D201_2_00007FFDFF262D20
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF31B3701_2_00007FFDFF31B370
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2533B01_2_00007FFDFF2533B0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF24FC101_2_00007FFDFF24FC10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2613F01_2_00007FFDFF2613F0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF35FBE01_2_00007FFDFF35FBE0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF25A1901_2_00007FFDFF25A190
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF3839C01_2_00007FFDFF3839C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2CFA101_2_00007FFDFF2CFA10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2F41E01_2_00007FFDFF2F41E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF36C2001_2_00007FFDFF36C200
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2D0A201_2_00007FFDFF2D0A20
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF2410FE1_2_00007FFDFF2410FE
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF3841301_2_00007FFDFF384130
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF26E0F01_2_00007FFDFF26E0F0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013E88C01_2_00007FFE013E88C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013D6B2B1_2_00007FFE013D6B2B
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013D8C401_2_00007FFE013D8C40
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013811E01_2_00007FFE013811E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013152701_2_00007FFE01315270
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013115101_2_00007FFE01311510
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013161A01_2_00007FFE013161A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013C01601_2_00007FFE013C0160
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013C40A01_2_00007FFE013C40A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013E80601_2_00007FFE013E8060
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013020F01_2_00007FFE013020F0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013144001_2_00007FFE01314400
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0137A4201_2_00007FFE0137A420
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0137C3E01_2_00007FFE0137C3E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013AE3F01_2_00007FFE013AE3F0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013443101_2_00007FFE01344310
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0134A3101_2_00007FFE0134A310
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0138C2C01_2_00007FFE0138C2C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013EE6101_2_00007FFE013EE610
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0133C6201_2_00007FFE0133C620
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0137C5301_2_00007FFE0137C530
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013AA4E01_2_00007FFE013AA4E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013767901_2_00007FFE01376790
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013CC7901_2_00007FFE013CC790
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013667701_2_00007FFE01366770
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013866501_2_00007FFE01386650
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013826601_2_00007FFE01382660
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013227201_2_00007FFE01322720
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013887201_2_00007FFE01388720
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01344A301_2_00007FFE01344A30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01370A301_2_00007FFE01370A30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0137E9261_2_00007FFE0137E926
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013848C01_2_00007FFE013848C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013E8B871_2_00007FFE013E8B87
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013D2C201_2_00007FFE013D2C20
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01318BE01_2_00007FFE01318BE0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0137AA901_2_00007FFE0137AA90
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013AEA901_2_00007FFE013AEA90
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0130CAB71_2_00007FFE0130CAB7
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013A4A701_2_00007FFE013A4A70
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01384AC31_2_00007FFE01384AC3
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01306B301_2_00007FFE01306B30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0130ADB01_2_00007FFE0130ADB0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01310D501_2_00007FFE01310D50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013BCCA01_2_00007FFE013BCCA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01346C501_2_00007FFE01346C50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013C6D001_2_00007FFE013C6D00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0135CD301_2_00007FFE0135CD30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01312CE01_2_00007FFE01312CE0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013B6CF01_2_00007FFE013B6CF0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01388FB01_2_00007FFE01388FB0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01382F501_2_00007FFE01382F50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013E8F501_2_00007FFE013E8F50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013B4F701_2_00007FFE013B4F70
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01320FD01_2_00007FFE01320FD0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01384FD71_2_00007FFE01384FD7
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013BAE901_2_00007FFE013BAE90
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013C0E501_2_00007FFE013C0E50
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01336E701_2_00007FFE01336E70
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013751801_2_00007FFE01375180
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013AF1601_2_00007FFE013AF160
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013671701_2_00007FFE01367170
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013B31C01_2_00007FFE013B31C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013050601_2_00007FFE01305060
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013010E01_2_00007FFE013010E0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013FB3D01_2_00007FFE013FB3D0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013F72801_2_00007FFE013F7280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013B12401_2_00007FFE013B1240
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013453301_2_00007FFE01345330
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0133D4801_2_00007FFE0133D480
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013E75101_2_00007FFE013E7510
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013AD5301_2_00007FFE013AD530
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013DF4D01_2_00007FFE013DF4D0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0138B7701_2_00007FFE0138B770
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013B56501_2_00007FFE013B5650
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013917301_2_00007FFE01391730
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013279601_2_00007FFE01327960
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01315A101_2_00007FFE01315A10
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01385A301_2_00007FFE01385A30
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013BFAA01_2_00007FFE013BFAA0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0130DA601_2_00007FFE0130DA60
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013BDA701_2_00007FFE013BDA70
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01381B001_2_00007FFE01381B00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FF6110C2710 appears 104 times
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FFDFF355130 appears 125 times
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FF6110C2910 appears 34 times
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FFE013F5B80 appears 53 times
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FFDFF34D5A0 appears 63 times
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: String function: 00007FFDFF33AF80 appears 968 times
Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: zlib1.dll.0.drStatic PE information: Number of sections : 12 > 10
Source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000000.00000003.1738803397.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000000.00000003.1739106237.000002176366F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exeBinary or memory string: OriginalFilename vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenametcl86.dll. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2991994955.00007FFE1323E000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilename_tkinter.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2990400276.00007FFDFB9A0000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython313.dll. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2991769172.00007FFE13227000.00000008.00000001.01000000.00000009.sdmpBinary or memory string: OriginalFilenamezlib1.dll* vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilenametk86.dll. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2991374284.00007FFE11EE3000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2992162174.00007FFE1331A000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs HxYqlJEUcq.exe
Source: HxYqlJEUcq.exe, 00000001.00000002.2991507305.00007FFE126F2000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs HxYqlJEUcq.exe
Source: classification engineClassification label: sus33.winEXE@3/939@0/0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0131B6A0 CreateBitmap,GetDC,CreateDIBSection,ReleaseDC,GetLastError,FormatMessageW,MessageBoxW,LocalFree,1_2_00007FFE0131B6A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE0130A400 GetModuleHandleW,GetProcAddress,CoInitialize,CoCreateInstance,CoCreateInstance,1_2_00007FFE0130A400
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202Jump to behavior
Source: HxYqlJEUcq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: HxYqlJEUcq.exeString found in binary or memory: -help
Source: HxYqlJEUcq.exeString found in binary or memory: -startline must be less than or equal to -endline
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile read: C:\Users\user\Desktop\HxYqlJEUcq.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\HxYqlJEUcq.exe "C:\Users\user\Desktop\HxYqlJEUcq.exe"
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeProcess created: C:\Users\user\Desktop\HxYqlJEUcq.exe "C:\Users\user\Desktop\HxYqlJEUcq.exe"
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeProcess created: C:\Users\user\Desktop\HxYqlJEUcq.exe "C:\Users\user\Desktop\HxYqlJEUcq.exe"Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: python3.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: tcl86t.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: tk86t.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: zlib1.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeSection loaded: wintypes.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: HxYqlJEUcq.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: HxYqlJEUcq.exeStatic file information: File size 10283628 > 1048576
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: HxYqlJEUcq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: HxYqlJEUcq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: select.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739267991.000002176366F000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991292369.00007FFE11EDB000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.15 3 Sep 20243.0.15built on: Wed Sep 4 15:52:04 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_p
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739393971.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991292369.00007FFE11EDB000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1738960825.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2991453361.00007FFE126ED000.00000002.00000001.01000000.0000000A.sdmp, _bz2.pyd.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1738803397.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2992074031.00007FFE13314000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: HxYqlJEUcq.exe, 00000000.00000003.1738803397.000002176366F000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2992074031.00007FFE13314000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: HxYqlJEUcq.exe, 00000001.00000002.2991937038.00007FFE13238000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: HxYqlJEUcq.exe, 00000000.00000003.1739525407.000002176366F000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python313.pdb source: HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmp
Source: HxYqlJEUcq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: HxYqlJEUcq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: HxYqlJEUcq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: HxYqlJEUcq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: HxYqlJEUcq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: VCRUNTIME140.dll.0.drStatic PE information: 0x78BDDED1 [Sat Mar 11 17:01:05 2034 UTC]
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013DA280 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FFE013DA280
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: fothk
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
Source: libcrypto-3.dll.0.drStatic PE information: section name: .00cfg
Source: python313.dll.0.drStatic PE information: section name: PyRuntim
Source: zlib1.dll.0.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013ACC32 push rbp; ret 1_2_00007FFE013ACC5D
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013ACC86 push rbp; ret 1_2_00007FFE013ACC5D

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeProcess created: "C:\Users\user\Desktop\HxYqlJEUcq.exe"
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\select.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\python313.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\tk86t.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\tcl86t.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\libcrypto-3.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI74202\zlib1.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01324370 IsIconic,IsZoomed,AdjustWindowRectEx,SendMessageW,SendMessageW,GetSystemMetrics,MoveWindow,GetWindowRect,GetClientRect,MoveWindow,GetWindowRect,MoveWindow,DrawMenuBar,1_2_00007FFE01324370
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C76C0 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,0_2_00007FF6110C76C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\select.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\python313.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\libcrypto-3.dllJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI74202\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17227
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeAPI coverage: 4.9 %
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C9280 FindFirstFileExW,FindClose,0_2_00007FF6110C9280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110C83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF6110C83C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C9280 FindFirstFileExW,FindClose,1_2_00007FF6110C9280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110C83C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF6110C83C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110E1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF6110E1874
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF393730 GetModuleHandleW,GetProcAddress,GetVersionExW,GetSystemInfo,memcpy,1_2_00007FFDFF393730
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI74202\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeFile opened: C:\Users\user\Jump to behavior
Source: HxYqlJEUcq.exe, 00000001.00000002.2985533099.0000028979E8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110DA614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6110DA614
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013DA280 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FFE013DA280
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E3480 GetProcessHeap,0_2_00007FF6110E3480
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CD30C SetUnhandledExceptionFilter,0_2_00007FF6110CD30C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110DA614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6110DA614
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CC8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6110CC8A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CD12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6110CD12C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CD30C SetUnhandledExceptionFilter,1_2_00007FF6110CD30C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110DA614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6110DA614
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CC8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF6110CC8A0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FF6110CD12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6110CD12C
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF3A21C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFDFF3A21C0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE01400598 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE01400598
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFE013FFB90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE013FFB90
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeProcess created: C:\Users\user\Desktop\HxYqlJEUcq.exe "C:\Users\user\Desktop\HxYqlJEUcq.exe"Jump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E9570 cpuid 0_2_00007FF6110E9570
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GetLocaleInfoA,GlobalUnlock,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,1_2_00007FFE013087B0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: InitCommonControlsEx,RegisterClassW,GetKeyboardLayout,GetLocaleInfoW,TranslateCharsetInfo,1_2_00007FFE013269B0
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\http1.0 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tkinter.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202\_tcl_data\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI74202 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeQueries volume information: C:\Users\user\Desktop\HxYqlJEUcq.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110CD010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6110CD010
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF393640 GetUserNameW,1_2_00007FFDFF393640
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 0_2_00007FF6110E5C00 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6110E5C00
Source: C:\Users\user\Desktop\HxYqlJEUcq.exeCode function: 1_2_00007FFDFF393730 GetModuleHandleW,GetProcAddress,GetVersionExW,GetSystemInfo,memcpy,1_2_00007FFDFF393730
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Process Injection
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync34
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI74202\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_decimal.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\_tkinter.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\libcrypto-3.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\python313.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\tcl86t.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\tk86t.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\unicodedata.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI74202\zlib1.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.openssl.org/H0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688HxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpfalse
    unknown
    http://tip.tcl.tk/48)HxYqlJEUcq.exe, 00000001.00000002.2985533099.0000028979E8A000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Connectionhttp-2.9.8.tm.0.drfalse
        unknown
        https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_codeHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
          unknown
          http://www.zlib.net/DHxYqlJEUcq.exe, 00000001.00000002.2991769172.00007FFE13227000.00000008.00000001.01000000.00000009.sdmpfalse
            unknown
            https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerHxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_sourceHxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpfalse
                unknown
                https://www.openssl.org/Hlibcrypto-3.dll.0.drfalse
                • URL Reputation: safe
                unknown
                https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_moduleHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
                  unknown
                  https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_specHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
                    unknown
                    https://peps.python.org/pep-0205/HxYqlJEUcq.exe, 00000001.00000003.1802731734.0000028979BB1000.00000004.00000020.00020000.00000000.sdmp, HxYqlJEUcq.exe, 00000001.00000002.2986552991.000002897A104000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalse
                      unknown
                      https://docs.python.org/3/howto/mro.html.HxYqlJEUcq.exe, 00000001.00000002.2986467654.0000028979FF0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalse
                        unknown
                        https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_packageHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
                          unknown
                          https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_cachesHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
                            unknown
                            https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#HxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://www.python.org/psf/license/)HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmpfalse
                                unknown
                                https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyHxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_dataHxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_moduleHxYqlJEUcq.exe, 00000001.00000002.2985014943.0000028979A34000.00000004.00001000.00020000.00000000.sdmpfalse
                                      unknown
                                      https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syHxYqlJEUcq.exe, 00000001.00000002.2985398610.0000028979BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://peps.python.org/pep-0263/HxYqlJEUcq.exe, 00000001.00000002.2989477390.00007FFDFB768000.00000002.00000001.01000000.00000004.sdmpfalse
                                          unknown
                                          https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filenameHxYqlJEUcq.exe, 00000001.00000002.2985014943.00000289799B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                            unknown
                                            No contacted IP infos
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1541052
                                            Start date and time:2024-10-24 11:00:55 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 24s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:6
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:HxYqlJEUcq.exe
                                            (renamed file extension from none to exe, renamed because original name is a hash value)
                                            Original Sample Name:FD43184BBFEB84EDE2569054E8DF15F7A0FD8D00F96652558F020D5E61046563
                                            Detection:SUS
                                            Classification:sus33.winEXE@3/939@0/0
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:Failed
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtCreateFile calls found.
                                            • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                            • VT rate limit hit for: HxYqlJEUcq.exe
                                            No simulations
                                            No context
                                            No context
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\_MEI74202\VCRUNTIME140.dllgrA6aqodO5.exeGet hashmaliciousPython Stealer, CStealerBrowse
                                              cPl7CoJTBx.exeGet hashmaliciousLuna Grabber, Luna LoggerBrowse
                                                R6IuO0fzec.exeGet hashmaliciousPython Stealer, CStealerBrowse
                                                  SecuriteInfo.com.Win64.Malware-gen.11853.10965.exeGet hashmaliciousUnknownBrowse
                                                    SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exeGet hashmaliciousUnknownBrowse
                                                      H2f8SkAvdV.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                                        C:\Users\user\AppData\Local\Temp\_MEI74202\_bz2.pydgrA6aqodO5.exeGet hashmaliciousPython Stealer, CStealerBrowse
                                                          R6IuO0fzec.exeGet hashmaliciousPython Stealer, CStealerBrowse
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):120400
                                                            Entropy (8bit):6.6017475353076716
                                                            Encrypted:false
                                                            SSDEEP:1536:N9TXF5LLXQLlNycKW+D4SdqJk6aN1ACuyxLiyazYaCVoecbdhgOwAd+zfZ1zu:N9jelDoD9uyxLizzFzecbdPwA87S
                                                            MD5:862F820C3251E4CA6FC0AC00E4092239
                                                            SHA1:EF96D84B253041B090C243594F90938E9A487A9A
                                                            SHA-256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
                                                            SHA-512:2F8A0F11BCCC3A8CB99637DEEDA0158240DF0885A230F38BB7F21257C659F05646C6B61E993F87E0877F6BA06B347DDD1FC45D5C44BC4E309EF75ED882B82E4E
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: grA6aqodO5.exe, Detection: malicious, Browse
                                                            • Filename: cPl7CoJTBx.exe, Detection: malicious, Browse
                                                            • Filename: R6IuO0fzec.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Win64.Malware-gen.11853.10965.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe, Detection: malicious, Browse
                                                            • Filename: H2f8SkAvdV.exe, Detection: malicious, Browse
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\=..\...\...\..S$...\...$...\...\..5\...\...\.....\.....\.....\.....\......\.....\..Rich.\..........PE..d.....x.........." ...).$...d............................................................`A........................................0u..4...d}..........................PP...........^..p............................\..@............@...............................text............................... ..`fothk........0...................... ..`.rdata...C...@...D...(..............@..@.data................l..............@....pdata...............p..............@..@_RDATA...............|..............@..@.rsrc................~..............@..@.reloc..............................@..B................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):84240
                                                            Entropy (8bit):6.607563436050078
                                                            Encrypted:false
                                                            SSDEEP:1536:Kdrz7l1EVLsSuvX3dUK4MLgqK7YEog8y5sV8lIJLVy7SyFB:urzcuvXvrEo7y6V8lIJLVyB
                                                            MD5:CB8C06C8FA9E61E4AC5F22EEBF7F1D00
                                                            SHA1:D8E0DFC8127749947B09F17C8848166BAC659F0D
                                                            SHA-256:FC3B481684B926350057E263622A2A5335B149A0498A8D65C4F37E39DD90B640
                                                            SHA-512:E6DA642B7200BFB78F939F7D8148581259BAA9A5EDDA282C621D14BA88083A9B9BD3D17B701E9CDE77AD1133C39BD93FC9D955BB620546BB4FCF45C68F1EC7D6
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: grA6aqodO5.exe, Detection: malicious, Browse
                                                            • Filename: R6IuO0fzec.exe, Detection: malicious, Browse
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e...!m..!m..!m..(.o.+m..1...#m..1..."m..1...%m..1...)m..1...,m..i..."m..j...#m..!m..|m..i...)m..i... m..i... m..i... m..Rich!m..........PE..d.....g.........." ...).....\......0........................................P......7[....`.............................................H...(........0....... .. ......../...@..........T...........................`...@...............x............................text............................... ..`.rdata...=.......>..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):277776
                                                            Entropy (8bit):6.5855511991551
                                                            Encrypted:false
                                                            SSDEEP:6144:x9iD78EIq4x4OA5bZZ0KDgQcI79qWM53pLW1AFR8E4wXw76TPlpV77777VMvyk:xwDGqr5b8EgQ5+w6k
                                                            MD5:F3377F3DE29579140E2BBAEEFD334D4F
                                                            SHA1:B3076C564DBDFD4CA1B7CC76F36448B0088E2341
                                                            SHA-256:B715D1C18E9A9C1531F21C02003B4C6726742D1A2441A1893BC3D79D7BB50E91
                                                            SHA-512:34D9591590BBA20613691A5287EF329E5927A58127CE399088B4D68A178E3AF67159A8FC55B4FCDCB08AE094753B20DEC2AC3F0B3011481E4ED6F37445CECDD5
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j2U..\...\...\..s....\..]...\.._...\..X...\..Y...\...]...\..s]...\...].z.\..._...\...Q...\...\...\.......\...^...\.Rich..\.........................PE..d......g.........." ...).....Z...............................................P......W.....`.................................................L........0..........t+......./...@..........T...............................@............... ............................text.............................. ..`.rdata..\...........................@..@.data...8'......."..................@....pdata..t+.......,..................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):64272
                                                            Entropy (8bit):6.220967684620152
                                                            Encrypted:false
                                                            SSDEEP:768:eNJI0DWiflFwY9X3Th1JnptE462TxNvdbj4dIJvI75YiSyvE62Em:2LDxflFwY9XDhPfVNv+dIJvIF7Syc6c
                                                            MD5:32D76C9ABD65A5D2671AEEDE189BC290
                                                            SHA1:0D4440C9652B92B40BB92C20F3474F14E34F8D62
                                                            SHA-256:838D5C8B7C3212C8429BAF612623ABBBC20A9023EEC41E34E5461B76A285B86C
                                                            SHA-512:49DC391F4E63F4FF7D65D6FD837332745CC114A334FD61A7B6AA6F710B235339964B855422233FAC4510CCB9A6959896EFE880AB24A56261F78B2A0FD5860CD9
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W.A.6...6...6...N%..6.......6.......6.......6.......6.......6...N...6.......6...6..26.......6.......6....I..6.......6..Rich.6..........PE..d......g.........." ...).P...~.......=..............................................!.....`.........................................p...P................................/......X....l..T............................k..@............`...............................text....N.......P.................. ..`.rdata...M...`...N...T..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):157968
                                                            Entropy (8bit):6.854644275249963
                                                            Encrypted:false
                                                            SSDEEP:3072:KbbS4R/G4Z8r7NjwJTSUqCRY4By7znfB9mNowgn0lCelIJ012+j:KbR/8oWeBi5YOwflCe8o
                                                            MD5:1BA022D42024A655CF289544AE461FB8
                                                            SHA1:9772A31083223ECF66751FF3851D2E3303A0764C
                                                            SHA-256:D080EABD015A3569813A220FD4EA74DFF34ED2A8519A10473EB37E22B1118A06
                                                            SHA-512:2B888A2D7467E29968C6BB65AF40D4B5E80722FFDDA760AD74C912F3A2F315D402F3C099FDE82F00F41DE6C9FAAEDB23A643337EB8821E594C567506E3464C62
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7...V.,.V.,.V.,...,.V.,..-.V.,..-.V.,..-.V.,..-.V.,..-.V.,...-.V.,.V.,.V.,..-.V.,..-.V.,..u,.V.,..-.V.,Rich.V.,................PE..d......g.........." ...).`...........1.......................................p.......P....`.............................................L.......x....P.......0.......:.../...`..4....|..T...........................P{..@............p...............................text...^^.......`.................. ..`.rdata.......p.......d..............@..@.data........ ......................@....pdata.......0......................@..@.rsrc........P......................@..@.reloc..4....`.......8..............@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):83728
                                                            Entropy (8bit):6.331814573029388
                                                            Encrypted:false
                                                            SSDEEP:1536:XuV3gvWHQdMq3ORC/OypTXQlyJ+9+nzEYwsBI6tzOKuZIJywJ7Sy21:XuVQvcQTSypTXQlyJs+nzEYJI6QlZIJY
                                                            MD5:FE896371430BD9551717EF12A3E7E818
                                                            SHA1:E2A7716E9CE840E53E8FC79D50A77F40B353C954
                                                            SHA-256:35246B04C6C7001CA448554246445A845CE116814A29B18B617EA38752E4659B
                                                            SHA-512:67ECD9A07DF0A07EDD010F7E3732F3D829F482D67869D6BCE0C9A61C24C0FDC5FF4F4E4780B9211062A6371945121D8883BA2E9E2CF8EB07B628547312DFE4C9
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ll}.ll}.ll}...}.ll}..m|.ll}..o|.ll}..h|.ll}..i|.ll}..m|.ll}.lm}.ll}..m|.ll}..a|.ll}..l|.ll}..}.ll}..n|.ll}Rich.ll}........PE..d.....g.........." ...).x.......... -.......................................`.......s....`.........................................@...P............@.......0.........../...P..........T...........................@...@............................................text....w.......x.................. ..`.rdata.. y.......z...|..............@..@.data...............................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):21493
                                                            Entropy (8bit):4.832479269807694
                                                            Encrypted:false
                                                            SSDEEP:384:UqT9XC9VZvWQ9CTxsCTP7672ORgS0myvxFRTX7Xvt3wBTnFXhCUquyvz:LT9XC9VZvh9CVsCb7JlmyvTxvt3gTnFW
                                                            MD5:8070296BC967F5D0F6B7026009A7EEA1
                                                            SHA1:0A8E85ED9269819A1511A2C1843F8D391A70E87B
                                                            SHA-256:14D904E4EC854ADD991A71ABF263B36110AC2F01A625A70058DEB1606F66EBCA
                                                            SHA-512:619C0970035E4CE0F3660E0CC4EBACFA3E85AFEA10526B1256FE22F68815CFCD8D5B2765FC8C086212D6D1CFC73F447C4595ADFD48C2E52C7E2C852F808358C8
                                                            Malicious:false
                                                            Preview:# auto.tcl --..#..# utility procs formerly in init.tcl dealing with auto execution of commands..# and can be auto loaded themselves...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# auto_reset --..#..# Destroy all cached information for auto-loading and auto-execution, so that..# the information gets recomputed the next time it's needed. Also delete any..# commands that are listed in the auto-load index...#..# Arguments:..# None.....proc auto_reset {} {.. global auto_execs auto_index auto_path.. if {[array exists auto_index]} {...foreach cmdName [array names auto_index] {... set fqcn [namespace which $cmdName]... if {$fqcn eq ""} {....continue... }... rename $fqcn {}...}.. }.. unset -nocomplain auto_execs auto_index ::tcl::auto_oldpath.. if {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):132993
                                                            Entropy (8bit):5.057003894417932
                                                            Encrypted:false
                                                            SSDEEP:3072:Cbn4IdhYvuCi9epsF4AzqpSMpWzP7ejMiIAEBsq6UkPAPaZqHYM8EN4LhVLAMrXl:Cbn4IJ9epsF4SqpSMpWzP7ejM/NBsq6P
                                                            MD5:050C0FE157AB3DB2068E2B85EFA6B7A2
                                                            SHA1:50973A7E60D5AEDFE932332C379996330196499B
                                                            SHA-256:60530E26C7073C4BE5A878542DB5E6796AE0167CF2BB8EB8D16B588B6ABA4AE6
                                                            SHA-512:08EDBDE879164150E9516780AE1455FCE7C64DDFEDC7105C3BB1AE92766F888FA65ED2B7ED53EA09FCEC05B4875138B1F1181365E160213C624B0E644360DD38
                                                            Malicious:false
                                                            Preview:#----------------------------------------------------------------------..#..# clock.tcl --..#..#.This file implements the portions of the [clock] ensemble that are..#.coded in Tcl. Refer to the users' manual to see the description of..#.the [clock] command and its subcommands...#..#..#----------------------------------------------------------------------..#..# Copyright (c) 2004-2007 Kevin B. Kenny..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..#----------------------------------------------------------------------....# We must have message catalogs that support the root locale, and we need..# access to the Registry on Windows systems.....uplevel \#0 {.. package require msgcat 1.6.. if { $::tcl_platform(platform) eq {windows} } {...if { [catch { package require registry 1.1 }] } {... namespace eval ::tcl::clock [list variable NoRegistry {}]...}.. }..}....# Put the library directory in
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):2.1033474959326957
                                                            Encrypted:false
                                                            SSDEEP:12:5c2VBUvEWVrVJ/eyN9j2iV2NdWWT0VbusV7EV7KVAMmVZyd851VFpsGkliX:5HVBUlJvRj7SOVbusZhAMiZyi77qsX
                                                            MD5:9E3A454FA480E9A99D2D5ACDAA775233
                                                            SHA1:493637BB570A5C96BB62F998BD0391FB59AFC5F0
                                                            SHA-256:FB87BF197F4F485B08EA81F7534BC07D9C3A538D022424BE11011A1FE3C413FD
                                                            SHA-512:EDFCB2BB6AB052D28D5CEBD08AD57F36D3A4CB83D557B1359B0ADE1266E24D8F3CE87B8240881396A5BA4FB45F8B74014784E8885CDB86680D98977CC0D130F0
                                                            Malicious:false
                                                            Preview:# Encoding file: ascii, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):94389
                                                            Entropy (8bit):3.3217406555698195
                                                            Encrypted:false
                                                            SSDEEP:768:UAHU3LIkZlmXrd/uQ0ao98zgKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fd:UVduBGf94gFMT6q95GDRBfd
                                                            MD5:41A874778111CC218BD421CF9C795EC2
                                                            SHA1:80857D106F71199CE187833D38DB091A819A520C
                                                            SHA-256:AD1ED201B69855BFD353BF969DFC55576DA35A963ABF1BF7FC6D8B5142A61A61
                                                            SHA-512:4244624124F86A3EFAB4C70B115A46C8ADF02D708860FA5F327CDBFA24BC3F9EFAD0C6EE58DE96B0B6BBC4CF6D99B322BB8657129007C86D6482F41C1503AAD4
                                                            Malicious:false
                                                            Preview:# Encoding file: big5, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):98634
                                                            Entropy (8bit):2.438904802083714
                                                            Encrypted:false
                                                            SSDEEP:768:MPFOsOKqBLPf62X4lgQeLHj6RHUn0TQb8G47Ianrd28gr:MPAsknjX4OQe7aoMMarAFr
                                                            MD5:B6A7C59E6A48D91CC2DBCB2BBA7E4510
                                                            SHA1:16A9338F18202B26981F2028BEA412DD03BB0FF2
                                                            SHA-256:8924545CC92584169138AADB64683C07BBF846A57014C2E668D23B63F43F3610
                                                            SHA-512:3D644CF394A528A8699BE3679F787A4E1DAD657C04B810580A4C520F2C043471640FBE080AC46DFD3924C47A73BEE12A6AC69D291D09EB791AD0D64A73750B43
                                                            Malicious:false
                                                            Preview:# Encoding file: cns11643, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.3578844928761034
                                                            Encrypted:false
                                                            SSDEEP:24:CqHVBUlJvRj7SOVbusZhAMiZyi77q8ujr4z8tjsuVO6ys2K:JMlBVnrAMiwMm8ujr4z8emTys2K
                                                            MD5:9568EDE60D3F917F1671F5A625A801C4
                                                            SHA1:4F5B3308FE7F6845B46779DECF9B395E47AC7396
                                                            SHA-256:E2991A6F7A7A4D8D3C4C97947298FD5BACB3EAA2F898CEE17F5E21A9861B9626
                                                            SHA-512:9C32BE3E25FC2211CE91F7B9AE1F9EBA20071272BE2BBBA63A8B6E3CD6543C4C32CD62C4C4D153C94F5BE212E974A61EEFD70DDC005F1688D09D9D56E8E298A8
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1250, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.358948900439905
                                                            Encrypted:false
                                                            SSDEEP:24:CTHVBUlJvRj7SOVbusZhAMiZyi77qpREwKsF/+++SAJlz9aRme3cJI:wMlBVnrAMiwMmpKwKm/EYnsJI
                                                            MD5:83DAF47FD1F87B7B1E9E086F14C39E5B
                                                            SHA1:77AE330512EBFEF430A02213644BD1CFCE174298
                                                            SHA-256:0AA66DFF8A7AE570FEE83A803F8F5391D9F0C9BD6311796592D9B6E8E36BE6FC
                                                            SHA-512:D7CE2F44EDFE1DA6D3E07E9A41BB08AD42430BAAFADD09FD217F4B524323A01A1F4913B640C552D38AAEBFF75B0D50ED7A813A2A57C4019311158890C0162DF9
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1251, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.292994562910468
                                                            Encrypted:false
                                                            SSDEEP:24:C4HVBUlJvRj7SOVbusZhAMiZyi77qdmV/rcwvGNNlkL+rSMH+tKv:rMlBVnrAMiwMmd2r/okLz0
                                                            MD5:E9117326C06FEE02C478027CB625C7D8
                                                            SHA1:2ED4092D573289925A5B71625CF43CC82B901DAF
                                                            SHA-256:741859CF238C3A63BBB20EC6ED51E46451372BB221CFFF438297D261D0561C2E
                                                            SHA-512:D0A39BC41ADC32F2F20B1A0EBAD33BF48DFA6ED5CC1D8F92700CDD431DB6C794C09D9F08BB5709B394ACF54116C3A1E060E2ABCC6B503E1501F8364D3EEBCD52
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1252, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.422723556981327
                                                            Encrypted:false
                                                            SSDEEP:24:CRHVBUlJvRj7SOVbusZhAMiZyi77qduWn4T5K9QQSqiWeIDDdn:CMlBVnrAMiwMmduWnSKyQSqiWeIVn
                                                            MD5:441B86A0DE77F25C91DF1CD4685F651D
                                                            SHA1:D1E429916BC9423F55EEC8F17941521E9FE9D32B
                                                            SHA-256:5B8D47451F847C1BDE12CACA3739CA29860553C0B6399EE990D51B26F9A69722
                                                            SHA-512:35DF342DDA4E8790C6D53762465DF8B93B49B7B7E211D7A5753078EF559C9C9383EFF7285A90FF5C0020FBB16AF380EE3C8643F4CEB1E41917E72021079D722F
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1253, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.307590929679485
                                                            Encrypted:false
                                                            SSDEEP:24:CWHVBUlJvRj7SOVbusZhAMiZyi77qdjrcFvGNNlkBSMH+tA/b:lMlBVnrAMiwMmdjriokgzAD
                                                            MD5:5FA9162BEC5A4DEA97B5EA2840CFB065
                                                            SHA1:F26858E3D2FB928F39CA87CBB8446AF099570CAD
                                                            SHA-256:31639CA96A4D3602D59BD012540FE179917E0561CB11A0D0B61F1B950EB76911
                                                            SHA-512:3CE7BEABBE1A0CB946149D263D3317A8B791F6D72C49DEC4621E27F50CC359D8FA3EE97C03FF05D44E47DAA59DB87F219386467614B8B3FF8CC21AB3E3BED5E6
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1254, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.3385880810272774
                                                            Encrypted:false
                                                            SSDEEP:24:CfHVBUlJvRj7SOVbusZhAMiZyi77qdIn2hEeGlRhv6Mw6Kcv:MMlBVnrAMiwMmdInSEdhvrj7
                                                            MD5:6DEA4179969D6C81C66C3B0F91B39769
                                                            SHA1:7E2722576BFFABC3258C5EDB2D99FA2468D6A4B0
                                                            SHA-256:47576CAE321C80E69C7F35205639680BF28010111E86E228ED191B084FAC6B91
                                                            SHA-512:91CC626B6454517F06FB3616E9ED623D1A2A4BFE74AFA9885F00F6AEC835D8825A5587091B9D9AB0E5ABDA291FA3FE7CE87E2618E21EB2974D9118AE27B8A2FF
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1255, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.4033510023542655
                                                            Encrypted:false
                                                            SSDEEP:24:C0HVBUlJvRj7SOVbusZhAMiZyi77q30pPE7Lym4cwGm+AMZjyG/JQIG/Y:XMlBVnrAMiwMm30FQLym4ys6Jg/Y
                                                            MD5:D50DFAFEE5C605C5C00A25A9EEE4D4CF
                                                            SHA1:7D51BC17931D3D809716C06E7F07C6011286A144
                                                            SHA-256:29340EA8E5AD3532BF67FA77CC852F055081B1238925CB109908AA72804CCC04
                                                            SHA-512:D0A9B422A1061D6239E442767069B987E33239FCBA9BACE677923888F5F8BD1DCAABC71B83A985A0A86A15DCC44316781665BBFBF24558FCB94FDA6783285BCB
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1256, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.344584404753015
                                                            Encrypted:false
                                                            SSDEEP:24:CNHVBUlJvRj7SOVbusZhAMiZyi77q8uWTfNL4wIBUioGndt:uMlBVnrAMiwMm8uWJDNIt
                                                            MD5:CC3D24543FDD4644BBBD4AAB30CA71BC
                                                            SHA1:8E2658E7F782F005411BCB8423BDFC3C68BDED14
                                                            SHA-256:C15AB85438728BF2C60D72B1A66AF80E8B1CE3CF5EB08BA6421FF1B2F73ACDF4
                                                            SHA-512:5ECABF820098F7D24AB806ADD9CA3E1087C29914FB2DE6BA3DC656234202DE3FDF80A7E9ED433CCB2149FF07184F74884CEB37A1B689E9E0C1402916F3E13AFE
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1257, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.2984943182702593
                                                            Encrypted:false
                                                            SSDEEP:24:CKlHVBUlJvRj7SOVbusZhAMiZyi77qdIQ2jFvGNNykoxWi3/i:xMlBVnrAMiwMmdIQufkoxn3q
                                                            MD5:12BCEAE6B6A5FAE5AE9C42F5998BA485
                                                            SHA1:C9620DA0C763D2C3770386E69EE7E421BD1BA965
                                                            SHA-256:29D93DEE7C01B2264778BC6B75F6EF76EA6AC53E9F4A334D83707229E7F482D2
                                                            SHA-512:714BAF58462FB0E84A32D82C8FC2D63EDF78DF8CCE578391E2521737F94F860B5CCFE41B481E1D09879A6811FCFD8B98A2724DB1D15749BD5293A9B33BCAD071
                                                            Malicious:false
                                                            Preview:# Encoding file: cp1258, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.515546664597914
                                                            Encrypted:false
                                                            SSDEEP:24:CFyHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBIqE18wDyV8mK:wyMlBVnrAMiwMm+VhE1LmK
                                                            MD5:CE6D8A6542DC12D1783084FA4B2B63EA
                                                            SHA1:5039A350C8E3E2C6F353B438B41BD0B6A7AB8069
                                                            SHA-256:E5613C04D3D2EE44CCAD85AE53A37C257674491C540836E5D942BBCC4E4A8DB4
                                                            SHA-512:E8C5CFB747486BBE0E567B6E87B59D5246D749A80C8F64F6669227C7FD849886F98A1F94451922AC099409AC14890F1A8B1E5F25EA584FDB1522ACE3AD0BE6A6
                                                            Malicious:false
                                                            Preview:# Encoding file: cp437, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.6177058818384693
                                                            Encrypted:false
                                                            SSDEEP:24:CjHVBUlJvRj7SOVbusZhAMiZyi77qSKOQFhWehDrq18wDyVKockoiH:WMlBVnrAMiwMmSKOQFhWeh3q1odH
                                                            MD5:8EF3CBCA101F5777846D12D3C96A0A7D
                                                            SHA1:5EC5418B861894E0F18EA15AA4414019815E2EA2
                                                            SHA-256:A0415F14F5D72AD24E9C3A5C91517A0E3D22E1ADBC3505C0C6E918B961F7A07D
                                                            SHA-512:FB14C88E61E5459B4A8706751D88D0A261AC6B4171F72912D87CE78A2BC97A821CCF5B53676FB229C08F9E557BE624F4DC649B722A906B9B7944ED2D5E7F9065
                                                            Malicious:false
                                                            Preview:# Encoding file: cp737, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.451057608106102
                                                            Encrypted:false
                                                            SSDEEP:24:CsOHVBUlJvRj7SOVbusZhAMiZyi77qoo9ecL067J4ZNUPVw3PfA:AMlBVnrAMiwMm59T067KDLPo
                                                            MD5:9656761FA02EA24773EAD3E5C4BDB975
                                                            SHA1:366228F25392708FA799E9CC0830CE9917EF6CA7
                                                            SHA-256:C3C6542E902DEC2C44DDCFD8B5CB7ABF309B0413A7CED1614DC0B20CF7C5E35F
                                                            SHA-512:A6A44B9A2193D75764DC284BE53264E57BFEB2A221FD54B4577DD90752F69A45E6B9D293108A7AB895F347A24FD10AAE84954A043AB1F466F485D707D7412380
                                                            Malicious:false
                                                            Preview:# Encoding file: cp775, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.3718781469586827
                                                            Encrypted:false
                                                            SSDEEP:24:C9HVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBc+myS5LeQDTVwA:EMlBVnrAMiwMm+VeyS5SQn/
                                                            MD5:2169EE726DCC011E6C3505D586C88FC3
                                                            SHA1:094252AD0634787E2D7F0D28A448437054D359C7
                                                            SHA-256:13DF611F429A9B331DA1B34F3C718CCCAF0BD4AB44F71A9C632197987B4D643B
                                                            SHA-512:BC5831EF1C131095A22C76FFCB5C4217081AF796B60455BE2DE2E2689CFE1033F07E8B45449F77E7804A7D52CBCFB916B0B4639828E65B14475BB3367F47C8EE
                                                            Malicious:false
                                                            Preview:# Encoding file: cp850, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.4509005787389877
                                                            Encrypted:false
                                                            SSDEEP:24:CPHVBUlJvRj7SOVbusZhAMiZyi77q7EUsOtycwQIc+922V:mMlBVnrAMiwMmwvOtycwQIc+9R
                                                            MD5:48402B424B5101BDEEB0192BBA96DB7D
                                                            SHA1:C9EB93A37AF70F4134AA9CF05D914A30FB3201DD
                                                            SHA-256:F3A18A8C7934F6586F023477E08D3F9D5EAD9A45E9E58A3F8D018AF9BB13F868
                                                            SHA-512:4EE615605BFF3D94A7FC4FE23D8288F0F20F6792C8C69ECACABAE82F1A334D8417C5DFFC0DA3702E2DB09B7BE1E5FF19C6A0F460C9A5EC84D1856BB9C8061CA5
                                                            Malicious:false
                                                            Preview:# Encoding file: cp852, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.4277025591531864
                                                            Encrypted:false
                                                            SSDEEP:24:CoHVBUlJvRj7SOVbusZhAMiZyi77qLHVWjwk/rMZC032SLnD2JbD:hMlBVnrAMiwMmx8whM03VLDy
                                                            MD5:8B8AA56F83BA750EB73FAE542E76FF1A
                                                            SHA1:2F3C3BA4B854A7D6B0A3D27BC519EE66A042E05A
                                                            SHA-256:E64FD2E639DA6F654D9BFBB2266F9432259A6A55941622F5CDDC3797E382EB0A
                                                            SHA-512:8B4061176663F7AC01B3969D25F680B5870A8EAD864CFAD897F18E75409CE721E6CC367A88EBABAF72E77D4542EE1894F2A6EE47A43FB3D4C650CFA18DFD3D71
                                                            Malicious:false
                                                            Preview:# Encoding file: cp855, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0452040204530403045104010454040404550405045604060457040704580408..04590409045A040A045B040B045C040C045E040E045F040F044E042E044A042A..0430041004310411044604260434041404350415044404240433041300AB00BB..259125922593250225240445042504380418256325512557255D043904192510..25142534252C251C2500253C043A041A255A25542569256625602550256C00A4..043B041B043C041C043D041D043E041E043F2518250C25882584041F044F2580..042F044004200441042104
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.364496856690505
                                                            Encrypted:false
                                                            SSDEEP:24:CaHVBUlJvRj7SOVbusZhAMiZyi77qZpu6uUV5Dw5LeBCVHjzA:jMlBVnrAMiwMmyUVFw5SYdI
                                                            MD5:BA52A031DE1B1A6ED1C41BED8946750C
                                                            SHA1:BD54C0E2F62FD36675892A61FD8B340A56845D20
                                                            SHA-256:B6CD5C6F2B54D89142679D599ED0A5DEE6955A3B3F6B6673E46AFE7A5A303CDC
                                                            SHA-512:5F915AABE39F31CE9337B4B9B0239DF8ADA898D2D9F111DD09D97689DB89CF45B093AC187FC28484CFB213D14B0D8F58C5668D0A59726282D6F52D5D24697816
                                                            Malicious:false
                                                            Preview:# Encoding file: cp857, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C700FC00E900E200E400E000E500E700EA00EB00E800EF00EE013100C400C5..00C900E600C600F400F600F200FB00F9013000D600DC00F800A300D8015E015F..00E100ED00F300FA00F100D1011E011F00BF00AE00AC00BD00BC00A100AB00BB..2591259225932502252400C100C200C000A9256325512557255D00A200A52510..25142534252C251C2500253C00E300C3255A25542569256625602550256C00A4..00BA00AA00CA00CB00C8000000CD00CE00CF2518250C2588258400A600CC2580..00D300DF00D400D200F500
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.506813480871637
                                                            Encrypted:false
                                                            SSDEEP:24:CMHVBUlJvRj7SOVbusZhAMiZyi77qij4Axlt49Y18wDyV8mK:VMlBVnrAMiwMm/g+9Y1LmK
                                                            MD5:C416471B57FB894DC45D30C31B4BD2E2
                                                            SHA1:BA378F8122280992AE51245A06814D8155564220
                                                            SHA-256:804EFA345C5BBBAD2449C318A7A3F5B31F4234712AAD23DC49B3FB5AA33B7A57
                                                            SHA-512:E7CDE706CFE573525C2DE319AD5783AE9D97C4F6D28B14A77A729F281540B0DAFAD4C14879EF76473BFDEBC38499C65CA228470983F2D1BC31938A91A2486522
                                                            Malicious:false
                                                            Preview:# Encoding file: cp860, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.5174672833207183
                                                            Encrypted:false
                                                            SSDEEP:24:ClHVBUlJvRj7SOVbusZhAMiZyi77qZpORVPnA2Gm18wDyV8mK:8MlBVnrAMiwMmiVPAA1LmK
                                                            MD5:4997979FD1692063E2B9AA9870E0BE4C
                                                            SHA1:919012354B99BBEF4C85517E89A2C9CD340FCE49
                                                            SHA-256:4B7E76AEB75289FACA76434EA6E9874E9504AD2BC3D8D47550EADBCC8294857E
                                                            SHA-512:C122A1AE2DE79CB97E5989535B7478A76D905CDE60B01F80F5B84EDB9DF08BE6829E1811AF19608971DA048B8DA24F40DE0217A8054AC612EC2D8B3560500FBE
                                                            Malicious:false
                                                            Preview:# Encoding file: cp861, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C700FC00E900E200E400E000E500E700EA00EB00E800D000F000DE00C400C5..00C900E600C600F400F600FE00FB00DD00FD00D600DC00F800A300D820A70192..00E100ED00F300FA00C100CD00D300DA00BF231000AC00BD00BC00A100AB00BB..259125922593250225242561256225562555256325512557255D255C255B2510..25142534252C251C2500253C255E255F255A25542569256625602550256C2567..2568256425652559255825522553256B256A2518250C25882584258C25902580..03B100DF039303C003A303
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.5573268031592717
                                                            Encrypted:false
                                                            SSDEEP:24:CdMHVBUlJvRj7SOVbusZhAMiZyi77q36AqE18wDyV8mK:iMMlBVnrAMiwMmq3E1LmK
                                                            MD5:9B4D1B95B20BD67555517DCC3007B22A
                                                            SHA1:2C0D6121DB49CDAB6FBAA81398BE2E44BE4E1110
                                                            SHA-256:6C15CB256B1C22170292589C6F589E64E164EB36EC7E84F0BD48149BABB7C5FC
                                                            SHA-512:34C3E401364D579E8AC7A4E1F1F7A29A84C62E1D5146D7664832639EA3997227DC4BAF1B64DC605E6574D680E61B55D0C69C329E35B1BEC41501FC68C5B634B7
                                                            Malicious:false
                                                            Preview:# Encoding file: cp862, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..05D005D105D205D305D405D505D605D705D805D905DA05DB05DC05DD05DE05DF..05E005E105E205E305E405E505E605E705E805E905EA00A200A300A520A70192..00E100ED00F300FA00F100D100AA00BA00BF231000AC00BD00BC00A100AB00BB..259125922593250225242561256225562555256325512557255D255C255B2510..25142534252C251C2500253C255E255F255A25542569256625602550256C2567..2568256425652559255825522553256B256A2518250C25882584258C25902580..03B100DF039303C003A303
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.518080906819747
                                                            Encrypted:false
                                                            SSDEEP:24:CXHVBUlJvRj7SOVbusZhAMiZyi77qwGuXVFq5EC18wDyV8mK:eMlBVnrAMiwMmw3VFu1LmK
                                                            MD5:C93CCDF65F7F349F22855745660F02AE
                                                            SHA1:604888B1FB3C57DF47277CDD1153597BA89E8C36
                                                            SHA-256:232D6FE34D7151920232EAAE9C515F36400AB64136DCC5B802D6245AC6F5D56B
                                                            SHA-512:D5B65AE7353F694A37AF29177BF1A95477918FC5A002C2FE199624BD5B391698807BAECF54225BC40F62B3CA7912C7066A4AAF01B9E3E399133831CAA342BF4F
                                                            Malicious:false
                                                            Preview:# Encoding file: cp863, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.72017408907567
                                                            Encrypted:false
                                                            SSDEEP:24:CwHVBUlJvRj7YOVbusZhAMiZyi77qcHj92OibcDQAyUjSG:5MlrVnrAMiwMmSsNcDQvcSG
                                                            MD5:146E0D1779D50E070E0EF875E8374DF8
                                                            SHA1:B51E5598712598BC387DD79AE80BD879F139140D
                                                            SHA-256:81BEBFD9A61E9F17495763B68D57742FAB2A1A43871015699A2C8E5FDED4EC19
                                                            SHA-512:1F0DAD8E77712C5A018894332BE72FF5C546C92F481421CCB8553AD6F1E9A18617765C8CEE4187265CCCB1AB073E221289D34C9AB1F0501231D52C81FC1C932B
                                                            Malicious:false
                                                            Preview:# Encoding file: cp864, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00200021002200230024066A0026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00B000B72219221A259225002502253C2524252C251C25342510250C25142518..03B2221E03C600B100BD00BC224800AB00BBFEF7FEF8009B009CFEFBFEFC009F..00A000ADFE8200A300A4FE8400000000FE8EFE8FFE95FE99060CFE9DFEA1FEA5..0660066106620663066406650666066706680669FED1061BFEB1FEB5FEB9061F..00A2FE80FE81FE83FE85FECAFE8BFE8DFE91FE93FE97FE9BFE9FFEA3FEA7FEA9..FEABFEADFEAFFEB3FEB7FEBBFEBFFEC1FEC5FECBFECF00A600AC00F700D7FEC9..0640FED3FED7FEDBFEDFFE
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.5193842128126676
                                                            Encrypted:false
                                                            SSDEEP:24:CsKHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBnAFj18wDyV8mK:gMlBVnrAMiwMm+VRAFj1LmK
                                                            MD5:150B2E00B3F84F8075F3653ED7A4C8E0
                                                            SHA1:7131DC656EFE1F2277B19DA72F0EEB46B4EC54A0
                                                            SHA-256:ADA1A52064EE93EBE6F8A5D101D01F8776038E12F21A5CA1C006EE833577C705
                                                            SHA-512:AC56EEB0220826BF8FF6CA52768DB63961AAC46095A2F3EEBA11B5973CC92AF52DFBBE9E85A0DD04CAB8998212FA2599EDD83BAAA7FB2D394E330FF2F7C015DB
                                                            Malicious:false
                                                            Preview:# Encoding file: cp865, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.5038992968715266
                                                            Encrypted:false
                                                            SSDEEP:24:CCHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9aRme3cB18wDyVNZkR:bMlBVnrAMiwMm8YnsB1wZy
                                                            MD5:FC33B5F773E87696A69E8798446E9772
                                                            SHA1:4FC5589C1DD88BB8171758BC173A63B3A5687AE5
                                                            SHA-256:32A45DEBA933C7ED99141535087A4C99BA79802175E3F762ACA6EB941157F85A
                                                            SHA-512:332D2FEC532192F58F792441E61D675A8692C36BECF768D07F64B8C31561CC1A2DF402625A4719E758A9B59DE4228FFE9F94F067E7DC0D82F9DA2D6500E50304
                                                            Malicious:false
                                                            Preview:# Encoding file: cp866, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.5261138894265507
                                                            Encrypted:false
                                                            SSDEEP:24:CtHVBUlJvRj7SOVbusZhAMiZyi77qii+lh2o5+hdVMQFhWgCDrKE:EMlBVnrAMiwMmXY2o5+hdVMQFhWf3f
                                                            MD5:4A2C66AA630D4AE2BF1E7546DCE2DAE5
                                                            SHA1:FABB672957D21CA2B4E0EACA5FCE6093BAACF77A
                                                            SHA-256:AFE6ED6EB5D07C45B6B928A48BC5EF57EFCF61602D36FF9FBDE4A8EA3FA6DF75
                                                            SHA-512:A548002EB7AF8735DBBBCC9883B44B326F261C02A3C7CE65C373755DD92212A66740112EAE0FC556CAD5B86911709C6DF12167DC5B6AD1E01C6F1EB5AB16DB37
                                                            Malicious:false
                                                            Preview:# Encoding file: cp869, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1110
                                                            Entropy (8bit):3.33737382140564
                                                            Encrypted:false
                                                            SSDEEP:24:CSyHVBUlJvRj7SOVbusZhAMiZyi77qVQEHmEU4AyqU+TWwdd:CMlBVnrAMiwMmWr4AyqUSd
                                                            MD5:FC8C876B4738236FC71A1AF96E4566D0
                                                            SHA1:DDFDC3F62D99A6BD705CF0719B50F66449C8808A
                                                            SHA-256:4F05F31CA026BBFEEEE49ED86504CB060784137A9CFAE0E5954D276E837AB5DE
                                                            SHA-512:5BF58A810E029840825FFF3318E90415E6F2B7E46032FD428B4971923D41A64C127A6F438E4894E80EC9604CD34F1D47B4F9A02ABAB3E7D6351611811DC1F2B9
                                                            Malicious:false
                                                            Preview:# Encoding file: cp874, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC008100820083008420260086008700880089008A008B008C008D008E008F..009020182019201C201D20222013201400980099009A009B009C009D009E009F..00A00E010E020E030E040E050E060E070E080E090E0A0E0B0E0C0E0D0E0E0E0F..0E100E110E120E130E140E150E160E170E180E190E1A0E1B0E1C0E1D0E1E0E1F..0E200E210E220E230E240E250E260E270E280E290E2A0E2B0E2C0E2D0E2E0E2F..0E300E310E320E330E340E350E360E370E380E390E3A00000000000000000E3F..0E400E410E420E430E440E
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):49008
                                                            Entropy (8bit):3.5144574650895364
                                                            Encrypted:false
                                                            SSDEEP:768:R/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSY83+JRS:RVUidzJCurDGSYvW
                                                            MD5:EF4508C84A025095B183E6BAD67B1ECD
                                                            SHA1:D12D5381D50D578AA8687671DC542C462A7F490D
                                                            SHA-256:6D1B512110BEAF2CD1296AC878F51D567848AB4A1CED4F18C72806BB136B3D23
                                                            SHA-512:E695E7E6F4A11D5E8D62982E26B69B87DB2F1F3D6B6DCCD5F1DF51879F5C4533265CBD7B785E1F2652D8CA3FC913D4F862E7575F67C636314A6E6956FD96E023
                                                            Malicious:false
                                                            Preview:# Encoding file: cp932, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):134671
                                                            Entropy (8bit):3.5217328918779645
                                                            Encrypted:false
                                                            SSDEEP:1536:+CwDua7D90Jz1aDJmnMfEGniOQdH6prJs3inqlW6/t9Qwf+zCt5:j1WVRpe3rpt9hf+Gt5
                                                            MD5:CF9CFD6329A4FB6C402052B9417DAC3A
                                                            SHA1:75CE13FE1E5898D47B67F951C0C228851F1CC04D
                                                            SHA-256:B6EC2BE0504CA62B9D1B6857F6BAA13FFAC5A567D4432F4EAB98ADC830F5D9C3
                                                            SHA-512:7E19607EEA5342ECFE92D56DAAE82827DE147AE5AFDA8E9D67FD0970F528902CDE20A8A07CF2F341B926E59BB4FF792872976F1C7C5CD351959A71A8B6A1924A
                                                            Malicious:false
                                                            Preview:# Encoding file: cp936, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):132551
                                                            Entropy (8bit):3.100976362851161
                                                            Encrypted:false
                                                            SSDEEP:1536:2UO8ecy5KnSMsDlOmNpkQ4oQHnTApv+ngLbiyEY:2U/etc/sBRZp//r
                                                            MD5:03E19A4DE3490A7DC50D04EC1F558835
                                                            SHA1:9DFECAE08C98109EAA358F5920AED647888F722B
                                                            SHA-256:477F8B79B67F4A22C963EE65B9B387DBD8E4B8F62D800B0A51D2276580C6ADBB
                                                            SHA-512:7D6AD30AF75A3AA6332A860C6ABF87BF725EB6B4AF3B37699043A10EF3235471C63D0ECB4D437D5AD9438DF5DA646EB55117A9BB8B55EF6868F71E49035C18B7
                                                            Malicious:false
                                                            Preview:# Encoding file: cp949, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):93330
                                                            Entropy (8bit):3.319807723045599
                                                            Encrypted:false
                                                            SSDEEP:768:aAHU3LIkZlmXrd/uQ0ao98ggKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fW:aVduBGf9PgFMT6q95GDRBfW
                                                            MD5:1D84B025DAB127F2073947D764D307B6
                                                            SHA1:4E3D3CBD96D084836F1FE6F2AA497E3FAA463B9B
                                                            SHA-256:F80E05533D1A1494C32F9412E9AD2D9C11FAF9AE0668A6F9D1FA5CEEDC6870E2
                                                            SHA-512:188D649F9717F20524AFF47F85C3B23AEC3E7825BF54975285D06C17587D581DC24A3F6A7CAB1703DE7AD5521FE2FE2572DE627A81E6A48049A47BB219ED4AF8
                                                            Malicious:false
                                                            Preview:# Encoding file: cp950, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1113
                                                            Entropy (8bit):3.7780987266961663
                                                            Encrypted:false
                                                            SSDEEP:24:vJMHkUlJvRjmf9RCsUBOdXsCbbNviANpk3m1XFAoE4xSF5HrBPkdn:vKvlA9RCs6CXrViAN51XFA9eSvdPKn
                                                            MD5:90FE0C57BBC6C2D8A3324DEB7FD45F3D
                                                            SHA1:06B95BE43E4C859A0F1B01384EDD26500C6C1F9E
                                                            SHA-256:EB9B262E4D179268E6F017C0D4EF0E7034E31A5B4893595D150640CA1F6A1C45
                                                            SHA-512:6A5E67D9F3EC6046C42793E1437B8A6E50EBD72D8EC67FEFEB6DAD6FAB6A5B5C74F939363587D5A6529E217AF54FB8A9CF0F768E114DD931C57887451CACE56E
                                                            Malicious:false
                                                            Preview:# Encoding file: dingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A327A
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1073
                                                            Entropy (8bit):3.0039861897954805
                                                            Encrypted:false
                                                            SSDEEP:24:XXBcIhJZDgEoQkNCGz0Jyh9lZk3Vmd2QhZLXPiALV3d:dTcNCJEhfZk3Vzox/iqVN
                                                            MD5:F7B3771D43BDE6AFF897683BED2FE6AD
                                                            SHA1:E70C2C0902413536CB6163752D70F3AE4AF6A967
                                                            SHA-256:165BE658AB7D61FFC3DF1E2F1438C2F9FCEE6808A756316302157F44E6D3ACD7
                                                            SHA-512:F87DC718EB2DD95237B144FDA090BB636121B9479E492AC94E4F7EBDD88171F070B9E9F6165BDA7B7E2BA2A3E6188B1108D8F91AA5F142CCCFDAD317628DD941
                                                            Malicious:false
                                                            Preview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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):86971
                                                            Entropy (8bit):2.3925661740847697
                                                            Encrypted:false
                                                            SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                            MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                            SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                            SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                            SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                            Malicious:false
                                                            Preview:# Encoding file: euc-cn, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):83890
                                                            Entropy (8bit):2.350315390677456
                                                            Encrypted:false
                                                            SSDEEP:768:2GhX8nuQ635vlHptHzh0abNQPQA0OMS2HhFV3:2GikvRpMuNQ4P73
                                                            MD5:F2DE0AE66A4E5DD51CC64B08D3709AAB
                                                            SHA1:97558A51A6DD6C56FC7A42A4204141A5639021FD
                                                            SHA-256:A3C916BA16BCAC9FAA5A1CCC62ACA61452D581CD8BA3EE07EC39122C697274C9
                                                            SHA-512:0EAA90100527FF150D2653D7BB57647D69E592BE53B714DDD867114CFCC71E3A76882772F4FAECE040DF09FA8971D1C22DECC497E589B4CA827A6890497A48D9
                                                            Malicious:false
                                                            Preview:# Encoding file: euc-jp, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):95451
                                                            Entropy (8bit):2.4080588863614136
                                                            Encrypted:false
                                                            SSDEEP:768:4/vO7UlClqAd8XfpUqv+mCoKRuLbtMjnIxz0DY:4nO4N9fpv+ngLbiyEY
                                                            MD5:103843B3A57168BD574F6CACC550D439
                                                            SHA1:982652EA2B0DCFBB55970E019A4EDFBFCFAF9C24
                                                            SHA-256:5448643398685456A11CBB93AF2321F70B8659E2FFF3CCC534B4D53BD2F38C89
                                                            SHA-512:27A8DE6F97DB4A96E5D0132692A32A99DAB8A6C98973A0C4E50A219F2D2F364E63D657E5E8478B2706CA33C45C376F55B5BFCC9459E06AEA88BFCD4F0E32525C
                                                            Malicious:false
                                                            Preview:# Encoding file: euc-kr, multi-byte..M..003F 0 90..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..000000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):88033
                                                            Entropy (8bit):2.3790651802316996
                                                            Encrypted:false
                                                            SSDEEP:768:o4Is/C+0IwpRK1CkinIKUyNiNBzxOC4T/:LIsR0/RKckiIgNiDtOxT
                                                            MD5:1A8E55DEA98B6D5EAC731ED233D3AD7C
                                                            SHA1:1335FC0FC2AAE7E7F5EC42AC17A4168368B4A64D
                                                            SHA-256:B4894AEDD2D5B5AE54B6D2840F7C89A88E9308EFD288F179E65936E172EF4B0D
                                                            SHA-512:9DDCE366BA1196EB9FB913ACFDE8516BC9BB8D51894866D2E7E8CB313DC4D6C6D33C5A9E78142E83594DC423D10DA6F8DE211E69844B939198BC7DB9AED808F0
                                                            Malicious:false
                                                            Preview:# Encoding file: gb12345, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.270324851474969
                                                            Encrypted:false
                                                            SSDEEP:24:qrmHVBUlJvRj76OVbusZhAMiZyi77qN8VmKfkiJt0RMFS:qSMlZVnrAMiwMmNPYPFS
                                                            MD5:D06664ACAA478BDEB42B63941109A4E3
                                                            SHA1:4A6196FCC1BDE988C1A23EAA69745A9979F1AEFF
                                                            SHA-256:ACD50951F81566C8D823670F9957B2479102EB5AE4CF558453E1D8436A9E31FF
                                                            SHA-512:CB51A36B851FFDB5C6F9B9D0333EEA6A14CEF3796E0A60530198C16999D64E638047E873333630360299C9126F79CEDDA2D9F169028CED1FC04B1D3C55FFFC5B
                                                            Malicious:false
                                                            Preview:# Encoding file: gb1988, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..002000210022002300A500250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..000000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):85912
                                                            Entropy (8bit):2.3945751552930936
                                                            Encrypted:false
                                                            SSDEEP:768:D47/S+i8vdx3Tz+hpHcBrQqKtrebjMIGCx8jE:0c873T6DHcBrbKtrVlE
                                                            MD5:9357E05C74D6A124825F46A42B280C14
                                                            SHA1:E5106ABE12D991AFE514F41E3B9E239202A4ADFE
                                                            SHA-256:C445E4C9F676AE997D2DDA2BBC107B746F3547D85F39479951C56F46275EE355
                                                            SHA-512:B2187D70A92FB38572BA46F3C3443233BEED1A4ABBFBA1B860F4BBAE6B3D8C16B8C9F52A20DAA12B2B8B40972E52F816860427B743530177E4CF0D8BA34EF381
                                                            Malicious:false
                                                            Preview:# Encoding file: gb2312, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):86971
                                                            Entropy (8bit):2.3925661740847697
                                                            Encrypted:false
                                                            SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                            MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                            SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                            SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                            SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                            Malicious:false
                                                            Preview:# Encoding file: euc-cn, multi-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.949409835601965
                                                            Encrypted:false
                                                            SSDEEP:3:SOd5MNXVSVLqRIBXS4ovLE9sDXMVyXK9ow1Deq9Ts5dRPMSXcRA0kcR4X9cL+TXI:SVNFS0oyisLMsXK9okTw/BDSVKNw
                                                            MD5:D3AC33390D31705FA4486D0B455247DF
                                                            SHA1:2EE8613DC04A6FA84AB38FD5F3A2AA3FE330625B
                                                            SHA-256:98074C85650A420A095ADA9138DA3A8A0AA4027BE47EA1E97A596F319EB084E9
                                                            SHA-512:CB265B753C84968E2D1D6E706906DA9A7BB796D08F626290BCCA8F089771AFD176A9DC912773E8BA390D2AEC08592AD535C7D254E1DF92CF04848601481D4EFE
                                                            Malicious:false
                                                            Preview:# Encoding file: iso2022-jp, escape-driven..E..name..iso2022-jp..init..{}..final..{}..ascii..\x1b(B..jis0201..\x1b(J..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):122
                                                            Entropy (8bit):4.978693690727393
                                                            Encrypted:false
                                                            SSDEEP:3:SOd5MNXVTEXIBXS4ovLE9sDXNvdwUHEQwqc6XWxVUNOov:SVNFSoyisL/Zzc6mYNHv
                                                            MD5:057CB0AA9872AC3910184F67AC6621BC
                                                            SHA1:BBA47F9D76B6690C282724C3423BD94E2C320A04
                                                            SHA-256:234811FC8B0F8FF2B847D9CC3982F1699DF1D21A43C74DCE45BA855D22520007
                                                            SHA-512:019F187D2D16FB51BF627ACB7E67778857E56D4C160E0E5ACA6ABC05EC5FDB624CE2715CB9E0DAD73BFF9D697982BE0D539BC55BCCD368FC7C8EE0FFC04E9F61
                                                            Malicious:false
                                                            Preview:# Encoding file: iso2022-kr, escape-driven..E..name..iso2022-kr..init..\x1b$)C..final..{}..iso8859-1.\x0f..ksc5601..\x0e..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):240
                                                            Entropy (8bit):4.95909788984399
                                                            Encrypted:false
                                                            SSDEEP:6:SVNFUXoyisLNcs9ozc6W4Twk0sRBDSVKN6tWIHRy:oUYcLNcTzczbwRYRy
                                                            MD5:BB186D4BE3FA67DD3E2DEE82DD8BD628
                                                            SHA1:93CE8627038780CFFF8C06E746DD5FB2B041115C
                                                            SHA-256:741B4C842557EED2952936204D0AE9C35FA3A0F02F826D94C50C46976291797C
                                                            SHA-512:4921E7AA3DB8E33609603FE129B97275DFF80CFB06648D2068FA7950246C67B9B530B74827638F69F4DFB8F55CDD4AA952EA72EAEB6ABB527D52F20C6B46FB51
                                                            Malicious:false
                                                            Preview:# Encoding file: iso2022, escape-driven..E..name..iso2022..init..{}..final..{}..iso8859-1.\x1b(B..jis0201..\x1b(J..gb1988..\x1b(T..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..jis0208..\x1b&@\x1b$B..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.236046263464657
                                                            Encrypted:false
                                                            SSDEEP:24:iyHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkL+rSMH+tKv:iyMlBVnrAMiwMmTmokLz0
                                                            MD5:3538A970CD098BF5CE59005FE87B6626
                                                            SHA1:285A96CC40D7CCE104FB4B407C7F0C400AA8F9CB
                                                            SHA-256:A9CB4F4CA111608F882729BC5EB1C2F15530C515EF02DD2CA62F2D8DC5A210CF
                                                            SHA-512:A6A6F2D8B5C22E240D195D168A604887062508FF3340D24E13BFCBD6C2E687347F2CFE724FA2ED12F36915B55EE2CFD901EC3F08E2B0A2FFD3BC2A98BBD12A50
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-1, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF..00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF..00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF..00D000D100D200D300D400D500D600D700D800D900DA00DB00DC00DD00DE00DF..00E000E100E200E300
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.319750415373386
                                                            Encrypted:false
                                                            SSDEEP:24:jHVBUlJvRj7SOVbusZhAMiZyi77qimXG2yM6q7KytC:jMlBVnrAMiwMmTXG2gytC
                                                            MD5:CBDE40170FECD2496A9DA3CF770FAB7B
                                                            SHA1:3E1D74DF6AFEB6CDE8ECBDAC8F81F2F9C64150DE
                                                            SHA-256:48F4A239C25354F0E9F83A39F15D4632BB18A9C33E60C671C67307159917ECED
                                                            SHA-512:A26B56A4CFE29E5A0A0B3A55283A7767397693388E2DEEC342C69B6F718FAE2407EB8D5ADE538FAE6947CBB8B052943C3A52F2D046ABAC7A3DAA86D730DC293F
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-10, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0010401120122012A0128013600A7013B011001600166017D00AD016A014A..00B0010501130123012B0129013700B7013C011101610167017E2015016B014B..010000C100C200C300C400C500C6012E010C00C9011800CB011600CD00CE00CF..00D00145014C00D300D400D500D6016800D8017200DA00DB00DC00DD00DE00DF..010100E100E200E30
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.3206399689840476
                                                            Encrypted:false
                                                            SSDEEP:24:6HVBUlJvRj7SOVbusZhAMiZyi77qimwHmEU4AyqU+TWwdd:6MlBVnrAMiwMmTf4AyqUSd
                                                            MD5:E2A0BCB83BFC3F435CDCFC20D5CF2E0C
                                                            SHA1:CFD18B5B5DB4EE46E63D912B8FD66D513C4C8D39
                                                            SHA-256:21E769C5A66E4D12D6E7DB24022E92AF1EC0D0331FE3C8C605654F239C0F3640
                                                            SHA-512:C86F9180F2F4A177F1EA10E26B0903ABEAFDDE0317C332A48F8D1BB586DAC91C68800E2E4FA2CD739C435419B106CBA4BEFC049F2BCD720E9FC2C0AE8436CFAC
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-11, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.338879965076632
                                                            Encrypted:false
                                                            SSDEEP:24:olHVBUlJvRj7SOVbusZhAMiZyi77qim2w4kBUioGnd2:olMlBVnrAMiwMmT/WNI2
                                                            MD5:21CEBB723D47B1450A7FB21A82470B97
                                                            SHA1:A40FD3AFE1ECE89E3F682D527D281BC563DB3892
                                                            SHA-256:3271D39D7B4DCD841E8E5D5153D1B8837718B88FEFEC73DC37D314816EEFE5E5
                                                            SHA-512:3A0E033A4D93C679215F672C6C4FE425D63E1DE157AA671E7400639165EC3EB498E4EEB030D6FB8FF8BE2FD8C986D341036A8CED9FA094D092CF2822D5DC065B
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-13, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.3670559016263915
                                                            Encrypted:false
                                                            SSDEEP:24:vHVBUlJvRj7SOVbusZhAMiZyi77qimhw6COlk1fKMH+tiH:vMlBVnrAMiwMmT/tlkQz0
                                                            MD5:FDAA88946DE4EB4E6D37F2B6AFCF6CAF
                                                            SHA1:56FC4773941E7457EA04EDA92C883642DE45D100
                                                            SHA-256:F0A5675027FB1CA34B4E4128D24C2968CD275890569A32A86AFA4994CE4983E0
                                                            SHA-512:92658A6FEB42A41B3CFFC377C4A9A3F6780A79FC596D3FEDBA6D3B3D75A9F40E859A2CE8DC579A278BAEEDEEFA2408E2B7853D99D5C2D14AACF63C521FE2BB86
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-14, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.260398494526282
                                                            Encrypted:false
                                                            SSDEEP:24:mHVBUlJvRj7SOVbusZhAMiZyi77qimmRf4kL+rSMH+tKv:mMlBVnrAMiwMmTmCkLz0
                                                            MD5:D779D5E2A0083C616A226B2D82ABF0EB
                                                            SHA1:D1657DB5E2989EBA80BAB98A1E1217CFFFBB19DB
                                                            SHA-256:C74E8E23A0FF0D5DEA7C318CA20DC817DA4E57B0DD61B3361FC0D5098A9316FE
                                                            SHA-512:26E62BE8AE793ED3B725BF0D1BABF4D6ED63A6F3772ABD48955FC4394BDE5A47614D1FF89A21A828676BF1302F3C9361B557B0FBF0DF8561FB7E66542FE94CDC
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-15, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.3065938185320918
                                                            Encrypted:false
                                                            SSDEEP:24:dHVBUlJvRj7SOVbusZhAMiZyi77qim0SmmPkYTtyL:dMlBVnrAMiwMmTttPkYpyL
                                                            MD5:74FDEDDAF670023DA7751FB321E345A0
                                                            SHA1:0677FED67C1333A9A74D50642E5214701A57E2AF
                                                            SHA-256:640D977EC1D22B555C5075798DA009E3523E8F55F29BE22A3050CD1B4EF7B80E
                                                            SHA-512:AC02FD95159A856A9DDEF4E6A8216B958DC07311B553FF39403DC5B77E1AFF2A2C4C03F5F26A2BB7AD5DB6800BEE03E895554556DBBFBE89426286796ADE55AC
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-16, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.340505173539446
                                                            Encrypted:false
                                                            SSDEEP:24:UHVBUlJvRj7SOVbusZhAMiZyi77qim/ssm5VO6ys2K:UMlBVnrAMiwMmT/ssYTys2K
                                                            MD5:9B87850646FFE79F3C8001CBCB5BB3A1
                                                            SHA1:8F97576F3FB3B5DBEF71DC2C9314AB5E530974D6
                                                            SHA-256:76949B03F57041B07F41902BD7505AB3594D79AA8F7BDEED5F0481004B10CBC3
                                                            SHA-512:101A28AF0799E7E0A5723E5DD76D5EF0FEEF584AC479A88F499CB3B7D2AA93767D72F8E51C76F7547F08FF8DD3CBBA7FF444BD07F99A92755526E75C596109EF
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-2, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.2507537230559977
                                                            Encrypted:false
                                                            SSDEEP:24:tHVBUlJvRj7SOVbusZhAMiZyi77qimw2g0kgTJMkFtoD:tMlBVnrAMiwMmTo0kgTJDoD
                                                            MD5:CBD0B9CDCD9BC3D5F2429A760CF98D2F
                                                            SHA1:6DEF0343E0357E0671002A5D2F0BFC2E00C8BCF9
                                                            SHA-256:1F51E7BDA64D466C16FEE9A120BBE3353A10CEB9DAB119FFA326779BA78D8C5D
                                                            SHA-512:88DB6D23B53F4A78133C794ED42FA3F29A4ABAD35DE4B022040FA187AA59B00664CC13F47AFF4507D72F4CB2166F026144213EE760AB0FD67CDD2FA5906F434A
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-3, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0012602D800A300A40000012400A700A80130015E011E013400AD0000017B..00B0012700B200B300B400B5012500B700B80131015F011F013500BD0000017C..00C000C100C2000000C4010A010800C700C800C900CA00CB00CC00CD00CE00CF..000000D100D200D300D4012000D600D7011C00D900DA00DB00DC016C015C00DF..00E000E100E2000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.3413832766873073
                                                            Encrypted:false
                                                            SSDEEP:24:KHVBUlJvRj7SOVbusZhAMiZyi77qimX4AsD/njR7Ky8hA:KMlBVnrAMiwMmTXBs3EyuA
                                                            MD5:8B620EDECAC2DF15A024C2CE15FB64A5
                                                            SHA1:65C5EE5D08964E37393E6A78ABA0DB16D51240E2
                                                            SHA-256:66B3CF994F0B5E0103D13E812958320AFB555C91E3F81B579D4CBF231E6A0805
                                                            SHA-512:93391325405D3AEA0A913F5EA8EA0391920D10F234C26AB1DA70992702889A3AF7B85E11A1FCA554690942B238CE313DD460798E59C5B1F4069036E7B0F24F44
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-4, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.342721205983665
                                                            Encrypted:false
                                                            SSDEEP:24:zHVBUlJvRj7SOVbusZhAMiZyi77qimq5+SAJlz9aRme3cJbx:zMlBVnrAMiwMmTqeYnsJbx
                                                            MD5:6FBEFDC3DEC612B7B2CC903D8C53F45B
                                                            SHA1:14EC3C166DC411149C32C262DBE8E327F6186669
                                                            SHA-256:3130BF26DA0C840C1E02203A90C3B1C38966FB203130E2FBB3DD7CB3865A3539
                                                            SHA-512:F3F15AD8B6C9D9B4C9C994FE3235B4463E59BE7DCE79CF3F7AA77905D6F4DC2C4AABB79B440767DB13D357B13F09EA34983FCA7BC92D0AFA15FB6CBEDDD04E38
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-5, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0040104020403040404050406040704080409040A040B040C00AD040E040F..0410041104120413041404150416041704180419041A041B041C041D041E041F..0420042104220423042404250426042704280429042A042B042C042D042E042F..0430043104320433043404350436043704380439043A043B043C043D043E043F..044004410442044304
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):2.992219341429816
                                                            Encrypted:false
                                                            SSDEEP:24:YHVBUlJvRj7SOVbusZhAMiZyi77qimEZjyG/KE:YMlBVnrAMiwMmTEs6KE
                                                            MD5:52F025D943A45EE840D9C3DFD06E4D79
                                                            SHA1:571EA14B49FA6150BFD2ABA79E52799955D9FA10
                                                            SHA-256:CB71909BF01A3A7A4C7396359DA06D206B58A42AD68192CE37169D6640D46E13
                                                            SHA-512:77FF9DC785A63CA59A7D58BB25C7D2C16F364E525F9B939177385EF80F7DE37734C8774F1BC829CF0270FD66257A4D31689654C8037DB0A86A0291FFDE637B90
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-6, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.393893260854861
                                                            Encrypted:false
                                                            SSDEEP:24:TMyHVBUlJvRj7SOVbusZhAMiZyi77qim2OBHK9QQSqiWeIDDdn:TlMlBVnrAMiwMmT1hKyQSqiWeIVn
                                                            MD5:4BFB0A35D971A9D4C5EA8D8099E93C37
                                                            SHA1:8FED2CBB1343E5B4442748242B5F89A76110592D
                                                            SHA-256:76F6BC85FC9CB89BC3F94D36275AB23C740BA17FD36EC8907479DA3A885415EA
                                                            SHA-512:C9CE1E9EA57A1DEF62BBC60A115C06325C6EE8F92021695459E1ADAF1193A559BC5F0229191BFC2E344296DC137583ED4A9A61A65890F99F4CF97B3864C7AF0F
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-7, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A02018201900A320AC20AF00A600A700A800A9037A00AB00AC00AD00002015..00B000B100B200B303840385038600B703880389038A00BB038C00BD038E038F..0390039103920393039403950396039703980399039A039B039C039D039E039F..03A003A1000003A303A403A503A603A703A803A903AA03AB03AC03AD03AE03AF..03B003B103B203B303
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.0494739426493567
                                                            Encrypted:false
                                                            SSDEEP:24:uHVBUlJvRj7SOVbusZhAMiZyi77qimieGlnvs26Kcv:uMlBVnrAMiwMmTirv87
                                                            MD5:5F69EAF54E7A1E8AC81C9E734DBE90D8
                                                            SHA1:BA509C88A4FC03922EF5CDC887FAA7B594A9BC5A
                                                            SHA-256:865E3665743B5FABA3E1AD6AA55515A666BD05DA6266879D9B66C98905DAFF3C
                                                            SHA-512:D9924FBE59CB571AF721CA602DBE58CAD0D9310610EDF544F8FC0FBF3D1CE4E99597D0198E4E7C802107012786346FE4C1B9C6C3A76D5F60B9A83981B0EDA24D
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-8, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1114
                                                            Entropy (8bit):3.2591070910715714
                                                            Encrypted:false
                                                            SSDEEP:24:XHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkBSMH+tA/b:XMlBVnrAMiwMmTmokgzAD
                                                            MD5:0B99E605E73B7D8DEFD8D643F5729748
                                                            SHA1:F30E7CCBCD9C539126E8D6CA0886E4B2BD54E05D
                                                            SHA-256:CF51E867DDE2F19553D98FEEC45A075C4B4F480FB1EDADB3D8DAD1EBEA9299F3
                                                            SHA-512:DA0487CD7F2143195E80697C17FFDB61AFD464C888DDF84813B2B5D1BAB24D96466DA7A7F77C8E4A9D0D53F34D72928923380AFC1B92A96C0A3BFF46006A4E19
                                                            Malicious:false
                                                            Preview:# Encoding file: iso8859-9, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1112
                                                            Entropy (8bit):3.2708615484795676
                                                            Encrypted:false
                                                            SSDEEP:24:zBHVBUlJvRj7SOVbusZhAMiZyi77qN8VmKfkiJt0RMFS:zBMlBVnrAMiwMmNPYPFS
                                                            MD5:4E21F24F8D9CC5DF16B29CACD997AC69
                                                            SHA1:064E723EFB82EF1C303E5267496304288821E404
                                                            SHA-256:61B14A7C312366F79BB45F02C6B7EE362E6F51CBAD5E479E563C7F7E785DB654
                                                            SHA-512:AF8FAEB47EFB51F2537139F7C4254ABED119E477FD2B5E83B90B7A903B43C4E02DDF43A7DDB044A0A9601E9F9ADE91B02EE7C0EC87FF5DDCF9951B9601A90435
                                                            Malicious:false
                                                            Preview:# Encoding file: jis0201, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..00000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):81772
                                                            Entropy (8bit):2.3571626869060776
                                                            Encrypted:false
                                                            SSDEEP:768:AigXM6CwL/9pV7Hl6+Yko9gZxErA3/MS/8xqg8:AZ/tp1Hl2KZxUfr8
                                                            MD5:F0661E22C7455994AA1F6EC1EDA401B4
                                                            SHA1:928B2AC46A9FDE61A81F56BE225E6138B40C22E5
                                                            SHA-256:F6B1C6AC5F5FC4E990A7A1AAC16A406012040936431BEFE7D2B6CD1DA9E422C4
                                                            SHA-512:917CC58678A9E9F5CBE860D30828846ABA4EA8CDFAB7DD1AE6A66C47ECBB85CF67DD97BC3E6F95341DD30F4E757B2CEA571708D5B4CED18A29F19904C3138AE0
                                                            Malicious:false
                                                            Preview:# Encoding file: jis0208, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):72133
                                                            Entropy (8bit):2.3455261548208055
                                                            Encrypted:false
                                                            SSDEEP:768:9F/D7CH2puD5CdzU3nAkP5dHn7s391fmOarFaVQ:H/D7CHbozU3nAk3H7sXm3FgQ
                                                            MD5:07CE2C135BE17DBAFA558AA5949A53DB
                                                            SHA1:5D9DBEFCCB44E76C1A4E61360C6FCED8DCC8EF4D
                                                            SHA-256:785CFC5F5D9CB06DB8061730AB0016A0F70D0B59F6787D2A3CBB8D5779C99706
                                                            SHA-512:E954D7198D58ACEDEB4C8E5F466107767C3DA43763A5F6CDDFCF567226F9B22B4C2DE27564F28CD125D7F1BA7CB9C6DE6DEC4065EC2676572C793BE458FDDD9D
                                                            Malicious:false
                                                            Preview:# Encoding file: jis0212, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.531149521168141
                                                            Encrypted:false
                                                            SSDEEP:24:KcJ5mHVBUlJvRj7SOVbusZhAMiZyi77qpSzIa9qVRS3YcEchJh3MAxSl:KmmMlBVnrAMiwMmAzIxVgBE6cAxQ
                                                            MD5:96F54CC639ACA8E466FB8058144C9350
                                                            SHA1:0B9530D6080F2BAACABD5AA0D48BFF316FCCEF64
                                                            SHA-256:0E43244BFC4F33FACB844B9E00270A1A4C24DC59B8A9B95104E2D788BB2F59FD
                                                            SHA-512:5B7859325E5E34C9D4558B1198795BB9C6A8EF783EB97193EA80BA76C38AFE9BDD1B526B77401DF5456B7A0E85E942191FFD4B4F2B9F0C8168A7093EE452802E
                                                            Malicious:false
                                                            Preview:# Encoding file: koi8-r, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.5076564572101714
                                                            Encrypted:false
                                                            SSDEEP:24:K+HVBUlJvRj7SOVbusZhAMiZyi77qpSzIaU3dmVRS3YcEchJh3MAxSl:K+MlBVnrAMiwMmAzI/EVgBE6cAxQ
                                                            MD5:4B755EF2288DFC4009759F8935479D68
                                                            SHA1:C3BDF0D9DF316DE8919DAA4329275C5AA81D61B4
                                                            SHA-256:ED04D5B977B8C8944D8760B713FF061292DA5634BCBB67CDFB1C3A6FF5378C81
                                                            SHA-512:3F1E1CC47327054FB9C54157ED10514230F10BFCD4BD9FDAFA02D7B238137DC7442CA2661B0739D8EEA3181E187D3B639A2C8118A0DE272C96000908121B6CFB
                                                            Malicious:false
                                                            Preview:# Encoding file: koi8-u, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):94393
                                                            Entropy (8bit):2.4104200953565513
                                                            Encrypted:false
                                                            SSDEEP:768:XbjO7Uw6uKdosXRxps9a+ut/BmZPwkpT9A0T03o:XfO4ZBRxpV+4wPwKloo
                                                            MD5:366C09E4A4CC10006E593F5B3F3461D7
                                                            SHA1:A0DABFBEEB66E26FB342844EA41772D7A1D19C24
                                                            SHA-256:9B27FE7E7054F36E279993F19E52E18AC03360D117AE80C42B4E984A97C590AA
                                                            SHA-512:670F32D698C7992038E736D3AD40098D8589C0C5A1379E32A0F02A02FAF251B1312CAD131DDADC3F80B23A3821A91689F2E310309028BDDDF227D532EB505A20
                                                            Malicious:false
                                                            Preview:# Encoding file: ksc5601, double-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1116
                                                            Entropy (8bit):3.4295694929963667
                                                            Encrypted:false
                                                            SSDEEP:24:8jHVBUlJvRj7SOVbusZhAMiZyi77qHVPJSf2FcVDu1LEe4qPPMl2J89:8jMlBVnrAMiwMmHEmJ4IMgi9
                                                            MD5:10850BCFB943318284D6191494EBD7D5
                                                            SHA1:237D5DDF7969A422991F17021244D13A2BB0DE92
                                                            SHA-256:81ECA6840B87F2DEF9FCDD171A55C2D71A49386D88401CE927AE57D7DDD7AAAA
                                                            SHA-512:D797781C228B70D2D83DB8ABA08F840CE49846C9473CC89A2E316900D9E08A63142E68AD9ABBB2EF67BF9F1D392772FAB36CCC09632022A1437AE27C11F2284F
                                                            Malicious:false
                                                            Preview:# Encoding file: macCentEuro, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1116
                                                            Entropy (8bit):3.3992482002374516
                                                            Encrypted:false
                                                            SSDEEP:24:8ULyHVBUlJvRj7SOVbusZhAMiZyi77qsTMdKxOZwwL+KR5D/jlJy6QWky:8ULyMlBVnrAMiwMmOsL+KR5DblE85
                                                            MD5:A60FBDE33D13C732095713D1AB6713AB
                                                            SHA1:4B0EB443F2D0E4B8DB7D0435F9311E5F9A625123
                                                            SHA-256:BBE6F5EBB5EAB08C91DF7D524FAF39B03AA8B9F84C67ABA0553A84EC56668CB9
                                                            SHA-512:3EEBA6BA3FCD875AFBD5DF41EDC21E872416A48D03343232904CC99CAF913045DAF7B1A1ACD0949EF794AD7B6C9AE8F93808423FFC4B67718E732B2FF5D9B6D7
                                                            Malicious:false
                                                            Preview:# Encoding file: macCroatian, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8..00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC..202000B000A200A300A7202200B600DF00AE0160212200B400A82260017D00D8..221E00B122642265220600B522022211220F0161222B00AA00BA03A9017E00F8..00BF00A100AC221A01922248010600AB010C202600A000C000C300D501520153..01102014201C201D2018201900F725CAF8FF00A9204420AC2039203A00C600BB..201300B7201A201E
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1116
                                                            Entropy (8bit):3.4178221849964903
                                                            Encrypted:false
                                                            SSDEEP:24:8dHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJY:8dMlBVnrAMiwMm8Y6zUk+UVsJY
                                                            MD5:C390D66441AC61CCF0A685CA5EE0BC1C
                                                            SHA1:FCAE825B54400B9D736EF22A613E359E3F0FA6C2
                                                            SHA-256:76EFE571ADDA7AED467F146CB0BD3A2351F2A720508EA0642C419F5347789CAA
                                                            SHA-512:C891DB15E0F600965885DE6745EDD2A4E3A6A20CA30A9AAE89CBD8C429F8455C4AF7F2FC053FB3D730D8544AB6A6E78E769DB93DAD7B29868B746FA10373F021
                                                            Malicious:false
                                                            Preview:# Encoding file: macCyrillic, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1116
                                                            Entropy (8bit):3.870022681111701
                                                            Encrypted:false
                                                            SSDEEP:24:87JMHkUlJvRjmf9RCsUBOdXsCbbNviANpkDP1XFAoE4xSF5HrBPkdn:87KvlA9RCs6CXrViANUP1XFA9eSvdPKn
                                                            MD5:DCE78527E3A7B7CB1DE9EE5FAF12AFC6
                                                            SHA1:20F4A3F4DB6B3422C04EBB6B21A568E4C173F9C1
                                                            SHA-256:062E31D48DC33160999074E49205E08C3655DFF91C2C87F254522E6EBCE2DD96
                                                            SHA-512:627F5FD2F12B341F2D7EE9032946FE057C4AC74D99687178CEA98B3E150307BB6AA2495B0FA46400760D467E2BF589BE31E998E25CE1D1E8465DA61F22047345
                                                            Malicious:false
                                                            Preview:# Encoding file: macDingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..F8D7F8D8F8D9F8DAF8DBF8DCF8DDF8DEF8DFF8E0F8E1F8E2F8E3F8E4008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A3
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1113
                                                            Entropy (8bit):3.4954458011071323
                                                            Encrypted:false
                                                            SSDEEP:24:8dOHVBUlJvRj7SOVbusZhAMiZyi77qJlbaBMD2aSY5us36Ekp1ysOSU2imR:8kMlBVnrAMiwMm7aKPVusqx1ysOJjmR
                                                            MD5:0CC92F685A4132BE4B030006670D81CE
                                                            SHA1:13B1074A90055E9EA061A6206A9C004DA29967A9
                                                            SHA-256:1AABE561B5C944ABD11C293D4ACAC0F3A4A5A9E84A0342D066F4E3E992348895
                                                            SHA-512:E1AF3D47D681CD68B6063DEC1241631CABE86FE835232FA73D855AC74D0175540D46511282BE7198A67A37970A5D05CDECF55C10424ED9C1413C108F116094D9
                                                            Malicious:false
                                                            Preview:# Encoding file: macGreek, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.3991839018654573
                                                            Encrypted:false
                                                            SSDEEP:24:8KHVBUlJvRj7SOVbusZhAMiZyi77qscqMVmOZmk/LYRldjY/g4JyMWG:8KMlBVnrAMiwMmzqi/LYRlYBEXG
                                                            MD5:747ADBE54D6992467415E322326FA1B9
                                                            SHA1:5E3967B5DDF3A6DBF07E90ED6B9B9C2F3F3F35FE
                                                            SHA-256:6FD08CE6FBA521D51E8058DE5C2DBD6583B80306A8BE7D015361F76314E70A35
                                                            SHA-512:A04B946993985BF1F8FBA3A7A9AD3838F43F8F27F69B1FB1015D9DC8612AAFCE24E30CBC1FCABBDFB359FD487D51F70F18DA0CDA4A87749A2C82309CEB054849
                                                            Malicious:false
                                                            Preview:# Encoding file: macIceland, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8..00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC..00DD00B000A200A300A7202200B600DF00AE00A9212200B400A8226000C600D8..221E00B12264226500A500B522022211220F03C0222B00AA00BA03A900E600F8..00BF00A100AC221A01922248220600AB00BB202600A000C000C300D501520153..20132014201C201D2018201900F725CA00FF0178204420AC00D000F000DE00FE..00FD00B7201A201E2
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):48813
                                                            Entropy (8bit):3.3767502114972077
                                                            Encrypted:false
                                                            SSDEEP:768:K/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSJi:KVUidzJCurDGSk
                                                            MD5:3DCD22325E0194AAD4959C939B1DE24D
                                                            SHA1:ABEF1372FBDA83714CE29E015D9A198D4B37B21C
                                                            SHA-256:47007D9EBF4D34C6CE3599E50AFC7C1CF8129B88994DE2C2A857C09003F9CD2B
                                                            SHA-512:B8ADFD2315EA38E5F7D4DED219759380069AAB539F1B5AAA5626CE32428CBBEB5E8215AD8351E023BCF72FA4DC30AB40CF59D6D45E33B6D1A6B41BEBFD4BD4C2
                                                            Malicious:false
                                                            Preview:# Encoding file: macJapan, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..00A0FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1113
                                                            Entropy (8bit):3.4060725247347516
                                                            Encrypted:false
                                                            SSDEEP:24:8THVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldjBpmg4JyMWG:8TMlBVnrAMiwMmOi/LYRlTsBEXG
                                                            MD5:34691FADC788B85D98F63159640C7DD0
                                                            SHA1:C8B3D084D3E831EFF6ECEF71B2029545F214C3D4
                                                            SHA-256:C83D971D6BC0284EF323C197896E38C57A5FF44784E451EC2997EDA70C0DD85C
                                                            SHA-512:77D5676F9B7AF7FD1D612A1C426889D8F2C0191887E180B78C4AA42202928A1B3078B76BD3C5F5ABB2A5CE1AE913E3CA6EFDE0483D2A2B0EFC173EF25EAE1D67
                                                            Malicious:false
                                                            Preview:# Encoding file: macRoman, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.412326247178521
                                                            Encrypted:false
                                                            SSDEEP:24:8tHVBUlJvRj7SOVbusZhAMiZyi77qsTMVZ5OZwYRldj/T9g4JyMWG:8tMlBVnrAMiwMmOA7YRlFT9BEXG
                                                            MD5:04E25073BFB0019D8381B72F7B433F00
                                                            SHA1:B63B0AD9F10A44B0DDD12A3BDBCDEB2992D6D385
                                                            SHA-256:0B805DAF21D37D702617A8C72C7345F857695108D905FF378791F291CEA150F0
                                                            SHA-512:0514EC054676C15C65B01B02747CDBAD79BC89FD1A24A17797A8729752FB748FEDBE920E7BBFF41A6DA4BA99002E3B8DB674D53E30485DC36F6BF737EAF11702
                                                            Malicious:false
                                                            Preview:# Encoding file: macRomania, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1112
                                                            Entropy (8bit):3.6062142626989004
                                                            Encrypted:false
                                                            SSDEEP:24:88HVBUlJvRj7SOVbusZhAMiZyi77qqJipJwHmEU4AyqU+TpH:88MlBVnrAMiwMmqJ8Jf4AyqUe
                                                            MD5:06DC6BA6E4A75CD7FF2D7A4248912C61
                                                            SHA1:23FB16763A8F11EF48E805E4F453C2F812D48FC4
                                                            SHA-256:A1802A2FEB01B255EC7C17425EEE4525372DF8CE226F4047D149172EB438F913
                                                            SHA-512:41A487EC5C36C17B2746C5DC770882A836E6E75CF6A14C31595EB211022F0476BD3B953497C447F21554769F127C3A56E5B6EF8FB3C20A8AFF8C67E0CC94359D
                                                            Malicious:false
                                                            Preview:# Encoding file: macThai, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.422718883614008
                                                            Encrypted:false
                                                            SSDEEP:24:8QjHVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldD8g4JyS:88MlBVnrAMiwMmOi/LYRlWBES
                                                            MD5:4EA94A0DB35BED2081A2CC9D627A8180
                                                            SHA1:AB2AC3ADA19F3F656780FF876D5B536A8DCE92C6
                                                            SHA-256:AFB66138EBE9B87D8B070FE3B6E7D1A05ED508571E9E5B166C3314069D59B4E4
                                                            SHA-512:7888F560D3728732BE1B7DCE49ECB61F3399CEF11191F4116C891E1D147B2A90ED8FB4A5E7B51904A001C47750BD9EB1B15EA5BA5B4EC5D69CDE7704B69529AD
                                                            Malicious:false
                                                            Preview:# Encoding file: macTurkish, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1115
                                                            Entropy (8bit):3.4157626428238723
                                                            Encrypted:false
                                                            SSDEEP:24:8TzHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJd:8PMlBVnrAMiwMm8Y6zUk+UVsJd
                                                            MD5:A5B48D6F2678579CBE6EA094A4655071
                                                            SHA1:A13A41D530B21CE8443AFD7E811286537C5BA9C7
                                                            SHA-256:F7E11736C9FF30102B31EC72272754110193B347433F4B364921E8F131C92BF0
                                                            SHA-512:612F9D528CE940B5CA9E67CB127013A104655207511F4CF39C8696A127E6A8F4867F5603DCFB78C25A55668C6EE70F2997A8D1626F6F1DD44B19260967F17097
                                                            Malicious:false
                                                            Preview:# Encoding file: macUkraine, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):42552
                                                            Entropy (8bit):3.5565924983274857
                                                            Encrypted:false
                                                            SSDEEP:768:w/RPrUHiJrwWkyY/W2wHiwWnwWOORY+gutSX:wVUid5JCurDGSX
                                                            MD5:EEB45AF9D7104872FE290D1EC18AB169
                                                            SHA1:A80CF4EA46301F0B8B4F0BC306270D7103753871
                                                            SHA-256:4A15ED210126BCDAE32543F60EB1A0677F985F32D49FCE923B9FAE8C5BCF3DA4
                                                            SHA-512:C359042B04441AA50E536B23EEA0C6C7B2C1893DFB9CDB5459D3B46945D3BB50FD7A32A4F4E26A83622E76D3D2BB0DBBC3D1F3FB87AAF40520A243165B82AB34
                                                            Malicious:false
                                                            Preview:# Encoding file: shiftjis, multi-byte..M..003F 0 40..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086008700000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):3.73983895892791
                                                            Encrypted:false
                                                            SSDEEP:24:SdHkUlJvRjvRV7ZQsoRmSds2AsSemxUs+Jw1Viv6ObTXyn:avlJV7ZQsoRmosGSPxU/JOm6wTXyn
                                                            MD5:D59E748D863A5FAEF0CEEC2564E041A3
                                                            SHA1:4FFF3BE37F50C090FFC581F1C7769E20281E90C3
                                                            SHA-256:9660537A7B62996478555C6F57C1962C78FB3972F19370B2E395C44842818A1F
                                                            SHA-512:BF8FD0CF1CC55564C46976F53F441B26819ADBA7AB7BB04FF3FF5A313366FC3049DF29A839CCCB05EDEF4A7ECBB49FFCA62518EDA90AF2D7781874A8435073AE
                                                            Malicious:false
                                                            Preview:# Encoding file: symbol, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1112
                                                            Entropy (8bit):3.0553142874336943
                                                            Encrypted:false
                                                            SSDEEP:24:ZlHVBUlJvRj7SOVbusZhAMiZyi77qsDHmEU4AyqU+TWwdd:PMlBVnrAMiwMmss4AyqUSd
                                                            MD5:467A67DE6809B796B914F5BFF98EF46D
                                                            SHA1:C62418071A6C9CB0DCE3F67E130BFD2FB7AB0B58
                                                            SHA-256:50B62381D6EDD4219F4292BFDC365954491B23360DE7C08033E7218A3D29C970
                                                            SHA-512:BF98305AA7D759A087B9EABDC404714D8DC6B4F1BEED4ED0E1FFE646641E1AECA307673D64CF95FD09546D977B3409D6C04F56DCCA1D6332B0D9B6DD460B77A9
                                                            Malicious:false
                                                            Preview:# Encoding file: tis-620, single-byte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
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8243
                                                            Entropy (8bit):4.856326023245708
                                                            Encrypted:false
                                                            SSDEEP:192:Hf8PxPu7qUHBpqyzmY5rEk/fvs+AokFlTGHts1Z/tsEGZPBtsLIVn++G:H6Pu71LJTtylikOzz+L
                                                            MD5:CB5ED49B3ED4E982E24B2D087DA9F8F6
                                                            SHA1:DE113C96FBA7888B890B42AB0036F6771C08953A
                                                            SHA-256:7EF1C11F6A5A9246C8A62917FFF90EEAA2D5F29CCDAAE9734E46B8385465012D
                                                            SHA-512:0683A4339827D47A4E0544D88733CD8D48EADE7BFBFDFF58FFFDDAB83017569E6D203B058AC23D9DE2A0EADAA24C0A11C7B1823CADF153BCFA6339B9D1E77D13
                                                            Malicious:false
                                                            Preview:# history.tcl --..#..# Implementation of the history command...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#.....# The tcl::history array holds the history list and some additional..# bookkeeping variables...#..# nextid.the index used for the next history list item...# keep..the max size of the history list..# oldest.the index of the oldest item in the history.....namespace eval ::tcl {.. variable history.. if {![info exists history]} {...array set history {... nextid.0... keep.20... oldest.-20...}.. }.... namespace ensemble create -command ::tcl::history -map {...add.::tcl::HistAdd...change.::tcl::HistChange...clear.::tcl::HistClear...event.::tcl::HistEvent...info.::tcl::HistInfo...keep.::tcl::HistKeep...nextid.::tcl::HistNextID...redo.::tcl::HistRedo.. }..}.....# history --..#..#.This is the main history command. See the
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10066
                                                            Entropy (8bit):4.806771544139381
                                                            Encrypted:false
                                                            SSDEEP:192:kipkqA3KsZMAikGJ4kIWPa95KTBoF7dg/8YNkgQ4id:TkqWKsZ8kGJ4kIWPaDFzTd
                                                            MD5:C2092F8CA2D761DFA8C461076D956374
                                                            SHA1:90B4648B3BC81C30465B0BE83A5DB4127A1392FB
                                                            SHA-256:8C474095A3ABA7DF5B488F3D35240D6DE729E57153980C2A898728B8C407A727
                                                            SHA-512:09CE408886E2CEADDF70786A15D63AF9A930E70CAC4286AC9DDD2094C8EDCF97A2ADC2D3D2659B123F88719340D3B00D9F96E9BC7C8B55192735C290E7D24683
                                                            Malicious:false
                                                            Preview:# http.tcl..# Client-side HTTP for GET, POST, and HEAD commands...# These routines can be used in untrusted code that uses the Safesock..# security policy...# These procedures use a callback interface to avoid using vwait,..# which is not defined in the safe base...#..# See the http.n man page for documentation....package provide http 1.0....array set http {.. -accept */*.. -proxyhost {}.. -proxyport {}.. -useragent {Tcl http client package 1.0}.. -proxyfilter httpProxyRequired..}..proc http_config {args} {.. global http.. set options [lsort [array names http -*]].. set usage [join $options ", "].. if {[llength $args] == 0} {...set result {}...foreach name $options {... lappend result $name $http($name)...}...return $result.. }.. regsub -all -- - $options {} options.. set pat ^-([join $options |])$.. if {[llength $args] == 1} {...set flag [lindex $args 0]...if {[regexp -- $pat $flag]} {... return $http($flag)...} else {... return -code er
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):746
                                                            Entropy (8bit):4.711041943572035
                                                            Encrypted:false
                                                            SSDEEP:12:jHx5XRsLzhjJS42wbGlTULuUAZb3KykszLl7+HkuRz20JSv6C3l5kMn:bHRsRJS42wbGlTUcZ+yk2Lli1z2jxXkM
                                                            MD5:A387908E2FE9D84704C2E47A7F6E9BC5
                                                            SHA1:F3C08B3540033A54A59CB3B207E351303C9E29C6
                                                            SHA-256:77265723959C092897C2449C5B7768CA72D0EFCD8C505BDDBB7A84F6AA401339
                                                            SHA-512:7AC804D23E72E40E7B5532332B4A8D8446C6447BB79B4FE32402B13836079D348998EA0659802AB0065896D4F3C06F5866C6B0D90BF448F53E803D8C243BBC63
                                                            Malicious:false
                                                            Preview:# Tcl package index file, version 1.0..# This file is generated by the "pkg_mkIndex" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....package ifneeded http 1.0 [list tclPkgSetup $dir http 1.0 {{http.tcl source {httpCopyDone httpCopyStart httpEof httpEvent httpFinish httpMapReply httpProxyRequired http_code http_config http_data http_formatQuery http_get http_reset http_size http_status http_wait}}}]..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):25653
                                                            Entropy (8bit):4.885073965331145
                                                            Encrypted:false
                                                            SSDEEP:768:BXugPHudKlE7BG6Xg3Qomm6ofRRECLSQDjr5vkhzx/i:ogGdKlK4aomm6offLzehNi
                                                            MD5:06CFF726F594EDDC36F5152824139625
                                                            SHA1:B102300C147B1D664F87ECF29343FDCD18B66BC5
                                                            SHA-256:798732AEE4E838670B9A4E37E3D6C4884019A1B101F9AB26344DD2E9BD179872
                                                            SHA-512:BE272DE405740C5A0CCD09732DFBBFC5982506BCE3A6FD1CC4FB37BE1D9C787674F41265F8C1F6D8998F2B52CD09BF5EE10103446B9A6EF76A8A1D538B3C39BA
                                                            Malicious:false
                                                            Preview:# init.tcl --..#..# Default system startup file for Tcl-based applications. Defines..# "unknown" procedure and auto-load facilities...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2004 Kevin B. Kenny. All rights reserved...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# This test intentionally written in pre-7.5 Tcl..if {[info commands package] == ""} {.. error "version mismatch: library\nscripts expect Tcl version 7.5b1 or later but the loaded version is\nonly [info patchlevel]"..}..package require -exact Tcl 8.6.14....# Compute the auto path to use in this interpreter...# The values on the path come from several locations:..#..# The environment variable TCLLIBPATH..#..# tcl_library, which is the directory containing this init.tcl script...# [t
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1038
                                                            Entropy (8bit):4.10054496357204
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383Hcm0hH9BncmtR7tK9dUVxMmALfpKIdzVJLd3xfjTuLM+vzkHWZ6tH9H0:4aR838HH9ekCkMmEfpK2xx2jiWZ0VbY
                                                            MD5:DA8BA1C3041998F5644382A329C3C867
                                                            SHA1:CA0BD787A51AD9EDC02EDD679EEEEB3A2932E189
                                                            SHA-256:A1EACA556BC0CFBD219376287C72D9DBBFAB76ECF9BF204FD02D40D341BAF7DA
                                                            SHA-512:4F086396405FDFE7FBDA7614D143DE9DB41F75BDBD3DB18B1EE9517C3DCCED238DD240B4B64829FD04E50F602DBF371D42A321D04C4C48E4B8B2A067CA1BAF2E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Ma"\.. "Di"\.. "Wo"\.. "Do"\.. "Vr"\.. "Sa"].. ::msgcat::mcset af DAYS_OF_WEEK_FULL [list \.. "Sondag"\.. "Maandag"\.. "Dinsdag"\.. "Woensdag"\.. "Donderdag"\.. "Vrydag"\.. "Saterdag"].. ::msgcat::mcset af MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset af MONTHS_FULL [list \.. "Januarie"\.. "Februarie"\.. "Maart"\.. "April"\.. "Mei"\.. "Junie"\.. "Julie"\.. "Augustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""].. ::msgcat::mcset af AM "VM
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.925537696653838
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xouFygMouFqF3v6ay/5ouFy9+3vR6HyFvn:4EnLB383RAgeYF3v6ay/RAI3voSVn
                                                            MD5:1B9DCD1C6FCDDC95AE820EA8DA5E15B8
                                                            SHA1:E8160353FD415BAB9FD5ACCA14E087C5E6AE836E
                                                            SHA-256:1548988458BBF0DFCCC23B7487CEC0E9C64E4CC8E045723E50BEC37C454A8C81
                                                            SHA-512:532AF060B95AED5E381B161BE56BC88D91A8F3DF2ACFD835491991F99FE752ADB4A3F93AB6D4E68F7042C28A3C1DD87A6312DFD9FFFAFD6ECE3F1B76837C5B7F
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af_ZA DATE_FORMAT "%d %B %Y".. ::msgcat::mcset af_ZA TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset af_ZA DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2018
                                                            Entropy (8bit):4.477377447232708
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83gr/fsS/Sm8p4M/n1KsPktE30AiJcAxi9CEzdEvSCHvMSV:43UkiSm8p3nX0EzdCSCPV
                                                            MD5:D264D01B46D96455715114CAEDF9F05E
                                                            SHA1:A3F68A4C6E69433BD53E52B73041575F3B3AC3F2
                                                            SHA-256:B69D0061A728D59F89FF8621312789CD9F540BF2E2ED297804D22F6278561D85
                                                            SHA-512:A4163DAA6821B293EADD5D499E0641A8B7C93180C710D6B364AE8681A8FF6F35EC948C8DDBE960A8466AF1ACABC15B0D465A08B084617E8005D708459F7E74D3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar DAYS_OF_WEEK_ABBREV [list \.. "\u062d"\.. "\u0646"\.. "\u062b"\.. "\u0631"\.. "\u062e"\.. "\u062c"\.. "\u0633"].. ::msgcat::mcset ar DAYS_OF_WEEK_FULL [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar MONTHS_ABBREV [list \.. "\u064a\u0646\u0627"\.. "\u0641\u0628\u0631"\.. "\u0645\u0627\u0631"\.. "\u0623\u0628\u0631"\.. "\u0645\u0627\u064a"\.. "\u064a\u0648\u0646"\.. "\u064a\u0648\u0644"\.. "\u0623\u063a\u0633"\.. "\u0633\u0628\u062a"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):265
                                                            Entropy (8bit):4.872222510420193
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoKNvfcoKU3v6xyFjoKNo+3vfXM68vn:4EnLB3831vfD3v6g9F3vfc6+n
                                                            MD5:430498B4AB1E77C86BC1311A49747581
                                                            SHA1:684EAD965D9010C2A6E73DCACB2224FDE585F9FF
                                                            SHA-256:2E04B96DA002519D28125918A22FF2BB9659A668A7BCAD34D85DDDECEC8DC0B4
                                                            SHA-512:9F85A88A383DCFC54DAA6253D94C307A14B1CC91D5C97AF817B8122AF98025AB2430D0B2D656EBED09E78FB854D1F9CF99F3B791A6ECB7834112012739140126
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_IN DATE_FORMAT "%A %d %B %Y".. ::msgcat::mcset ar_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ar_IN DATE_TIME_FORMAT "%A %d %B %Y %I:%M:%S %z %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1851
                                                            Entropy (8bit):4.08645484776227
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83sxS/Sm819+es/Ii/R91bpH0+U0c+es/Ii/R91bpH0+UO:43wiSm815MbJbHgMbJbp
                                                            MD5:5C62D606F4F14BC8994B28F9622D70DD
                                                            SHA1:E99F8CC5D330085545B05B69213E9D011D436990
                                                            SHA-256:5ADBB3D37C3369E5FC80D6A462C82598D5A22FAEF0E8DF6B3148231D2C6A7F73
                                                            SHA-512:81AC9200459B0896E27A028BD089A174F7F921B0367BC8FF1AB33D3E561417B6F8EC23DAB750ECB408AC8A11CDFDBFA4F890F9E723BB8607B017C9FEE00928A0
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_JO DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_JO MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1851
                                                            Entropy (8bit):4.083347689510237
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83LxS/Sm8S9+es/Ii/R91bpH0+U/c+es/Ii/R91bpH0+UO:431iSm8S5MbJbQgMbJbp
                                                            MD5:6FC1CC738207E2F8E0871103841BC0D4
                                                            SHA1:D2C62C7F6DA1EF399FCBE2BA91C9562C87E6152F
                                                            SHA-256:1FC13070CF661488E90FECE84274C46B1F4CC7E1565EAB8F829CCAA65108DFCA
                                                            SHA-512:E547D5CBB746654051AFDA21942075BC2224C2FF75D440C6C34C642AD24CF622E520FF919B8BD4AFC0116D9CE69B3ABA4E81EE247C1388F3C5741150201F5C60
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_LB DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_LB MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1851
                                                            Entropy (8bit):4.084701680556524
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83lxS/Sm8M9+es/Ii/R91bpH0+UBc+es/Iv/I91bpH0+UO:43LiSm8M5MbJbSgMo0bp
                                                            MD5:8188C37CA44FEFFF8D895AAD503AD4F6
                                                            SHA1:C48F2E3B9FC055704D2DAFDC67E9D08EE6897D45
                                                            SHA-256:294F3E46C55453EDAD44567E1330F9B43E69A07FA0655B24DD2780A4490C1194
                                                            SHA-512:F86FCFC7C460473D46C472041AB2E1F9388CF34BCA9050295D1DAE454E35A2A0320D0C61D5E8CBB832AF74FFDD1A7511AF32EA2A53B481F39A1CBCF5F086D514
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_SY DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_SY MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2157
                                                            Entropy (8bit):4.27810535662921
                                                            Encrypted:false
                                                            SSDEEP:48:43PI8IKQGQ8mA/XxQJxQnA9QJlPyI/tbCaQICMIcQ8InVI5tNIzQFIQQLtChjsI4:2PItK5BSb9ajfycCW5IzdQNxK
                                                            MD5:6334BDDFC1E0EAE4DBB2C90F85818FD8
                                                            SHA1:085EDC3D027D6B5A6A6A2561717EA89C8F8B8B39
                                                            SHA-256:A636A82C7D00CCDC0AF2496043FFA320F17B0D48A1232708810D3BB1453E881E
                                                            SHA-512:18ADB77314FCFD534E55B234B3A53A0BC572AB60B80D099D2F3B20E0C5FE66179FDC076AA43200DB3CA123BC6216989EC41448FA624D3BA9633413AD8AD6034C
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset be DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0430\u0442"\.. "\u0441\u0440"\.. "\u0447\u0446"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset be DAYS_OF_WEEK_FULL [list \.. "\u043d\u044f\u0434\u0437\u0435\u043b\u044f"\.. "\u043f\u0430\u043d\u044f\u0434\u0437\u0435\u043b\u0430\u043a"\.. "\u0430\u045e\u0442\u043e\u0440\u0430\u043a"\.. "\u0441\u0435\u0440\u0430\u0434\u0430"\.. "\u0447\u0430\u0446\u0432\u0435\u0440"\.. "\u043f\u044f\u0442\u043d\u0456\u0446\u0430"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset be MONTHS_ABBREV [list \.. "\u0441\u0442\u0434"\.. "\u043b\u044e\u0442"\.. "\u0441\u043a\u0432"\.. "\u043a\u0440\u0441"\.. "\u043c\u0430\u0439"\.. "\u0447\u0440\u0432"\.. "\u043b\u043f\u043d"
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1871
                                                            Entropy (8bit):4.4251657008559935
                                                            Encrypted:false
                                                            SSDEEP:48:43EUAIlnQf/QVdQ81mnEZqEavWQEQ3QvQrQL0QjQTtQDCQSY4tqP:27xMk+nEZqE3biIYbUi+C9y
                                                            MD5:E5225D6478C60E2502D18698BB917677
                                                            SHA1:52D611CB5351FB873D2535246B3A3C1A37094023
                                                            SHA-256:CFE4E44A3A751F113847667EC9EA741E762BBDE0D4284822CB337DF0F92C1ACA
                                                            SHA-512:59AB167177101088057BF4EE0F70262987A2177ECB72C613CCAAE2F3E8D8B77F07D15DA5BE3B8728E23C31A1C9736030AA4036A8CD00A24791751A298B3A88B3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bg DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0434"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset bg DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u043b\u044f"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0412\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0421\u0440\u044f\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u044a\u0440\u0442\u044a\u043a"\.. "\u041f\u0435\u0442\u044a\u043a"\.. "\u0421\u044a\u0431\u043e\u0442\u0430"].. ::msgcat::mcset bg MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset bg MO
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2335
                                                            Entropy (8bit):4.107102006297273
                                                            Encrypted:false
                                                            SSDEEP:24:4aR835e/MWrD//6HFEVcVVcCVcTUTVckVEVcT7VcEEVcby/Vcn0VcMr/0VcM8VcQ:43ktX++QalMObalMZ6IE6V
                                                            MD5:5D25E7FC65824AC987535FEA14A4045C
                                                            SHA1:85C10F05823CD3263FC7B3EC38796BEC261B3716
                                                            SHA-256:890EA6521DEB1B3C3913CCD92562F6360E064DAEE2E2B0356A6DD97A46264A1F
                                                            SHA-512:5D8A88ACAEBBF3CD721F288FA0F1FEE517EE568CA5482E30CFA1E36CD37DF011C449090E2D9041F1D046A191F13D4C5C4B6F9E2F16FD259E63CE46ECC4E4F81F
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn DAYS_OF_WEEK_ABBREV [list \.. "\u09b0\u09ac\u09bf"\.. "\u09b8\u09cb\u09ae"\.. "\u09ae\u0999\u0997\u09b2"\.. "\u09ac\u09c1\u09a7"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf"\.. "\u09b6\u09c1\u0995\u09cd\u09b0"\.. "\u09b6\u09a8\u09bf"].. ::msgcat::mcset bn DAYS_OF_WEEK_FULL [list \.. "\u09b0\u09ac\u09bf\u09ac\u09be\u09b0"\.. "\u09b8\u09cb\u09ae\u09ac\u09be\u09b0"\.. "\u09ae\u0999\u0997\u09b2\u09ac\u09be\u09b0"\.. "\u09ac\u09c1\u09a7\u09ac\u09be\u09b0"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf\u09ac\u09be\u09b0"\.. "\u09b6\u09c1\u0995\u09cd\u09b0\u09ac\u09be\u09b0"\.. "\u09b6\u09a8\u09bf\u09ac\u09be\u09b0"].. ::msgcat::mcset bn MONTHS_ABBREV [list \.. "\u099c\u09be\u09a8\u09c1\u09df\u09be\u09b0\u09c0"\.. "\u09ab\u09c7\u09ac\u09cd\u09b0\u09c1\u09df\u09be
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):265
                                                            Entropy (8bit):4.868201122972066
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xovtvfluo/E3v6xyFjovto+3vflm68vn:4EnLB383UtvfltE3v6g8tF3vflm6+n
                                                            MD5:B91BB2ABC23B90962D2070B9588F2AB5
                                                            SHA1:CBB4E9CD600773792C6E9F3E6B27E99C1846B44F
                                                            SHA-256:B3D8A4632290B0F3DA690E47C1FDF06A8B9E171A96E938AFDB0DD52CF806CE54
                                                            SHA-512:932FC4B8C3CA72731187D56012AD7DD7777C4D447F16EEB17B9D68235C9590DF99992FD22B8D7C85A843A610F93CD36FAFA993C34C441255A1C0A93C73BC5FE4
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn_IN DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset bn_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset bn_IN DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1152
                                                            Entropy (8bit):4.2880653012847985
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83FMVBNfPg+g+RjMu5+C6MB4zdiwvWvn:432g6jh65zd3gn
                                                            MD5:72DDD60C907DD235BCE4AB0A5AEE902C
                                                            SHA1:06150F793251687E6FBC3FDA3BC81BCBFC7DE763
                                                            SHA-256:3BE295DCC8FCDC767FED0C68E3867359C18E7E57D7DB6C07236B5BC572AD328E
                                                            SHA-512:3B0A85003692F1E46185D5CC09236D2DA5E6D29166C9812D07A7D6BF6AC6C3B0708F91C6899768D4DBA3528081B8B43E09F49622B70F1CF991AFAC5352B6BA37
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ca DAYS_OF_WEEK_ABBREV [list \.. "dg."\.. "dl."\.. "dt."\.. "dc."\.. "dj."\.. "dv."\.. "ds."].. ::msgcat::mcset ca DAYS_OF_WEEK_FULL [list \.. "diumenge"\.. "dilluns"\.. "dimarts"\.. "dimecres"\.. "dijous"\.. "divendres"\.. "dissabte"].. ::msgcat::mcset ca MONTHS_ABBREV [list \.. "gen."\.. "feb."\.. "mar\u00e7"\.. "abr."\.. "maig"\.. "juny"\.. "jul."\.. "ag."\.. "set."\.. "oct."\.. "nov."\.. "des."\.. ""].. ::msgcat::mcset ca MONTHS_FULL [list \.. "gener"\.. "febrer"\.. "mar\u00e7"\.. "abril"\.. "maig"\.. "juny"\.. "juliol"\.. "agost"\.. "setembre"\.. "octubre"\.. "novembre"\.. "desembre"\.. ""].. ::msg
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1354
                                                            Entropy (8bit):4.466447248030554
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83U4nZ4yJTkkG3mYWEZqO1R3DNBEVG+PYhxrU4UF3ecCvt7/v3e6:43TJTGmnEZqE5/EVEDOGtDp
                                                            MD5:F32EAD82CC26754C5A8E092873A28DB3
                                                            SHA1:325124660F62242B24623B4B737CB4616F86CFF3
                                                            SHA-256:AFEA12A16A6FA750EA610245133B90F178BA714848F89AEC37429A3E7B06BE1A
                                                            SHA-512:04E335AAFBF4D169983635FC87BCFFE86FBA570A3E1820D20240EF7B47E7A3CD94AE3598543DCE92A1F82B5146CAAD982EFE9490EFD9E581D58515CFC3930581
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset cs DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "\u00dat"\.. "St"\.. "\u010ct"\.. "P\u00e1"\.. "So"].. ::msgcat::mcset cs DAYS_OF_WEEK_FULL [list \.. "Ned\u011ble"\.. "Pond\u011bl\u00ed"\.. "\u00dater\u00fd"\.. "St\u0159eda"\.. "\u010ctvrtek"\.. "P\u00e1tek"\.. "Sobota"].. ::msgcat::mcset cs MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset cs MONTHS_FULL [list \.. "leden"\.. "\u00fanor"\.. "b\u0159ezen"\.. "duben"\.. "kv\u011bten"\.. "\u010derven"\.. "\u010dervenec"\.. "srpen"\.. "z\u00e1\u0159\u00ed"\.. "\u0159\u00edjen"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1208
                                                            Entropy (8bit):4.315504392809956
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83wV0tBVYuorIsmZ5meAxyISjTHU92WFVwpwvbvT:43w+DiuorreAY0zw8rT
                                                            MD5:27A6A8BE8903AEF9D0BE956906A89583
                                                            SHA1:EE29FDF67CB3AE150DF6BBBE603C1C3F5DA28641
                                                            SHA-256:0D422A991BCA13FE9033118691CFEDAB0F372222EBB0BC92BAF8E914EE816B84
                                                            SHA-512:0E702A679AD94BF479226B7DE32077562F3F95210F6453AE564138386DBB179941BA5359AEE9AC532F4A6E5BE745D6962D6B638A21DD48B865716F2FD2A0CB01
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset da DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset da DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset da MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset da MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marts"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset da B
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1276
                                                            Entropy (8bit):4.349293509679722
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83cFNSsZKKgXum47fpK2OaSIui7dHqWZ0ZIBFJWJvvvWIn:43InZKKgXoOqx1W67W9XWIn
                                                            MD5:EE3963A5F7E29C05C9617BE3FD897114
                                                            SHA1:0F978CA174DF596817F872B5EF1B447B9DFE651C
                                                            SHA-256:4C27733502066E8391654D1D372F92BF0484C5A3821E121AE8AA5B99378C99AE
                                                            SHA-512:EA933709C68F8199858A1CC1FFDA67EE7458CC57A163E672535EB0B4C37BFDC200604C7506748DAC3158B6CA63C2F076A2C6252B2A596E59F83D3B1D4BC9C901
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Mo"\.. "Di"\.. "Mi"\.. "Do"\.. "Fr"\.. "Sa"].. ::msgcat::mcset de DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mrz"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de BCE "v.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):847
                                                            Entropy (8bit):4.412930056658995
                                                            Encrypted:false
                                                            SSDEEP:24:4aR831sMm47fpK2++SIui7dHqWZ0ZItovGvzvW:431h+mx1Wm+QjW
                                                            MD5:A6227CD4F7434952D093F1F3C64B4378
                                                            SHA1:0DDB9A49CB83DDF2396B2ECA85093260710496C2
                                                            SHA-256:1C02D14140196623297F858E2EEF00B4159E1C6FAFE044EC65A48C9C24D46540
                                                            SHA-512:D63F34024356F5CE0335D14EA557F4BBF238CCA8265DD27C039C70F7F28FE737F368B030DEE10B2C536512D2815E1F5B19838D08745C6A76A39050D573597EB3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_AT MONTHS_ABBREV [list \.. "J\u00e4n"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_AT MONTHS_FULL [list \.. "J\u00e4nner"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de_AT DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset de_AT TIME_FORMAT "%T".. ::msgcat::mcset de_AT TIME_FORMAT_12 "%T".. ::msgcat::mcset de_AT DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1276
                                                            Entropy (8bit):4.389082225723362
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83B8VSysVB8VsZKKgJ5Mm47fpK26aSIui7dHqWZ0ZIlj5VevjevbDvW:43Bt1VBbZKKgJs6qx1Wc5VojobzW
                                                            MD5:C351057D8E5328C0790901D1F4DBEC9F
                                                            SHA1:F73DE8AEF7F8083B0726760AA003E81067A68588
                                                            SHA-256:532845CD15EC821C1939D000C648694A64E8CA8F0C14BAD5D79682CF991481CE
                                                            SHA-512:8152AD082D0A6A4EBE7E1CCA9D4A5F2E48ABE3F09F4385A517C523A67CA3B08E0F20C193D0F6850F37E55ED0CD6FBD201FE22CC824AF170976D04DB061212F2D
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_BE DAYS_OF_WEEK_ABBREV [list \.. "Son"\.. "Mon"\.. "Die"\.. "Mit"\.. "Don"\.. "Fre"\.. "Sam"].. ::msgcat::mcset de_BE DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de_BE MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_BE MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::m
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2304
                                                            Entropy (8bit):4.371322909589862
                                                            Encrypted:false
                                                            SSDEEP:24:4aR833v+ZYYWtv+nWfFyL1NYOg+EKVJQ19tWQYmYaYRn9sWuSAJIJ6eRa6WrmdlX:43/pZyLjY0uYR9QmdkjC9r
                                                            MD5:7DD14B1F4FF532DCAF6D4C6F0DF82E9A
                                                            SHA1:707875FEF4207EBB71D066FDC54C7F68560C6DAD
                                                            SHA-256:8B23E0E2F0F319BB9A2DFDCCDC565FF79A62FA85094811189B6BC41594232B6B
                                                            SHA-512:5ECA072DE5DD7890270AE268C7C8D40EE2DB6966643604D16E54194DB0AD74FDA8D04848331E61B387E8B494AF18252E38671D939069EC4C90C672A629563B88
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset el DAYS_OF_WEEK_ABBREV [list \.. "\u039a\u03c5\u03c1"\.. "\u0394\u03b5\u03c5"\.. "\u03a4\u03c1\u03b9"\.. "\u03a4\u03b5\u03c4"\.. "\u03a0\u03b5\u03bc"\.. "\u03a0\u03b1\u03c1"\.. "\u03a3\u03b1\u03b2"].. ::msgcat::mcset el DAYS_OF_WEEK_FULL [list \.. "\u039a\u03c5\u03c1\u03b9\u03b1\u03ba\u03ae"\.. "\u0394\u03b5\u03c5\u03c4\u03ad\u03c1\u03b1"\.. "\u03a4\u03c1\u03af\u03c4\u03b7"\.. "\u03a4\u03b5\u03c4\u03ac\u03c1\u03c4\u03b7"\.. "\u03a0\u03ad\u03bc\u03c0\u03c4\u03b7"\.. "\u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae"\.. "\u03a3\u03ac\u03b2\u03b2\u03b1\u03c4\u03bf"].. ::msgcat::mcset el MONTHS_ABBREV [list \.. "\u0399\u03b1\u03bd"\.. "\u03a6\u03b5\u03b2"\.. "\u039c\u03b1\u03c1"\.. "\u0391\u03c0\u03c1"\.. "\u039c\u03b1\u03ca"\.. "\u0399\u03bf\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):307
                                                            Entropy (8bit):4.896073290907262
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoCwmGjbmvFjoCws6W3v1oCws6W3v6p6HyFjoCwmT+3vjbe:4EnLB383QrmdSs6W3vss6W3v6QSoJ3ve
                                                            MD5:5B31AD8AC0000B01C4BD04BF6FC4784C
                                                            SHA1:F55145B473DDCAE38A0F7297D58B80B12B2A5271
                                                            SHA-256:705C66C14B6DE682EC7408EABDBA0800C626629E64458971BC8A4CBD3D5DB111
                                                            SHA-512:1CCE6BCAE5D1F7D80E10687F0BCA2AE1B2DD53F04A0F443DC9B552804D60E708E64326B62BA4E3787325D89837B4AC8CCCA9AF6F39CBD654BCC8A9C27EA63BB8
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_AU DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_AU TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_AU TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_AU DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):312
                                                            Entropy (8bit):4.870560620756039
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoCr3FuoCsX3vtfNrsoCsX3v6YNIdjoCs+3v3FnN9vn:4EnLB383H3Fb3vtNN3v6y43v3FnNNn
                                                            MD5:DDA87ACED97F9F7771788A1A0A1E4433
                                                            SHA1:E221653CD659C095098180344654770FF059331B
                                                            SHA-256:BC87754A253C1036E423FA553DA182DBC56F62A13EDA811D8CD9E8AFA40404A6
                                                            SHA-512:BB95D9241B05686CA15C413746DD06071635CB070F38847BE9702397A86C01A3D54DEBE1ACAA51834AB74DB8D0F75E353995183864E382721425756EE46B0B1E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BE DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_BE TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset en_BE TIME_FORMAT_12 "%k h %M min %S s %z".. ::msgcat::mcset en_BE DATE_TIME_FORMAT "%d %b %Y %k:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.915769170926952
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xosmGMoss6W3v6ay/5osmT+3vR6HyFvn:4EnLB383hr8s6W3v6ay/hJ3voSVn
                                                            MD5:4CBF90CE15ECCB6B695AA78D7D659454
                                                            SHA1:30C26ADB03978C5E7288B964A14B692813D6E0B8
                                                            SHA-256:EC48F18995D46F82B1CC71EA285174505A50E3BA2017BCCE2D807149B7543FD0
                                                            SHA-512:CC809EBD1B2B5D9E918C2E2CE4E7075DFB0744C583F17C1C234D8437EF0C34654D2F09FF77544AD3430CEC78ABC70AA5F85F71AD1489A687B8087FCDFE07B088
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_BW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_BW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):295
                                                            Entropy (8bit):4.87629705076992
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoAhgqyFjoAZF3vX5oAZF3v6cvBoAh9+3vnFDL8vn:4EnLB383FhgqWDZF3vVZF3v6cvdhI3vM
                                                            MD5:BFC4A48F5B10D137A4D32B440C47D3C6
                                                            SHA1:C90EF2A8291DE589BC12D0A5B8AF2F0B00FEB7CD
                                                            SHA-256:3CF2D0937FD95264549CF5C768B898F01D4875A3EB4A85D457D758BC11DFEC6E
                                                            SHA-512:A91B81A956A438CA7274491CA107A2647CBDFB8AEB5FD7A58238F315590C74F83F2EBA4AA5C4E9A4A54F1FC1636318E94E5E4BBEA467326E0EACED079741E640
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_CA DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_CA TIME_FORMAT "%r".. ::msgcat::mcset en_CA TIME_FORMAT_12 "%I:%M:%S %p".. ::msgcat::mcset en_CA DATE_TIME_FORMAT "%a %d %b %Y %r %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.892405843607203
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoEbtvqyFjoELE3vLjoELE3v6mjoEbto+3vnFDoAkvn:4EnLB383BbtvqWHLE3vTLE3v6EbtF3vW
                                                            MD5:52E55DE8C489265064A01CEEC823DCDD
                                                            SHA1:16F314A56AE0EAC9DAD58ADDEA6B25813A5BAA05
                                                            SHA-256:C2CE5B74F9E9C190B21C5DF4106303B7B794481228FB9A57065B9C822A1059C3
                                                            SHA-512:6010F29BF75D0CB4EE4F10781423A8CC68D5018DE8C633CD1217A7FE1299A0532E8C0E5D120188B748171EB255C587BB0B64B7384A58F725F3B6A4B9EA04393E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_GB DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_GB TIME_FORMAT "%T".. ::msgcat::mcset en_GB TIME_FORMAT_12 "%T".. ::msgcat::mcset en_GB DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):329
                                                            Entropy (8bit):4.851471679101967
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoa+joaQ9PoaAx/G4soaYYW3v6ay/5oaAx/T+3v4x6HyFvn:4EnLB383BSiF4KxW3v6ay/B/3v4ISVn
                                                            MD5:DE2A484508615D7C1377522AFF03E16C
                                                            SHA1:C27C0D10E7667AD95FFF731B4E45B2C6E665CC36
                                                            SHA-256:563450A38DB6C6A1911BC04F4F55B816910B3E768B1465A69F9B3BD27292DBEE
                                                            SHA-512:A360B0FD7E36BCC0FB4603D622C36199E5D4C705396C6701F29730EB5CB33D81B208541CADFAED5303FC329C7C6A465D23CA9584F0DEC2DE128E258478DD6661
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_HK AM "AM".. ::msgcat::mcset en_HK PM "PM".. ::msgcat::mcset en_HK DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_HK TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_HK DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.833246107458447
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoK6qyFjoKi+3vLjoKi+3v6mjoKv+3vnFDoAkvn:4EnLB383CqW13vJ3v6b3v9dmn
                                                            MD5:57F0BBE1316D14BC41D0858902A7980A
                                                            SHA1:B68BF99A021B9F01FE69341DF06F5D1453156A97
                                                            SHA-256:9E0DCEE86A03B7BDD831E0008868A9B874C506315BF01DF3982AD3813FD3BA8E
                                                            SHA-512:864F32254AAD39859AFC47D0C90DC5F38CA86EF0BBC7DE61BE253756C22B7806E616B59802C4F4D7B2F5543BF7C070FFF6FAF253E0A337EC443337E63A2E5A57
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_IE TIME_FORMAT "%T".. ::msgcat::mcset en_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset en_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):318
                                                            Entropy (8bit):4.80637980762728
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoKr3ujoKrGtoKr5vMoKrw3v1oKr5o+3voAsvn:4EnLB383T9xvT3vJF3vonn
                                                            MD5:1A54E506E70B2125C6016B373D3DD074
                                                            SHA1:15289902BAA93208D8FB224E119166D0E044E34E
                                                            SHA-256:ADEA3A1AB8AA84237DDB2F276ABDB96DCB4C51932E920D1A5E336904E1138664
                                                            SHA-512:0D663233E6C96515713B3B829B605E72D8CE581AEF1C02FF6CA96598C040DCA42A3AC765EE9B5002E8969A331EB19A9AF0F8215F7113D0AD2F2EB2C560239D53
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IN AM "AM".. ::msgcat::mcset en_IN PM "PM".. ::msgcat::mcset en_IN DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_IN TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_IN DATE_TIME_FORMAT "%d %B %Y %H:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):307
                                                            Entropy (8bit):4.939458132662909
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoyejbmvFjo63v1o63v6p6HyFjoy7+3vjb0ysvn:4EnLB383temdj3vd3v6QS1S3ven
                                                            MD5:7E81708F107658FFD31C3BFBF704A488
                                                            SHA1:7941ED040707591B68581337F8D90FA03C5E1406
                                                            SHA-256:EC305B7CB393421E6826D8F4FEA749D3902EBA53BFA488F2B463412F4070B9ED
                                                            SHA-512:8F038FF960F81D96FF9E3454D8ABDA7FFDA5B99DA304ACECC42E74DDBED839388246F66B58928DA902D3B475FBA46602B34F6829A87ECB1124FFC47C036B4DBE
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_NZ DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_NZ TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_NZ TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_NZ DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):329
                                                            Entropy (8bit):4.824360175945298
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoojoOo2e4soe3v6ay/5o27+3v4x6HyFvn:4EnLB38304u3v6ay/k3v4ISVn
                                                            MD5:E2E3BD806C20D7FB88109B7F3B84C072
                                                            SHA1:2D7AD6BECA9C4D611BAE9747AD55A3E9385C2B42
                                                            SHA-256:3A9C22B07906544C04F7A29B800FCE87C09D7FDF5C251236925115CF251A3890
                                                            SHA-512:B14756B59BCABF8B29B41AC688E4F3A011735AF190B88F88B7B5FDDD3DA77F63FFC0F7875B3B453729CD3BC65E79F75F6E632CA68952EF473F78337D89E80BF2
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_PH AM "AM".. ::msgcat::mcset en_PH PM "PM".. ::msgcat::mcset en_PH DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_PH TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_PH DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.911413468674953
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoQW53FuoQGuX3v6ZwoQWa+3v3F0fxvn:4EnLB383V83FOJ3v62c3v3FEn
                                                            MD5:F70245D73BE985091459ADF74B089EBC
                                                            SHA1:21D52C336C08526D9DCF1AEC1F0701CB8B073D7A
                                                            SHA-256:D565679AE9AACBFE3B5273FE29BD46F46FFBB63C837D7925C11356D267F5FF82
                                                            SHA-512:171C70EB10D5E6421A55CE9B1AE99763E23FB6A6F563F69FE099D07C07FCA0CF8D3F6F00C5BB38BFF59A5F4C311506C4A9593F86C12B3B9E1861E72656B3800B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_SG DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset en_SG DATE_TIME_FORMAT "%d %b %Y %P %I:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):251
                                                            Entropy (8bit):4.937431055623088
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoOr0lIZoOK3v6poOs+3v0l6Uvn:4EnLB383z+3v6R3vl2n
                                                            MD5:FCA7B13CA6C9527D396A95BEA94CC92D
                                                            SHA1:E6F338A08F72DA11B97F70518D1565E6EF9AD798
                                                            SHA-256:67C253E2A187AA814809418E5B7A21F3A1F9FB5073458A59D80290F58C6C1EB4
                                                            SHA-512:37B8B4EA24B1C77AF0252A17660650CB2D4F8BB55C75817D6A94E1B81A3DDEF9913D12D3BF80C7BFE524CD0AD84E353E73238056759E6545BFE69EF5F806B8B7
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZA DATE_FORMAT "%Y/%m/%d".. ::msgcat::mcset en_ZA TIME_FORMAT_12 "%I:%M:%S".. ::msgcat::mcset en_ZA DATE_TIME_FORMAT "%Y/%m/%d %I:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.934659260313229
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoEmGMoEs6W3v6ay/5oEmT+3vR6HyFvn:4EnLB383Zr0s6W3v6ay/ZJ3voSVn
                                                            MD5:A302091F490344B7A79C9463480AD7CF
                                                            SHA1:E3992D665077177BAD5A4771F1BAF52C2AD1829C
                                                            SHA-256:6F4754CE29DFA4F0E7957923249151CE8277395D1AF9F102D61B185F85899E4E
                                                            SHA-512:FEBDB0BD6D0FD4C592DB781836F93F0C579399D324112F8829B769303CC6EEA487AAB14EBD60ED1B4F3B3DABF501601C9F65656327FF54853BF2CD9EC6A2F00F
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_ZW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_ZW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1285
                                                            Entropy (8bit):4.3537859241297845
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83dRb4vyomrIsmZ55vrAO0LH+50ydAcveva:43PT5rWvrAR60yW6oa
                                                            MD5:D87605E6282713EED41D56D53B7A04FD
                                                            SHA1:41AAD4BD3B72CCBB6A762FEED3C24931642DD867
                                                            SHA-256:98D52CAB5CA65789D1DC37949B65BAF0272AB87BCCBB4D4982C3AF380D5406AB
                                                            SHA-512:4A4F51B2FD0248B52530B5D9FE6BFCFE455147CBE2C1F073804A53666945405F89CBBAD219FFF6904C1F92885F7C53B9D9A969732D662CEA8EC1717B3303B294
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eo DAYS_OF_WEEK_ABBREV [list \.. "di"\.. "lu"\.. "ma"\.. "me"\.. "\u0135a"\.. "ve"\.. "sa"].. ::msgcat::mcset eo DAYS_OF_WEEK_FULL [list \.. "diman\u0109o"\.. "lundo"\.. "mardo"\.. "merkredo"\.. "\u0135a\u016ddo"\.. "vendredo"\.. "sabato"].. ::msgcat::mcset eo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "a\u016dg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset eo MONTHS_FULL [list \.. "januaro"\.. "februaro"\.. "marto"\.. "aprilo"\.. "majo"\.. "junio"\.. "julio"\.. "a\u016dgusto"\.. "septembro"\.. "oktobro"\.. "novembro"\.. "decembro"\.. ""].. ::m
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1232
                                                            Entropy (8bit):4.2910064237800025
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83hEVIhlp4herIsYoorrClH+Fo9ARhprBvtFvr6:43OVY7+ercrmsYsr1thr6
                                                            MD5:91DE6EE8E1A251EF73CC74BFB0216CAC
                                                            SHA1:1FB01E3CF2CAFA95CC451BC34AB89DC542BBD7DD
                                                            SHA-256:E9A6FE8CCE7C808487DA505176984D02F7D644425934CEDB10B521FE1E796202
                                                            SHA-512:46CFD80E68461F165EE6A93AB6B433E4D4DA6A9A76CB7F3EF5766AC67567A7AFFB7B4E950A5AFA7C69C91F72AC82D2A448D32E39BBFC0BF26D2257460471EEC1
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mi\u00e9"\.. "jue"\.. "vie"\.. "s\u00e1b"].. ::msgcat::mcset es DAYS_OF_WEEK_FULL [list \.. "domingo"\.. "lunes"\.. "martes"\.. "mi\u00e9rcoles"\.. "jueves"\.. "viernes"\.. "s\u00e1bado"].. ::msgcat::mcset es MONTHS_ABBREV [list \.. "ene"\.. "feb"\.. "mar"\.. "abr"\.. "may"\.. "jun"\.. "jul"\.. "ago"\.. "sep"\.. "oct"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset es MONTHS_FULL [list \.. "enero"\.. "febrero"\.. "marzo"\.. "abril"\.. "mayo"\.. "junio"\.. "julio"\.. "agosto"\.. "septiembre"\.. "octubre"\.. "noviembre"\.. "diciembre"\.. ""].. ::msgc
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):248
                                                            Entropy (8bit):4.878377455979812
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo8GzvFjot/W3v1o8T+3v9ysvn:4EnLB3833GzdV3vLK3vnn
                                                            MD5:313966A7E4F50BB77996FDE45E342CA9
                                                            SHA1:021DF7211DAE9A635D52F7005672C157DBBAE182
                                                            SHA-256:B97DCEA4FEC3E14632B1511D8C4F9E5A157D97B4EBBC7C6EE100C3558CB2947F
                                                            SHA-512:79DCC76263310523BAF1100C70918FCE6BECB47BE360E4A26F11C61F27E14FC28B588A9253AA0C1F08F45AE8A03312A30FBDCF4FDFFDC5BF9D086C4B539DE022
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_AR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_AR TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset es_AR DATE_TIME_FORMAT "%d/%m/%Y %H:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.924579610789789
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoYePWWjoU3v6ry/5oY7+3vPUe6HyFvn:4EnLB383nedh3v6ry/nS3vs3SVn
                                                            MD5:EF58B1097A3C6F2133BD7AA8CCC1AD1B
                                                            SHA1:BD479E4635F3CD70A6A90E07B7E92757BC9E2687
                                                            SHA-256:B47F55539DB6F64304DEA080D6F9A39165F1B9D4704DCBA4C182DBD3AA31A11B
                                                            SHA-512:F9EB1489E5002200D255A45DC57132DEFD2A2C6DE5BC049D0D9720575E4FDD1B6A212D9E15974C6A2E0D0886069EA0DD967AD7C20845EC38EB74CBED0C3E5BE1
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_BO DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_BO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_BO DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.9352990174129925
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xodvPWWjok3v6ry/5odo+3vPUe6HyFvn:4EnLB383OdV3v6ry/i3vs3SVn
                                                            MD5:42BCE0EE3A3F9E9782E5DE72C989903A
                                                            SHA1:0960646417A61E8C31D408AE00B36A1284D0300E
                                                            SHA-256:9D1A2A6EBA673C6F6D964DBCDDF228CB64978F282E70E494B60D74E16A1DB9CB
                                                            SHA-512:C53DDCC17F261CFFAA2205879A131CFD23A7BCF4D3787090A0EA8D18530C4805903ED6CF31B53A34C70510A314EBBB68676E9F128289B42C5EFBC701405D5645
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CL DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_CL TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CL DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.908553844782894
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo4FjbmvFjo4F+3v6ry/5o4++3vjb0f6HyFvn:4EnLB3831mdD+3v6ry/P3vbSVn
                                                            MD5:6A8F31AE734DCEE4845454408CDB3BC5
                                                            SHA1:A3B9A0124D3CFA9E0E5957612897B23193AD5D59
                                                            SHA-256:5FAC53ACFB305C055AFD0BA824742A78CB506046B26DAC21C73F0BB60C2B889A
                                                            SHA-512:188A65CFE2FBD04D83F363AEA166F224137C8A7009A9EBEB24B2A9AC89D9484D3A7109A4CE08F5C0A28911D81571230CC37554F4F19956AE163F9304911EE53C
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CO DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_CO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CO DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.919346233482604
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo76GzvFjoTW3v6ry/5o76T+3v9f6HyFvn:4EnLB383K6Gzdj3v6ry/K6K3vMSVn
                                                            MD5:2EDDA3F61BA4D049E6C871D88322CF72
                                                            SHA1:40AFB64AF810596FCBDBD742ACAFE25CE56F3949
                                                            SHA-256:A33DC22330D087B8567670B4915C334FF1741EE03F05D616CC801ECFDA1D9E64
                                                            SHA-512:B6A6059B44F064C5CB59A3DAFAA7BE9064EE3E38F5FA6391017D931EF3A2B471DC4D556B7BEC6852FD1F6260EF17F476754D6BEA89E035748E9304977513CFB5
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_CR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CR DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.913083040975068
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xomerQZ2jou3v6ry/5om7+3vrQZg6HyFvn:4EnLB383sk4/3v6ry/s3vkrSVn
                                                            MD5:76CFD4F568EA799F9A4082865633FF97
                                                            SHA1:B09846BBF7A78243A5075F2DC9241791DCBA434B
                                                            SHA-256:8DC2F857E91912ED46A94EB6B37DD6170EA7BCDDCD41CB85C0926A74EE12FCC1
                                                            SHA-512:58B20A8A5D1F8C19AC36E61965106266B7E6F7E95DDD6AD9C4BB9FD7FFC561CB0E2103639D901A6A78CE2DD154CBF7F3AE0F71B4DC1CCB11DC6BB40D9C6E2157
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_DO DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_DO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_DO DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.915857529388286
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xozgzvFjoro+3v6ry/5oz9+3v9f6HyFvn:4EnLB383OgzdkF3v6ry/OI3vMSVn
                                                            MD5:94B713B1560FE7711EA746F1CEBD37CD
                                                            SHA1:E7047E8F04D731D38FA328FBC0E1856C4A8BB23D
                                                            SHA-256:52AB5A6C9DD4F130A75C049B3AF8F54B84071FC190374BCCF5FA0E1F3B91EB21
                                                            SHA-512:EE807D4D74A609F642CC3C6FC3D736708F67A6931DEB95288AB5822DA256BE4C908A346036195CF4266408458906D28BB5C715EEAFCACFC4FE45D4E6D8E435FE
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_EC DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_EC TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_EC DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.9102355704853435
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xohvjbmvFjoI3v6ry/5oho+3vjb0f6HyFvn:4EnLB383KmdJ3v6ry/W3vbSVn
                                                            MD5:761D0A468DF2EE75BC2CAB09D5FF38CD
                                                            SHA1:D627BE45FE71CCB3CA53153393C075FF5136C2F3
                                                            SHA-256:19B4D3025156C060A16328370A3FDB9F141298DECFC8F97BE606F6438FECE2EE
                                                            SHA-512:6CF7C9004A8A3B70495862B7D21921B1A6263C2153FEBC5C4997366498ABBFE70263B436C2B4998550780A4C3A58DCF0AAE7420FF9D414323D731FA44BD83104
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_GT DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_GT TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_GT DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.947925914291734
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoIvriSFjoP3v6ry/5oIo+3vrig6HyFvn:4EnLB383V+2m3v6ry/v3v+lSVn
                                                            MD5:33CEE7F947A484B076F5FA7871A30FEB
                                                            SHA1:F77F8D1F42008770A6FF1F5097C863ECF482BEBE
                                                            SHA-256:07873D4D59BB41000706A844859C73D26B1FF794058AA83CFFCA804981A24038
                                                            SHA-512:EBF6873F9CB554489EFCD352943100C00171E49D27153769D1C4DB25E2D1F44F2D34869B596C267C9BB59ED0444468D9982137CFB1C6035FB15A855BB867133B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_HN DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_HN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_HN DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.9102355704853435
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoPjbmvFjoH+3v6ry/5oI+3vjb0f6HyFvn:4EnLB383UmdD3v6ry/k3vbSVn
                                                            MD5:678D7A6DC32355246BF3AC485A24AF4D
                                                            SHA1:B6C273D3BE5FB9F5A221B0333870CCE41CEDFDE4
                                                            SHA-256:A0F57137D2C0ABDC933E03CFB188F5632176C195CEADB9DC80D469C8DC6CEDC6
                                                            SHA-512:571404CCB0591C681C975E3F7A6C6972FAF2362F1D48BFC95E69A9EAE2DB3F40BF4B666C41950C4924E3FD820C61ED91204F92283B8554F1BD35B64D53BD4125
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_MX DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_MX TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_MX DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.918215906418583
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoe/GriSFjo3W3v6ry/5oe/T+3vrig6HyFvn:4EnLB383Re+2eW3v6ry/RS3v+lSVn
                                                            MD5:471C41907CE5DB1F30C647A789870F78
                                                            SHA1:C575A639609620AF7C56430991D0E4C2B50BDEC5
                                                            SHA-256:6250663DA1378E54BEDCEF206583D212BC0D61D04D070495238D33715BB20CAE
                                                            SHA-512:CAE32DF8F583542CAFE3292501725D85B697A5C1F9A0A7993490E8A69B6CE5CE3DE3AA2733B14D989A8D13B5E31B437DB42E9AB9D1851FE72313592C752B5061
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_NI DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_NI TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_NI DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.906719336603863
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoX5rQZ2joHE3v6ry/5oXa+3vrQZg6HyFvn:4EnLB383ak4F3v6ry/G3vkrSVn
                                                            MD5:571F6716293442672521F70854A5AD05
                                                            SHA1:525EBDEA6F85FC769B6C0C0B179BD98381647123
                                                            SHA-256:EBB661C1C09E7D4F6FBCC4B2DAD0F41442B1FFDD27F003ABDC0375DD316E57D7
                                                            SHA-512:C6176EE48515BDFC09B8347DAC5FD2C0165AA765916457DC7B057E526785AC912481CB72F118D2943372213B23CE3C39739263C2B3DA4DBFEB24C522ACC0439D
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PA DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_PA TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PA DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.90959433688075
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoIgzvFjoQ9X3v6ry/5oI9+3v9f6HyFvn:4EnLB383+zdB3v6ry/y3vMSVn
                                                            MD5:5A5997D834DDD3E2E8FF8C6956AD54AC
                                                            SHA1:AB4110E37B3665D738A8F2B3E64CBA9E99127301
                                                            SHA-256:90C130B66958CF63CB3DDD2C633E58444357DBAB44C56831DD794CBD2EB1AED0
                                                            SHA-512:1FEB8E77EA7B886E4A06279AC8A4B6200DBB86DCD28989651B92A0C9147A7BCFBB871DF8F904A1CF8F869BFFBD21325505AC44A4DBEBE1EFC87D43174597F1F3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.905689521403511
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo06GriSFjoeW3v6ry/5o06T+3vrig6HyFvn:4EnLB383gG+263v6ry/gK3v+lSVn
                                                            MD5:CE811BB8D12C7E6D53338759CCFB0A22
                                                            SHA1:0AED290AA479DE6887CCB58D3F0A0F379EF8D558
                                                            SHA-256:F790E8E48DC079DCD7DEB58170561006A31294F7E4ACBF9CF2ABFA3DB9E3FA9E
                                                            SHA-512:0C73654CC3D33F76D9BF545BD6C5E42CBDD10B6D9750BFD6536806010F3B6A3C3647FB9D5E7E75A39823FDB857E13D07B7F987809C94B9F980E6D3A6D3108E85
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PR DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_PR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PR DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.917539255090736
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo/5zvFjovE3v6ry/5o/a+3v9f6HyFvn:4EnLB383Czdt3v6ry/+3vMSVn
                                                            MD5:9CD6FAC4121E3D287C87157142E32845
                                                            SHA1:3081FE2197017EC8E052756A407880C1C4ED026A
                                                            SHA-256:70263F7EB22822DFEE8849B7AC4418ED9331275A71E77236B59226396505CDFF
                                                            SHA-512:25DC054085C4078734988EEDD87E31ABE93DA8B43512E924DE4BCDE9F8EC670436B72FAD1855484F9AC71DD0BEDD9ED30304D02219C4FFC4B0516D8889BDF9F9
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.929035824905457
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xofriSFjo3+3v6ry/5oY+3vrig6HyFvn:4EnLB383Y+22+3v6ry/Q3v+lSVn
                                                            MD5:AF300EA6E733DC6820768EA16194B472
                                                            SHA1:7766A6EB3D07BCC759CF6718EF3D6EC3FCE13565
                                                            SHA-256:26A38B3745C95673D21BABB987F1D41EE08DDA945C670F5432BA0CE6F893C0E9
                                                            SHA-512:C38D67C912584BE539D71881C6517AC186CBB336A160602DA716CE2708B2D38CE8FA7DD23EDB98890ABB7119B924B6C7816C18EC18F20C49D6284DF2386E32EE
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_SV DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_SV TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_SV DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.923802447598272
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xooygzvFjooq9X3v6ry/5ooy9+3v9f6HyFvn:4EnLB3835rzdbsX3v6ry/5J3vMSVn
                                                            MD5:2DC550FEC3F477B1159B824479BCE707
                                                            SHA1:4D0B20CF3E50B64D74655A405A7750E0B0BB4375
                                                            SHA-256:1291B58810739EA0651493DD7887F5EE3E14BDB806E06DD4BB8AE2520C742EDA
                                                            SHA-512:B12B927ACA6274904928A6A6CAEC8339A794C74A1F1804FF93AABC132AF9AD8AC5117F20067A60EFEBC9887150D7ACA5BE9643FF61509666011FD203211C25B9
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_UY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_UY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_UY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.928484426267027
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoXrzvFjoXK3v6ry/5oXs+3v9f6HyFvn:4EnLB3838zdv3v6ry/c3vMSVn
                                                            MD5:184D6C4B9F0AA874DEB959F63F7CC01B
                                                            SHA1:5FB370B498289590C977F6B489FF646F0FB27425
                                                            SHA-256:91191517403C712299919F9C797F952502E33CB6961D1DBEE3A7C9E8D2B170B9
                                                            SHA-512:881CCAB0950AE993744ECCA141120C005F53D684167A3E5CBDDF950D110D630FB2B4F6AE6E3D0E06D5110AE25EA00A4F4DAFB03AD3B227DC8C63464D434431DA
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_VE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_VE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_VE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1258
                                                            Entropy (8bit):4.391217201307309
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83P1Y2+1YoQVTsC/m48qpRTVTR7I/68qqq4Z0yoN7emG5wsvtqmsv5t:43P1p+1jQ9sq8y9v8Yko7emG5wKtqmKX
                                                            MD5:C8C5EF2FA6DD8DBD5BBD2699BE1A0BF6
                                                            SHA1:F5E26B40786B8987C98F9CBDEF5522043574A9ED
                                                            SHA-256:4BEE224C21B0483CFF39BE145C671AA20CB7872C8727FD918C0E8ECA2BBEB172
                                                            SHA-512:757FA85C137A11C1A3F4A8392C7A4E4030A67D0E593FA25A98BEC07DB295399AB2C0D9EBE61E07420B14387A29C060DC3AF812A1E7B85110DBB13C3C3DCB3600
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset et DAYS_OF_WEEK_ABBREV [list \.. "P"\.. "E"\.. "T"\.. "K"\.. "N"\.. "R"\.. "L"].. ::msgcat::mcset et DAYS_OF_WEEK_FULL [list \.. "p\u00fchap\u00e4ev"\.. "esmasp\u00e4ev"\.. "teisip\u00e4ev"\.. "kolmap\u00e4ev"\.. "neljap\u00e4ev"\.. "reede"\.. "laup\u00e4ev"].. ::msgcat::mcset et MONTHS_ABBREV [list \.. "Jaan"\.. "Veebr"\.. "M\u00e4rts"\.. "Apr"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "Aug"\.. "Sept"\.. "Okt"\.. "Nov"\.. "Dets"\.. ""].. ::msgcat::mcset et MONTHS_FULL [list \.. "Jaanuar"\.. "Veebruar"\.. "M\u00e4rts"\.. "Aprill"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "August"\.. "September"\.. "Oktoober"\.. "November"\.. "De
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1032
                                                            Entropy (8bit):4.002617252503668
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83DEXk8TT7vXk8TTMtzCIsOo/ssP6tvf1I49sHT:434bTbbTc+RjKi4mz
                                                            MD5:ED9805AF5BFB54EB28C6CB3975F86F5B
                                                            SHA1:2BD91BD850028712F35A2DDB2555036FBF6E8114
                                                            SHA-256:6889B57D29B670C6CFB7B5A3F2F1749D12C802E8E9629014D06CE23C034C7EF1
                                                            SHA-512:16F31DE5D2B0D3ED2D975C7891C73C48F073CDAC28F17572FC9424C2D384DDFE9E5E235F17C788F42840CB2D819D2D9499B909AB80FEF1B09F2AE1627CF1DADC
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu DAYS_OF_WEEK_ABBREV [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu DAYS_OF_WEEK_FULL [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu MONTHS_ABBREV [list \.. "urt"\.. "ots"\.. "mar"\.. "api"\.. "mai"\.. "eka"\.. "uzt"\.. "abu"\.. "ira"\.. "urr"\.. "aza"\.. "abe"\.. ""].. ::msgcat::mcset eu MONTHS_FULL [list \.. "urtarrila"\.. "otsaila"\.. "martxoa"\.. "apirila"\.. "maiatza"\.. "ekaina"\.. "uztaila"\.. "abuztua"\.. "iraila"\.. "urria"\.. "azaroa"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):294
                                                            Entropy (8bit):4.915392589807169
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoszFnJF+l6VvBoszw3vLjoszw3v6mjosz++3v/RHvn:4EnLB383FL+l6VQ3vO3v6G3vZPn
                                                            MD5:4C91AA000D4316585893025CBB96E910
                                                            SHA1:3D4E73839A1A8CB9DEC1E59D9D2813257D9480F0
                                                            SHA-256:D45CC432E5743E6CEC34E9A1E0F91A9D5C315CDA409E0826B51AD9D908479EB6
                                                            SHA-512:0731F2EEB22ADC7EF8AF215B9EB4C5A66B33BC90E4F80CF7AA482AD002CB30543547230124A0507EC79EDDD6903A042EDA5D7C8AFD77F7FC994EFC6853FABB05
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu_ES DATE_FORMAT "%a, %Yeko %bren %da".. ::msgcat::mcset eu_ES TIME_FORMAT "%T".. ::msgcat::mcset eu_ES TIME_FORMAT_12 "%T".. ::msgcat::mcset eu_ES DATE_TIME_FORMAT "%y-%m-%d %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1711
                                                            Entropy (8bit):4.21837106187395
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83CnMqnbxbGwgjSyiY/Xw2mS1yM/8ye48YyfNqTb2gyj/8yHkQp:43Yzyhgvs9yi4P
                                                            MD5:7AB25F4E7E457469DC61A33176B3AA72
                                                            SHA1:EEA98283D250A99E33DD4D5D9B1B76A029716CE6
                                                            SHA-256:86898728B275288693B200568DC927C3FF5B9050690876C4441A8339DAE06386
                                                            SHA-512:7524437F91E91751BEB7A378D7674C49E5D84B716FE962F4C23580C46A671F3F33638FCD37A8F90C86E24DA8F54448E06AC9C3AEFFB5613E94A04E512C1AD68D
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0648\u062a
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2009
                                                            Entropy (8bit):4.491667766230948
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83KnMqnbxbGUgjDiY/Xw2mS1yM/8ye48tfNqTb2gyj/8yHkQLoRv9v/vNv0P:43wihgvsai4Rmv53JU
                                                            MD5:C59EE7CA80AD9F612A21C8B6674A820E
                                                            SHA1:AEFD631EFC1892063244FA622DE1A091C461E370
                                                            SHA-256:6B56545C1AE1DE53BC2389BB7AE59F115BADE24F907E384E079491DC77D6541D
                                                            SHA-512:42F52091480599D317FB80DF8E52A6C6F88614C6172BF4033974DD136FB30E6F47D38982C8A7BC14CF3165C3EBAE3680F94DF3A0ED079AB68165286251CD0BD7
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IN DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa_IN DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa_IN MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):426
                                                            Entropy (8bit):5.12739029869254
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383D2WGz7A/3vy3v6TANCmK3vz7AAbn:4aR83DoPivkvFk5vPN
                                                            MD5:9778A7C3ABD37ECBEC0BB9715E52FAF8
                                                            SHA1:D8063CA7779674EB1D9FE3E4B4774DB20B93038B
                                                            SHA-256:3D9779C27E8960143D00961F6E82124120FD47B7F3CB82DB3DF21CDD9090C707
                                                            SHA-512:B90B4A96CE5E8B9BF512B98C406603C60EA00F6740D04CD1FC30810C7155A37851AE5E28716F959137806F1A9E3152D2A0D79B8EA7E681A0737A28593657DE66
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IR AM "\u0635\u0628\u062d".. ::msgcat::mcset fa_IR PM "\u0639\u0635\u0631".. ::msgcat::mcset fa_IR DATE_FORMAT "%d\u2044%m\u2044%Y".. ::msgcat::mcset fa_IR TIME_FORMAT "%S:%M:%H".. ::msgcat::mcset fa_IR TIME_FORMAT_12 "%S:%M:%l %P".. ::msgcat::mcset fa_IR DATE_TIME_FORMAT "%d\u2044%m\u2044%Y %S:%M:%H %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1195
                                                            Entropy (8bit):4.32217771842326
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83KTvIhmuw4tW/UWJTttWKeqA+3ewvtyv3e6:43YvIwuw4t05ttnlzt0p
                                                            MD5:CC06F0ABD8F985654DAD8256598EBCB7
                                                            SHA1:71C880F9F395ACD32AF7F538033211F392F83645
                                                            SHA-256:9929A6B7139BD7E0F29487F7888A83E4C4F5E9CE0352738CFCA94EE2DDF3BD6B
                                                            SHA-512:E1292665270B6FBF7738CC3864B55194E7B827C6AD9492FB2E54DC1B626159B243052CE502335B9D92E2B8F58A4DD1FA0E628CB6A9D1D3A652FE2B93A3FB711A
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fi DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "ma"\.. "ti"\.. "ke"\.. "to"\.. "pe"\.. "la"].. ::msgcat::mcset fi DAYS_OF_WEEK_FULL [list \.. "sunnuntai"\.. "maanantai"\.. "tiistai"\.. "keskiviikko"\.. "torstai"\.. "perjantai"\.. "lauantai"].. ::msgcat::mcset fi MONTHS_ABBREV [list \.. "tammi"\.. "helmi"\.. "maalis"\.. "huhti"\.. "touko"\.. "kes\u00e4"\.. "hein\u00e4"\.. "elo"\.. "syys"\.. "loka"\.. "marras"\.. "joulu"\.. ""].. ::msgcat::mcset fi MONTHS_FULL [list \.. "tammikuu"\.. "helmikuu"\.. "maaliskuu"\.. "huhtikuu"\.. "toukokuu"\.. "kes\u00e4kuu"\.. "hein\u00e4kuu"\.. "elokuu"\.. "syyskuu"\.. "lokakuu"\.. "marraskuu"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1033
                                                            Entropy (8bit):4.15884265510429
                                                            Encrypted:false
                                                            SSDEEP:24:4aR834YPxTSBFSa+E6rIsmYmyAxyIQbXHU92W1T:43a6rIyAE0B
                                                            MD5:5D224E66FD9521CA4327D4F164CD6585
                                                            SHA1:FC8F4C1D9A69931679028DE02155D96A18F6542E
                                                            SHA-256:2EC9B03469FA38B260915C93318F446EA5E12B9090BD441936B57552EBA1E3C9
                                                            SHA-512:0E0F97D99F0274A8A92AA7DC992B252A0BB696D69A8835602D8F4C03A6A15780F45971F00863436949CD81AD7DF6EE6BC463CE5B9FECF5E39508BA4D4E83C693
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo DAYS_OF_WEEK_ABBREV [list \.. "sun"\.. "m\u00e1n"\.. "t\u00fds"\.. "mik"\.. "h\u00f3s"\.. "fr\u00ed"\.. "ley"].. ::msgcat::mcset fo DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nadagur"\.. "t\u00fdsdagur"\.. "mikudagur"\.. "h\u00f3sdagur"\.. "fr\u00edggjadagur"\.. "leygardagur"].. ::msgcat::mcset fo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset fo MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "apr\u00edl"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.864028070948858
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoZA4WjoZd3vLjoZd3v6mjoZd+3vnFDoAkvn:4EnLB3831P23vS3v6u3v9dmn
                                                            MD5:92E2B6483B2374817548F4EAA1731820
                                                            SHA1:071E1E9368CCB4EC864E78622B2113F460920203
                                                            SHA-256:C3DCCF5E5904C24D4AD9AAA36160A78F5397A7452510C0C0E61DE4DE863305CB
                                                            SHA-512:E79D4D38A22298252FA46D15C383CFB2A1E49E8196C265A58F9BA4982DFD9CE29E87C0B85BE3F39617359451831B792FCD3092A52EDF8FFD999AFE5CFE1D170D
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo_FO DATE_FORMAT "%d/%m-%Y".. ::msgcat::mcset fo_FO TIME_FORMAT "%T".. ::msgcat::mcset fo_FO TIME_FORMAT_12 "%T".. ::msgcat::mcset fo_FO DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1257
                                                            Entropy (8bit):4.383721663740675
                                                            Encrypted:false
                                                            SSDEEP:24:4aR835LzAX2t6KOkPwzZIGzRmzQf1waGqHvivh:43mlwIFZtA/qPkh
                                                            MD5:4D63B4A7CF13A28A6F6784B5597EEF43
                                                            SHA1:FE1B35A93CB72666D7D6BC37D9BE081B05A00CD9
                                                            SHA-256:96B1E1E12CD13A56722EBF27D362C70B467342FA1282A40B89FB16B5105A0480
                                                            SHA-512:5647CAE859B62C7CE1CEE6426A076361D2A29EFE6B6F311DDC0E7D006194BA68D575852FEC5FDE2AB43DF8AE440C57013D32A3951095CB856327070FD9BD1C76
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr DAYS_OF_WEEK_ABBREV [list \.. "dim."\.. "lun."\.. "mar."\.. "mer."\.. "jeu."\.. "ven."\.. "sam."].. ::msgcat::mcset fr DAYS_OF_WEEK_FULL [list \.. "dimanche"\.. "lundi"\.. "mardi"\.. "mercredi"\.. "jeudi"\.. "vendredi"\.. "samedi"].. ::msgcat::mcset fr MONTHS_ABBREV [list \.. "janv."\.. "f\u00e9vr."\.. "mars"\.. "avr."\.. "mai"\.. "juin"\.. "juil."\.. "ao\u00fbt"\.. "sept."\.. "oct."\.. "nov."\.. "d\u00e9c."\.. ""].. ::msgcat::mcset fr MONTHS_FULL [list \.. "janvier"\.. "f\u00e9vrier"\.. "mars"\.. "avril"\.. "mai"\.. "juin"\.. "juillet"\.. "ao\u00fbt"\.. "septembre"\.. "octobre"\.. "novembre"\.. "d\u00e9cembre
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.910112619660625
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoXqyFjoIX3vLjoIX3v6mjog+3vnFDoAkvn:4EnLB383AqWv3vL3v6d3v9dmn
                                                            MD5:07EEADB8C2F2425FF9A27E46A81827A2
                                                            SHA1:AA18A651C64098C7885F1F869B9F221453F42987
                                                            SHA-256:AAD828BCBB512FBD9902DCDD3812247A74913CC574DEB07DA95A7BBE74B1FE48
                                                            SHA-512:1FA60B1A69B2F5FD2C009EC18695A937C4484D7C418F7E8398D95723B857698143E0584A546F9032B75894730CBBEF78453061AC13D90199FF702E148D983C28
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_BE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset fr_BE TIME_FORMAT "%T".. ::msgcat::mcset fr_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.890376345610709
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xooIso13vLjo13v6mjo1+3vnFDoAkvn:4EnLB383vIF3vU3v6A3v9dmn
                                                            MD5:2F70BDDE7685E2892C5F79C632FC2F0F
                                                            SHA1:FD1A6F6042E59D1563ABB5858C348C1D785C435E
                                                            SHA-256:0624DF9A56723DDB89E59736C20A5837DEA2206A789EBE7EEF19AD287590CA45
                                                            SHA-512:50FC0C91AB2C75FFC4F100C0D42DFC4B2101DB9713FD77E6FF5BF3F25A0AF4A535A4709CF4586809CEEE76C25B66ABC0DD4FD61524510C57AA0E63EA8F46E8D5
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CA DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset fr_CA TIME_FORMAT "%T".. ::msgcat::mcset fr_CA TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CA DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):288
                                                            Entropy (8bit):4.913241133684606
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoFt28oF+3vLjoF+3v6mjo++3vnFDoAkvn:4EnLB383yte+3vs+3v6/3v9dmn
                                                            MD5:83FC7EBA68C3727F7C13C8EEAF79823F
                                                            SHA1:81C27F9B97F5F5190F7189230535EC09CD228158
                                                            SHA-256:290CA6EB74BAEAC4E2420D0755D148849F89EE87E37860F25CBB7B8AFA3EDCBC
                                                            SHA-512:35DA46558A246D7B3FAB02208001CE986E2E6DD88D6318AF743F4E81CA6920471D1425BB009A7476A79E7F61E1353C027B765331CD8EFA07A9E884DCB73F2195
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CH DATE_FORMAT "%d. %m. %y".. ::msgcat::mcset fr_CH TIME_FORMAT "%T".. ::msgcat::mcset fr_CH TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CH DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1188
                                                            Entropy (8bit):4.314271783103334
                                                            Encrypted:false
                                                            SSDEEP:24:4aR835k0CM/hlrXa754pD73/tKSx54pbIK5f2CA:43W05rXUa173/VadDA
                                                            MD5:67D137E5D853DB61A4B4264871E793F7
                                                            SHA1:4280E7F662DE792175AF8B4C93874F035F716F0F
                                                            SHA-256:880806867ACABD9B39E3029A5ADD26B690CC5709082D43B0959EBA725EA07AB5
                                                            SHA-512:C27B745143539D3E6D94BB754DCA35065CDE9B1AA6EE038D47F658175CFACC20236124D38BE5BBB03CAF8F613BD748C43CB8DFCC9234E915D18B5A477BAEF94E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga DAYS_OF_WEEK_ABBREV [list \.. "Domh"\.. "Luan"\.. "M\u00e1irt"\.. "C\u00e9ad"\.. "D\u00e9ar"\.. "Aoine"\.. "Sath"].. ::msgcat::mcset ga DAYS_OF_WEEK_FULL [list \.. "D\u00e9 Domhnaigh"\.. "D\u00e9 Luain"\.. "D\u00e9 M\u00e1irt"\.. "D\u00e9 C\u00e9adaoin"\.. "D\u00e9ardaoin"\.. "D\u00e9 hAoine"\.. "D\u00e9 Sathairn"].. ::msgcat::mcset ga MONTHS_ABBREV [list \.. "Ean"\.. "Feabh"\.. "M\u00e1rta"\.. "Aib"\.. "Beal"\.. "Meith"\.. "I\u00fail"\.. "L\u00fan"\.. "MF\u00f3mh"\.. "DF\u00f3mh"\.. "Samh"\.. "Noll"\.. ""].. ::msgcat::mcset ga MONTHS_FULL [list \.. "Ean\u00e1ir"\.. "Feabhra"\.. "M\u00e1rta"\.. "Aibre\u00e1n"\.. "M\u00ed na Bealtaine"\.. "Meith"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.824539027053997
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xobHAygDobHAqo+3vLjobHAqo+3v6mjobHAy9+3vnFDoAkv:4EnLB383p23vy3v6a3v9dmn
                                                            MD5:C27BD7F317AAADB380F4C38AE0D2FDA6
                                                            SHA1:79870A0E68AA0A9B301414EDC21889F83BB81E40
                                                            SHA-256:3F9615C617D3CDBC1E127B3EFEE785B0CB5E92E17B7DABAC80DA2BEAF076362C
                                                            SHA-512:3605B9A914284CF1D3CC90DF2F21A86C0472AEE59800942DC93D842C7AE164E1DA72813787F163DC80B72269D2C391953ABAD6A8B72CCF069BEE96D418A173E9
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga_IE DATE_FORMAT "%d.%m.%y".. ::msgcat::mcset ga_IE TIME_FORMAT "%T".. ::msgcat::mcset ga_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset ga_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):997
                                                            Entropy (8bit):4.120890519790248
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83okzalCcPdJ5rK8yzMY4JlV1ZDqqIkFo8w:43JkPj9K8y4HHZLIQtw
                                                            MD5:A3D098C1A47E380F7C25233A52FBDE38
                                                            SHA1:C97E4EAA9E7A7F99950F422B93C57134B532C639
                                                            SHA-256:34D61B49DBF9584893051FFB458D6DE9E7E2E7774AC0011F70C4DD4184EBA81C
                                                            SHA-512:4687AB3D2FAA65FED90678EBC08C074959E93A9FEFAF3D61EEE39DB08FD200CB57C0DDB4DDBF6451FE1EF5E07EA976EDEF830769FF403CE51734129CEF24DA9F
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Lun"\.. "Mar"\.. "M\u00e9r"\.. "Xov"\.. "Ven"\.. "S\u00e1b"].. ::msgcat::mcset gl DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Luns"\.. "Martes"\.. "M\u00e9rcores"\.. "Xoves"\.. "Venres"\.. "S\u00e1bado"].. ::msgcat::mcset gl MONTHS_ABBREV [list \.. "Xan"\.. "Feb"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Xu\u00f1"\.. "Xul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset gl MONTHS_FULL [list \.. "Xaneiro"\.. "Febreiro"\.. "Marzo"\.. "Abril"\.. "Maio"\.. "Xu\u00f1o"\.. "Xullo"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Decembro"\.. ""]..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.886176304042503
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoPhkgMoPxsF3v6ay/5oPhk9+3vR6HyFvn:4EnLB383WrfK3v6ay/WJ3voSVn
                                                            MD5:78B9163C5E8E5E7049CBF91D1A5889A4
                                                            SHA1:F2F07AF3D79D61C8E0C73B13E2CA8266E10E396B
                                                            SHA-256:B5688CA07D713227B713655877710258CD503617E8DF79293A971649E3134F05
                                                            SHA-512:E86074B687670542CFA097C94D150292E1A73C9F231E92CD84386580A446569CC6F8F5817F46ED64A1D00F95D59F6F1F5D4B961DF3C8335938D83F3517794353
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl_ES DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gl_ES TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gl_ES DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1084
                                                            Entropy (8bit):4.213672208102291
                                                            Encrypted:false
                                                            SSDEEP:24:4aR832vTXAC2/fS5JfaCroeLaCAQbSm5qJe1:43QTXs32zrf
                                                            MD5:518FC3964D50854081FB79189A42D3E7
                                                            SHA1:59392F16CD56E3E6A685F78974D539FB3A972B98
                                                            SHA-256:404795F2C88D0038F9ED0B5120A251D26EDF8B236E1B1698BC71ACD4DC75AC45
                                                            SHA-512:E5C88CAB8741D631938CEC2E0959C0FE26685C395F5F9F4F1B5C9E146E84D23D897CD7A823AB46D4B62C590AE15EC76B87EB59308ACFB1BB6F61398890B43622
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv DAYS_OF_WEEK_ABBREV [list \.. "Jed"\.. "Jel"\.. "Jem"\.. "Jerc"\.. "Jerd"\.. "Jeh"\.. "Jes"].. ::msgcat::mcset gv DAYS_OF_WEEK_FULL [list \.. "Jedoonee"\.. "Jelhein"\.. "Jemayrt"\.. "Jercean"\.. "Jerdein"\.. "Jeheiney"\.. "Jesarn"].. ::msgcat::mcset gv MONTHS_ABBREV [list \.. "J-guer"\.. "T-arree"\.. "Mayrnt"\.. "Avrril"\.. "Boaldyn"\.. "M-souree"\.. "J-souree"\.. "Luanistyn"\.. "M-fouyir"\.. "J-fouyir"\.. "M.Houney"\.. "M.Nollick"\.. ""].. ::msgcat::mcset gv MONTHS_FULL [list \.. "Jerrey-geuree"\.. "Toshiaght-arree"\.. "Mayrnt"\.. "Averil"\.. "Boaldyn"\.. "Mean-souree"\.. "Jerrey-souree"\.. "Luanistyn"\.. "Mean-fouyir"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.936566750568767
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoQbtvMoQLE3v6ay/5oQbto+3vR6HyFvn:4EnLB383PbtvALE3v6ay/PbtF3voSVn
                                                            MD5:0B6BE614EF5F5F25A30D2D33701A9F94
                                                            SHA1:65800FBD73D9DAE550E04E1D818A6B9D1AEF86FE
                                                            SHA-256:86CABF3B9360C0E686CC4CBEB843E971C28BC6D35210ED378B54EB58CC41F3D5
                                                            SHA-512:376D21B38DA49A8F7C2983F2B808FD55AC9F6383BC66DF28DB99DBF61FDC9FFF8CD20F077EC3ED873EF47F0F613BDD9AD02DFFB1CB51F9A36715C7FC798C3B70
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gv_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gv_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1990
                                                            Entropy (8bit):4.298934047406144
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83Y71LCLxL0eCLbCLKCLaCLXL7CLB0p1dLGCoCLU5LT5Gv5LJ9p5LnLEHLGCh:43sl7KqpU/nNbhbOezd2ICn
                                                            MD5:A0E60036EB17208A449AAFC3AAAE622C
                                                            SHA1:9D7479BA85FBB00A2DF2B61F4ED2CBEA8F1EC8C3
                                                            SHA-256:787DA79AF58872BF45AB09E3B6A920A4496B5BD8A4F3C7F010CF013EC2E8EFE0
                                                            SHA-512:46D12C14B5736E5EA97EB728BF58999E9D7C2CF910D8F5AFA3F5D3A86329ABF41A3E2BEBD81EE4EF64BEA0DC173B77A9FE12471C1BD9D768ED552A55B3B80213
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset he DAYS_OF_WEEK_ABBREV [list \.. "\u05d0"\.. "\u05d1"\.. "\u05d2"\.. "\u05d3"\.. "\u05d4"\.. "\u05d5"\.. "\u05e9"].. ::msgcat::mcset he DAYS_OF_WEEK_FULL [list \.. "\u05d9\u05d5\u05dd \u05e8\u05d0\u05e9\u05d5\u05df"\.. "\u05d9\u05d5\u05dd \u05e9\u05e0\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05dc\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e8\u05d1\u05d9\u05e2\u05d9"\.. "\u05d9\u05d5\u05dd \u05d7\u05de\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05d9\u05e9\u05d9"\.. "\u05e9\u05d1\u05ea"].. ::msgcat::mcset he MONTHS_ABBREV [list \.. "\u05d9\u05e0\u05d5"\.. "\u05e4\u05d1\u05e8"\.. "\u05de\u05e8\u05e5"\.. "\u05d0\u05e4\u05e8"\.. "\u05de\u05d0\u05d9"\.. "\u05d9\u05d5\u05e0"\.. "\u05d9\u05d5\u05dc"\.. "\u05d0\u05d5\u05d2"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1777
                                                            Entropy (8bit):4.2117128941697715
                                                            Encrypted:false
                                                            SSDEEP:48:438n4kALqrU1fbokQTbWqrU1fbokQTw38:28OD86D8gM
                                                            MD5:4219A929E27308ADC04A9F368F063F38
                                                            SHA1:FA728EEBA8751F4CE032ED32AECFDE124D1B68E2
                                                            SHA-256:192F4A8E77E1627712F85533C9896EF6A040157C7BD56DF3A4A7FA56AD6746C2
                                                            SHA-512:223B137AC1FC15908F5541067736EF3A29493549B963393EB78660036A82982E57CFC4AD09CBD33D32A5187FF9F4ACFB5F83A0C974702434B7FAD1B2539B7F76
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0932\u0935\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset hi MONTHS_ABBREV [list \.. "\u091c\u0928\u0935\u0930\u0940"\.. "\u092b\u093c\u0930\u0935\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u0905\u092a\u094d\u0930\u0947\u0932"\.. "\u092e\u0908"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u093e\u0908"\.. "\u0905\u0917\u0938\u094d\u0924"\.. "\u0938\u093f\u0924\u092e\u094d\u092c\u0930"\.. "\u0905\u0915\u094d\u091f\u0942\u092c\u0930"\.. "\u0928\u0935\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.9286948144352865
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xocv+IZoz3v6ry/5oco+3v+6f6HyFvn:4EnLB383Jvlg3v6ry/JF3vmSVn
                                                            MD5:1C1E1484EA0286175FADCB90937C9F34
                                                            SHA1:5CA1BF19021D529CB3B3A308EFFFCA7E4D073640
                                                            SHA-256:5A3BF0DD61BFB5A2BF75E96B11E0E3528FFAB720A0BF1923853606F8CAF0E76D
                                                            SHA-512:F9A43E1E18ADB6DC6B18BEDC3303A99F514DF6CA54F12100989F734233012D7D60216116915351CCACC12F6942795BF8F3BBD26B15A86E88101067D64BEE54F5
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset hi_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset hi_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1171
                                                            Entropy (8bit):4.36311224714184
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83dVX79VIE9bLTWnh7rT+5dPcdvgrNv5KvOA1:43kmrQ7n+odIrJ6OS
                                                            MD5:906963A3AD09EAC781B35C190B77484E
                                                            SHA1:E5AA49DA9C4987EAFA839115F84612426EB8615E
                                                            SHA-256:105A9180BC5D23738183374FA0EA8DD80484BF3947E1432E515BDC2913C017D9
                                                            SHA-512:557BD1C8306750D09215D9774069A52C7D60E03DE2DF39FF909A8F658AB0565739D127E24ACDC96F736C69A71BEFA30B8A30BB489C7B7FDEA85386C802166349
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hr DAYS_OF_WEEK_ABBREV [list \.. "ned"\.. "pon"\.. "uto"\.. "sri"\.. "\u010det"\.. "pet"\.. "sub"].. ::msgcat::mcset hr DAYS_OF_WEEK_FULL [list \.. "nedjelja"\.. "ponedjeljak"\.. "utorak"\.. "srijeda"\.. "\u010detvrtak"\.. "petak"\.. "subota"].. ::msgcat::mcset hr MONTHS_ABBREV [list \.. "sij"\.. "vel"\.. "o\u017eu"\.. "tra"\.. "svi"\.. "lip"\.. "srp"\.. "kol"\.. "ruj"\.. "lis"\.. "stu"\.. "pro"\.. ""].. ::msgcat::mcset hr MONTHS_FULL [list \.. "sije\u010danj"\.. "velja\u010da"\.. "o\u017eujak"\.. "travanj"\.. "svibanj"\.. "lipanj"\.. "srpanj"\.. "kolovoz"\.. "rujan"\.. "listopad"\.. "studeni"\.. "prosinac"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1381
                                                            Entropy (8bit):4.511450677731002
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83IFb7ZTmKrkAYm2LZyyApLDV2uZi5WF+shHUTyvtsv+:43C3ZTmKQAyZyyAp0BotK+
                                                            MD5:E398158EE1CD49CB5286D9642D4A61DD
                                                            SHA1:A93A588B0ADD198C067C4BB070DC1E5170E6E208
                                                            SHA-256:993475532F89E1EA7214ADB265294040862305612D680CFF01DD20615B731CCC
                                                            SHA-512:9E5791FB97110FE5F7A1F49FF2ED8801A05E49D5B9AF579474C0081073D2B40ECFFE6E4EB5B61F12B1995FDCC0A557CB572E5E116F951FD286A6254253DAEC01
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hu DAYS_OF_WEEK_ABBREV [list \.. "V"\.. "H"\.. "K"\.. "Sze"\.. "Cs"\.. "P"\.. "Szo"].. ::msgcat::mcset hu DAYS_OF_WEEK_FULL [list \.. "vas\u00e1rnap"\.. "h\u00e9tf\u0151"\.. "kedd"\.. "szerda"\.. "cs\u00fct\u00f6rt\u00f6k"\.. "p\u00e9ntek"\.. "szombat"].. ::msgcat::mcset hu MONTHS_ABBREV [list \.. "jan."\.. "febr."\.. "m\u00e1rc."\.. "\u00e1pr."\.. "m\u00e1j."\.. "j\u00fan."\.. "j\u00fal."\.. "aug."\.. "szept."\.. "okt."\.. "nov."\.. "dec."\.. ""].. ::msgcat::mcset hu MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "m\u00e1rcius"\.. "\u00e1prilis"\.. "m\u00e1jus"\.. "j\u00fanius"\.. "j\u00falius"\.. "augusztus"\.. "szeptembe
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):961
                                                            Entropy (8bit):4.02166638427728
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83dcTcWKutdXaMmEfc2ftdT2dHblWZ0VT:43dQrKutdntdI8g
                                                            MD5:191ACF2E8A8F10A1360B283D42886382
                                                            SHA1:EE2C00D021381EA638B6CE3F395DEA5F8491ED9B
                                                            SHA-256:41C0C3D3B4491E9B36E719466503EFCD325175CB7824C4A5055CB113D347BE0F
                                                            SHA-512:29BC4F7D3FAE7DE392B175FEA76138FA823B7D9D0B051A19A73F7D36D51DE34E0D0C7C129867307ABF51FC92E70853C15BD96B8484AD21EAB0A8EB83B0411E03
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id DAYS_OF_WEEK_ABBREV [list \.. "Min"\.. "Sen"\.. "Sel"\.. "Rab"\.. "Kam"\.. "Jum"\.. "Sab"].. ::msgcat::mcset id DAYS_OF_WEEK_FULL [list \.. "Minggu"\.. "Senin"\.. "Selasa"\.. "Rabu"\.. "Kamis"\.. "Jumat"\.. "Sabtu"].. ::msgcat::mcset id MONTHS_ABBREV [list \.. "Jan"\.. "Peb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Agu"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset id MONTHS_FULL [list \.. "Januari"\.. "Pebruari"\.. "Maret"\.. "April"\.. "Mei"\.. "Juni"\.. "Juli"\.. "Agustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""]..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.904408530699153
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo0kGMo0F/W3v6ay/5o0kT+3vR6HyFvn:4EnLB383wG33v6ay/wK3voSVn
                                                            MD5:FEB4D50576BF3E11A0A40FD29ABE35A7
                                                            SHA1:8CEAA187C8AA5EC101743060A877D039850964CA
                                                            SHA-256:BA7FC0C0452D3E482DB6E19BDF512CACED639BA72B92ED8F66D80B52FEA11AC0
                                                            SHA-512:8B5D18E3D6628F369FB387C8EF08CC80000E0CBE500972958F4AD75F1C2F0DD6058F9777BD7DD0D7C26E7ECAA65E5071E2BF51B560973E88637942116C7576FB
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id_ID DATE_FORMAT "%d %B %Y".. ::msgcat::mcset id_ID TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset id_ID DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1305
                                                            Entropy (8bit):4.457417703528286
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83XVhVTeMVHGPbfXSmWzaZlfFxUQbW1U6ZY95n123etvmv3eTn:43Xz0b/uzaZtXUMw8n
                                                            MD5:ACF0452D5BB6D36A40061D2B0AF4D7A6
                                                            SHA1:9DF4D88F1962A672EFBDDE524550F7A5D02D446D
                                                            SHA-256:778BE3D6BFE2DFFB64FF1AFB9EC8351A3343B314CF93A68E8F7FD1073EE122BB
                                                            SHA-512:34CC02D7D28B5E161ED10250C214375561FD3D00979BFB8BCF3DB72A81BD9B7C225301528B400F7C54D8B6379F772EB6477D5D03F2CF7DC4DD19D22AEEC151B5
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset is DAYS_OF_WEEK_ABBREV [list \.. "sun."\.. "m\u00e1n."\.. "\u00feri."\.. "mi\u00f0."\.. "fim."\.. "f\u00f6s."\.. "lau."].. ::msgcat::mcset is DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nudagur"\.. "\u00feri\u00f0judagur"\.. "mi\u00f0vikudagur"\.. "fimmtudagur"\.. "f\u00f6studagur"\.. "laugardagur"].. ::msgcat::mcset is MONTHS_ABBREV [list \.. "jan."\.. "feb."\.. "mar."\.. "apr."\.. "ma\u00ed"\.. "j\u00fan."\.. "j\u00fal."\.. "\u00e1g\u00fa."\.. "sep."\.. "okt."\.. "n\u00f3v."\.. "des."\.. ""].. ::msgcat::mcset is MONTHS_FULL [list \.. "jan\u00faar"\.. "febr\u00faar"\.. "mars"\.. "apr\u00edl"\.. "ma\u00ed"\.. "j\u00fan\u00ed"\.. "j\u00fal\
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1294
                                                            Entropy (8bit):4.282101355195382
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83JYEVI2vfYpQjAOnhWBIIsmdC2lkOKk+Z+FoPJ6G3vesvY:43JZVB8eAOnh4IzR2+J6G/eKY
                                                            MD5:3354A6FC06C298E33AA14163929E56EB
                                                            SHA1:C3005370DAE8A266AE21F7E2B871AEA5A656A155
                                                            SHA-256:1D72170B9F9028A237364F7CD7EA8B48BD4770E61922205CE862300103B13DE5
                                                            SHA-512:58B64D4F5827CA2A1BF2DDFD1F7EFDDBBD46709A6A9B7277E8EB386D80043A87ADDE2B3D5A49A934E8EB8F797BD735FADA1D22AD3DD856FFE9507F71B9E45CBA
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mer"\.. "gio"\.. "ven"\.. "sab"].. ::msgcat::mcset it DAYS_OF_WEEK_FULL [list \.. "domenica"\.. "luned\u00ec"\.. "marted\u00ec"\.. "mercoled\u00ec"\.. "gioved\u00ec"\.. "venerd\u00ec"\.. "sabato"].. ::msgcat::mcset it MONTHS_ABBREV [list \.. "gen"\.. "feb"\.. "mar"\.. "apr"\.. "mag"\.. "giu"\.. "lug"\.. "ago"\.. "set"\.. "ott"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset it MONTHS_FULL [list \.. "gennaio"\.. "febbraio"\.. "marzo"\.. "aprile"\.. "maggio"\.. "giugno"\.. "luglio"\.. "agosto"\.. "settembre"\.. "ottobre"\.. "novembre"\.. "dicembre"\.. "
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):250
                                                            Entropy (8bit):4.8982877714191035
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoi5jL/oyJ+3v1oia+3vjLtAsvn:4EnLB383b3F+3vV3v3tnn
                                                            MD5:E4400C16406A46C2880250522BED2EDE
                                                            SHA1:787A04037A355FF845025B8865335EB938280BFB
                                                            SHA-256:24B5F303F5C7AF6F63FDC23ADB4D713087AE74B6D18C117D787AF03374C5F57E
                                                            SHA-512:3551DEEF0EAAC66042143F77F2F4DD9154764F35BD624DAB3C9F0F59F3489CA39CE34BC2A69BC5BFBB1926C6F5C39D74A806ECB1A47F6B374101071957FD417B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it_CH DATE_FORMAT "%e. %B %Y".. ::msgcat::mcset it_CH TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset it_CH DATE_TIME_FORMAT "%e. %B %Y %H:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1689
                                                            Entropy (8bit):4.951012555106795
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83Gl84OCtnbf3wvtMwvLv4GTwhvevTwSoXghGhD6h:43FULWttbdEVoES8gshD6h
                                                            MD5:11FBE427747012444AEEAFD6134034A4
                                                            SHA1:58C72C432053264EAE6335D6CC93C5FFA33C42B8
                                                            SHA-256:2B6D15A191437F1B84FA7023E34153B61E6BF1DE1452EA921E9CCBBE5D4BEB1C
                                                            SHA-512:4F993BDF5D50D6D9F7410C83D226FEF30BA8C989F9977A7025C36BE22CEECCD6C68CDD6AFC5C9CE3D700559C4EDC619042E14DD88EE7583B9D5AA66F0268FD23
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ja DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u6708"\.. "\u706b"\.. "\u6c34"\.. "\u6728"\.. "\u91d1"\.. "\u571f"].. ::msgcat::mcset ja DAYS_OF_WEEK_FULL [list \.. "\u65e5\u66dc\u65e5"\.. "\u6708\u66dc\u65e5"\.. "\u706b\u66dc\u65e5"\.. "\u6c34\u66dc\u65e5"\.. "\u6728\u66dc\u65e5"\.. "\u91d1\u66dc\u65e5"\.. "\u571f\u66dc\u65e5"].. ::msgcat::mcset ja MONTHS_FULL [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"].. ::msgcat::mcset ja BCE "\u7d00\u5143\u524d".. ::msgcat::mcset ja CE "\u897f\u66a6".. ::msgcat::mcset ja AM "\u5348\u524d".. ::msgcat::mcset ja PM "\u5348\u5f8c".. ::ms
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1025
                                                            Entropy (8bit):4.097746630492712
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83E7XIE/OWbjH3Tw2PzJrIsmZ5maAXaMHPB:43WlrraA/vB
                                                            MD5:2F79804667D6F8C77BB188D59EF5F3DF
                                                            SHA1:10950ECA798F24A7C405B3E18B559CCC0C056EC1
                                                            SHA-256:96FF17F1CFF976E4E204D3616D1EFCED4D0F907C5E6A0F04B4536CB4AD1190C9
                                                            SHA-512:1B8ADC3B7FF920F8F53A17BFCC7EA24A0F8E276A42E5C63F9880DAE9B74E12716DD12DB647A80A9D99294449146C643EC58A33B03681AA4FA26A5FBC508C248C
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl DAYS_OF_WEEK_ABBREV [list \.. "sab"\.. "ata"\.. "mar"\.. "pin"\.. "sis"\.. "tal"\.. "arf"].. ::msgcat::mcset kl DAYS_OF_WEEK_FULL [list \.. "sabaat"\.. "ataasinngorneq"\.. "marlunngorneq"\.. "pingasunngorneq"\.. "sisamanngorneq"\.. "tallimanngorneq"\.. "arfininngorneq"].. ::msgcat::mcset kl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset kl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "martsi"\.. "aprili"\.. "maji"\.. "juni"\.. "juli"\.. "augustusi"\.. "septemberi"\.. "oktoberi"\.. "novemberi"\.. "dece
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.882476709336307
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoEpb53FuoEpLE3vLjoEpLE3v6mjoEpba+3vnFDoAkvn:4EnLB383jF3Fyw3vxw3v6A/3v9dmn
                                                            MD5:255830678C8724E65C05A7E020E68B5B
                                                            SHA1:0AEA48AB0439C04F92B5CA9A3B5182718B7F116B
                                                            SHA-256:3027CFE9EBD2172CEFC15C025786CAD47A6E2894BF0474AFC1B0C341E70202AA
                                                            SHA-512:99039FFA7269DD136D1693121E261DB5586E86EC401D2B1EB8FB1D13A9A7F1E514D9FC941B838286B986C02ED281828ED67E59002D837E350A64F4832340516A
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl_GL DATE_FORMAT "%d %b %Y".. ::msgcat::mcset kl_GL TIME_FORMAT "%T".. ::msgcat::mcset kl_GL TIME_FORMAT_12 "%T".. ::msgcat::mcset kl_GL DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1621
                                                            Entropy (8bit):4.612163420716489
                                                            Encrypted:false
                                                            SSDEEP:48:43fMlylslXlslxl1hVuqLGuqqntH4xUyw9:2fKYqVq3f
                                                            MD5:CCB2C2254D3FA3025183DB7E010CAD66
                                                            SHA1:510BBB6A9162F2EF908E6561CC714848C2EA74CA
                                                            SHA-256:EF6FB319C398EEA79B3A951319F831F3B186D556565D17D738E5F9B4B77570F2
                                                            SHA-512:A0264565899BD1B0783ADC0388F893CCE713ADB23BDD63907CF092A74ACB4F7D3BE09DA29801E9C11A7B08CB1706E3771C598ACED351A0FCCBF4EBBD7871148D
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko DAYS_OF_WEEK_ABBREV [list \.. "\uc77c"\.. "\uc6d4"\.. "\ud654"\.. "\uc218"\.. "\ubaa9"\.. "\uae08"\.. "\ud1a0"].. ::msgcat::mcset ko DAYS_OF_WEEK_FULL [list \.. "\uc77c\uc694\uc77c"\.. "\uc6d4\uc694\uc77c"\.. "\ud654\uc694\uc77c"\.. "\uc218\uc694\uc77c"\.. "\ubaa9\uc694\uc77c"\.. "\uae08\uc694\uc77c"\.. "\ud1a0\uc694\uc77c"].. ::msgcat::mcset ko MONTHS_ABBREV [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\.. "7\uc6d4"\.. "8\uc6d4"\.. "9\uc6d4"\.. "10\uc6d4"\.. "11\uc6d4"\.. "12\uc6d4"\.. ""].. ::msgcat::mcset ko MONTHS_FULL [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):354
                                                            Entropy (8bit):5.058233326545794
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo56SFZhjAo56m5Ys5o56TGMovBo56a/W3v6mfKo56TT+3+:4EnLB383g62vjV6m5Ysg6TG26a+3v6oo
                                                            MD5:58CA45CE26AF8ECA729BA72898BB633D
                                                            SHA1:CBBEDB7370890A1DB65080A359A9A5C164B525D5
                                                            SHA-256:4CAC8FB43D290A63A4D3215F22228B358AB4FA174F08712DD6C5B64C5E485071
                                                            SHA-512:48CCBD3F7B96D0998B6D1A1F8D7FE2B4B070BB5B8809FABE0A38209AEAF2E95E098292A5B9B5F0954E7729708A2173D32AAD70B6C0F336DB1E9BFA2968E6A56B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko_KR BCE "\uae30\uc6d0\uc804".. ::msgcat::mcset ko_KR CE "\uc11c\uae30".. ::msgcat::mcset ko_KR DATE_FORMAT "%Y.%m.%d".. ::msgcat::mcset ko_KR TIME_FORMAT_12 "%P %l:%M:%S".. ::msgcat::mcset ko_KR DATE_TIME_FORMAT "%Y.%m.%d %P %l:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1997
                                                            Entropy (8bit):4.202940482570495
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83cm48Vc7VczMmDNVcYVcR0prdSmS68FeDJVcYVcR0prdSmS68FeuT:4354a+0prjS68mq0prjS68pT
                                                            MD5:67FA08F588A3B44D67E42EC1025013BC
                                                            SHA1:6895FEF0476DE0349895DB052B335AC46636B23A
                                                            SHA-256:9D215E31A39FED45B3657144E5F73C942E59E500036CE16B1FFF201FD6358595
                                                            SHA-512:4C2708BD9DD98320D3133EEFFD19A8018F49A36AB8348DB7C0B0287ADB4C052D3EFAD3686C8E46E0520F3CE27F361978272BA8752EB04E5A7BC07780398480DB
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok DAYS_OF_WEEK_FULL [list \.. "\u0906\u0926\u093f\u0924\u094d\u092f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset kok MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):260
                                                            Entropy (8bit):4.904340548436718
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo5VsNv+IZo5VsU3v6ry/5o5VsNo+3v+6f6HyFvn:4EnLB383gVsNvlAVsU3v6ry/gVsNF3vj
                                                            MD5:0AA20289A63BA3A14DCFED75EED980DE
                                                            SHA1:2B76013593D886B0724D82849FD1840B20922902
                                                            SHA-256:644F2B6D4BA27AF14891B781DEF60F708A9F18FC2F73566649B631A6DEA3EF09
                                                            SHA-512:6E13E0DC8BFD2ABE0D04B0BC098C40972F088F8D3D6ACA00338B17473ABC6F69840A88EC0C965C493B4270DEC777A0EA2D762BC33044EFE7030E437604EE201B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset kok_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset kok_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1013
                                                            Entropy (8bit):4.060027087416375
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83no1UwRlw4MAwBdc//3rpF6HFoot8:43vglHM7MTCHFs
                                                            MD5:CCEC7B77DCA1F6A406311FC43EE57030
                                                            SHA1:4ED329BB09A8F7C67F8984CD790E9B6819DE6F00
                                                            SHA-256:EAB468AC5BF1833D4F8CD658789413D4A46CAD16B63FB9B906CFF6DC9EA26251
                                                            SHA-512:4EFF6E49CC479A1BF0CEEAE256A1FAE7D4AE7D0ACE23CD87851471EC96BB5AF580C58A142E1B6CE72BC8B6BFF946A38801E681443B7DD9527A1DEB6E7EDD7D22
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw DAYS_OF_WEEK_ABBREV [list \.. "Sul"\.. "Lun"\.. "Mth"\.. "Mhr"\.. "Yow"\.. "Gwe"\.. "Sad"].. ::msgcat::mcset kw DAYS_OF_WEEK_FULL [list \.. "De Sul"\.. "De Lun"\.. "De Merth"\.. "De Merher"\.. "De Yow"\.. "De Gwener"\.. "De Sadorn"].. ::msgcat::mcset kw MONTHS_ABBREV [list \.. "Gen"\.. "Whe"\.. "Mer"\.. "Ebr"\.. "Me"\.. "Evn"\.. "Gor"\.. "Est"\.. "Gwn"\.. "Hed"\.. "Du"\.. "Kev"\.. ""].. ::msgcat::mcset kw MONTHS_FULL [list \.. "Mys Genver"\.. "Mys Whevrel"\.. "Mys Merth"\.. "Mys Ebrel"\.. "Mys Me"\.. "Mys Evan"\.. "Mys Gortheren"\.. "Mye Est"\.. "Mys Gwyngala"\.. "Mys Hedra"\.. "Mys Du"\.. "Mys Kevardhu"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.959913054070712
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoh6AvMoh633v6ay/5oh6Ao+3vR6HyFvn:4EnLB38346AvR633v6ay/46AF3voSVn
                                                            MD5:18E8576F63B978F1AFEF15AC57B44FBF
                                                            SHA1:D50EB90944FF81E3CBFF942B16C1874EB7EA2562
                                                            SHA-256:EDAC14D929D1C6559EC46E9B460F8F44A189B78FB915F2D641104549CBD94188
                                                            SHA-512:F3DE5EE77BB889DA1353F9C9A1811083AB28BBEE4B7D6C8782F38B1AE44CF77565371A0E18F7E2BACD7EF590BC1215CA3E41AF929A15F60B3E85F6099A4CF378
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset kw_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset kw_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1307
                                                            Entropy (8bit):4.506235846178408
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83iHYuAMLzHYCaNu3d3nT15T31FhAlDgK/YrDZ/6Qz2C9kGPCveksvc:43iHFnHuUd3/T3xM/+SQCC9kGPEekKc
                                                            MD5:D4EC2E96995E0EB263F338DD16CC4F8D
                                                            SHA1:7ED86175489B1AE3CA5C0E8D42969F951C895D6B
                                                            SHA-256:855B652FCC8066BA45C7DC8DBFD3807D1B4759EA8D71C523567F47BF445D1DE6
                                                            SHA-512:A55E0D759A22360FF6668CEFAFFB812BABB316C447ADDB1FD5CDBC06AE1DA2E891E09952D073164C013AD9BF4184614102E7ADA553EEEFB2BBA26208B79B277F
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lt DAYS_OF_WEEK_ABBREV [list \.. "Sk"\.. "Pr"\.. "An"\.. "Tr"\.. "Kt"\.. "Pn"\.. "\u0160t"].. ::msgcat::mcset lt DAYS_OF_WEEK_FULL [list \.. "Sekmadienis"\.. "Pirmadienis"\.. "Antradienis"\.. "Tre\u010diadienis"\.. "Ketvirtadienis"\.. "Penktadienis"\.. "\u0160e\u0161tadienis"].. ::msgcat::mcset lt MONTHS_ABBREV [list \.. "Sau"\.. "Vas"\.. "Kov"\.. "Bal"\.. "Geg"\.. "Bir"\.. "Lie"\.. "Rgp"\.. "Rgs"\.. "Spa"\.. "Lap"\.. "Grd"\.. ""].. ::msgcat::mcset lt MONTHS_FULL [list \.. "Sausio"\.. "Vasario"\.. "Kovo"\.. "Baland\u017eio"\.. "Gegu\u017e\u0117s"\.. "Bir\u017eelio"\.. "Liepos"\.. "Rugpj\u016b\u010dio"\.. "Rugs\u0117jo"\.. "Spa
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1271
                                                            Entropy (8bit):4.460631492946299
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83Amshb4mZdA7nl9kMmfpK269rkbi5vWm0W9ARivirXsv05vkn:430bHA7XRr95QWQQgaKkn
                                                            MD5:554ED2CAFD25F5F82DA54AE057F4BA98
                                                            SHA1:E25CDF0F9C4B523B5B05408E7820F7B4F627D19E
                                                            SHA-256:7E90D2008B220DB19C796C7107AD69D263B8AC8C7BDDFB879230699D978E9A0A
                                                            SHA-512:612201CCD64A51EC943921196D8C74D8BCA3AB3E35B0C9E91AE7F3A6B36F4F255AA9ADB3A254EC03629B01BD221B0B3F8CC4DFBFAC1F1718775E81CAD188AA86
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lv DAYS_OF_WEEK_ABBREV [list \.. "Sv"\.. "P"\.. "O"\.. "T"\.. "C"\.. "Pk"\.. "S"].. ::msgcat::mcset lv DAYS_OF_WEEK_FULL [list \.. "sv\u0113tdiena"\.. "pirmdiena"\.. "otrdiena"\.. "tre\u0161diena"\.. "ceturdien"\.. "piektdiena"\.. "sestdiena"].. ::msgcat::mcset lv MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maijs"\.. "J\u016bn"\.. "J\u016bl"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset lv MONTHS_FULL [list \.. "janv\u0101ris"\.. "febru\u0101ris"\.. "marts"\.. "apr\u012blis"\.. "maijs"\.. "j\u016bnijs"\.. "j\u016blijs"\.. "augusts"\.. "septembris"\.. "oktobris"\.. "novembris"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2157
                                                            Entropy (8bit):4.299300188052441
                                                            Encrypted:false
                                                            SSDEEP:48:4389QMsGqdQfRQPjQmofqJp9sk5BstSpWQiQ3QJQ5QL39I0QRQTQ8Ql4J8W:2W8SMq+9sWINi2Kc9I0+gXF
                                                            MD5:888014F13A82511ABEF99497A753BFC3
                                                            SHA1:7F4231BEDE191370B37E8B917B6AD8829D15CA7D
                                                            SHA-256:4C0EB07F0FCB36DD12A3F7EDD6531616611ABF62BF7705B5A37CC59098221D5D
                                                            SHA-512:D748127CC615584901D35B6492EC566448B6C4DA6363858B5145921E9CD09490355CF4315F0F7A8542AA12790CD3432011A643A3A8F74B0119DB0DCE19FD68A4
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0435\u0434."\.. "\u043f\u043e\u043d."\.. "\u0432\u0442."\.. "\u0441\u0440\u0435."\.. "\u0447\u0435\u0442."\.. "\u043f\u0435\u0442."\.. "\u0441\u0430\u0431."].. ::msgcat::mcset mk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0435\u043b\u0430"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0440\u0442\u043e\u043a"\.. "\u043f\u0435\u0442\u043e\u043a"\.. "\u0441\u0430\u0431\u043e\u0442\u0430"].. ::msgcat::mcset mk MONTHS_ABBREV [list \.. "\u0458\u0430\u043d."\.. "\u0444\u0435\u0432."\.. "\u043c\u0430\u0440."\.. "\u0430\u043f\u0440."\.. "\u043c\u0430\u0458."\.. "\u0458\u0443\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1846
                                                            Entropy (8bit):4.220147808639664
                                                            Encrypted:false
                                                            SSDEEP:24:4aR833cXh48Vc7VczfVczPmzNVcYVcR0prdSmS68FezUVcYVcR0prdSmS68FeoV:43K4S+0prjS68Yh0prjS68nV
                                                            MD5:07F99E0A05083B10F80A4D6867163B23
                                                            SHA1:B6036C7DA8043E3401583D03831E7A4BF755D93D
                                                            SHA-256:AE873BF5484EACBBE179913D43451BE53378FA701B5D81594D052266B8A09AF0
                                                            SHA-512:3A032C81B8FBFEE6EB66C1538CBD16329A1B393E4684B4E9B3FBCDD6344CE8AD34FA699F76EF953B3EB597D8E253345F54C2E92E7A43611C721038BCC2471EA2
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset mr MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\u091f\u0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.89440333975705
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoGNv+IZoGU3v6ry/5oGNo+3v+6f6HyFvn:4EnLB383Zvlw3v6ry/ZF3vmSVn
                                                            MD5:67368E8A5715860BABD44E54A168192F
                                                            SHA1:7790D4B4B28FE5E38AB11CD037FFB826A8EB77FD
                                                            SHA-256:B7B1D379355A1D278E13EF557A887A662E84FB6A9B62B8E19A27927926270EF9
                                                            SHA-512:E95C90CFFA7CC4E61026FC328A4AA0BEE6A54A0061BA0B9459F9F0F4B008DD36F81BC9B8D8B964FA051FCEAB7FECE6D107CD456B3FD01A83B4900ECC3A0BCFA4
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset mr_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset mr_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):957
                                                            Entropy (8bit):4.018924167342869
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383Zm/aufodZmt+JHEA7UVRosmAL/7Idzr43xRRosuL1PJHWZ6tHhHjv:4aR83ZsauSHJkA7umE/72UD21PJWZ0hT
                                                            MD5:7E6A943B7D82404F61BDBD95682073CD
                                                            SHA1:B96DBB1738F293D2842FDCEDF2DEF13004F77A8D
                                                            SHA-256:970B2F3ECC04980FCC2F9531CA6CE2BF36BC12942CB614BF70313B4CB0508985
                                                            SHA-512:12F5A5F7A170EE79D1F4398E96FF2DE84472027C5B5003DE7E86F46713E3F0997439E2EBA03FFB7DB611F0CE0E06EB149F5BD08ED2AA0409DB8348867487FFFD
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms DAYS_OF_WEEK_ABBREV [list \.. "Aha"\.. "Isn"\.. "Sei"\.. "Rab"\.. "Kha"\.. "Jum"\.. "Sab"].. ::msgcat::mcset ms DAYS_OF_WEEK_FULL [list \.. "Ahad"\.. "Isnin"\.. "Selasa"\.. "Rahu"\.. "Khamis"\.. "Jumaat"\.. "Sabtu"].. ::msgcat::mcset ms MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mac"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ogos"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dis"\.. ""].. ::msgcat::mcset ms MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Mac"\.. "April"\.. "Mei"\.. "Jun"\.. "Julai"\.. "Ogos"\.. "September"\.. "Oktober"\.. "November"\.. "Disember"\.. ""]..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):265
                                                            Entropy (8bit):4.818053174805798
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoChFfluoChF+3v6xyFjoCh++3vflm68vn:4EnLB383xPflwe3v6gZl3vflm6+n
                                                            MD5:A02F11BE0DF920E63E7A3ACCE746E32D
                                                            SHA1:4A8B1EF1A6F8A5FD022042D6E009A01E4B0FEBD3
                                                            SHA-256:F5B859D8DD2A2B5F756E39B0DFEB26B95878D2F54BA3CE46C56F0F26CF2B554B
                                                            SHA-512:5F9AF8C89F491CB4C158ED73EA4CF32E6A83CF44A94DA6FE1A962C58199BF2348530F3DEFA0C6F433BA3ADEF81AE9B3884F30CD7A841B159D52F9F21008B4F92
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms_MY DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset ms_MY TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ms_MY DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):717
                                                            Entropy (8bit):4.55153350337982
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383VYmxWHWog4QUbxMmAMMiGZu+3v6ay/GK3vZsSVn:4aR83VYsxonQ2MmVVGRvjCGsvGSV
                                                            MD5:D8BBEC2F8935054E6081BB5E4AE8F7E3
                                                            SHA1:33FE6D51A284B8760BC6F442329B10374F506BDA
                                                            SHA-256:7DBC4E82D82FDE8CDF522FA10E082289D46B0C1A4A7D7A5FA83FF116677F052B
                                                            SHA-512:BF39C75DD6B3625897D7D44AC253AF5656CA21D0B394F78611584E2606CBC419C4A02353542D23393BEBCCF0CB4D861CDECD61AD89339F78C0260E966B495777
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mt DAYS_OF_WEEK_ABBREV [list \.. "\u0126ad"\.. "Tne"\.. "Tli"\.. "Erb"\.. "\u0126am"\.. "\u0120im"].. ::msgcat::mcset mt MONTHS_ABBREV [list \.. "Jan"\.. "Fra"\.. "Mar"\.. "Apr"\.. "Mej"\.. "\u0120un"\.. "Lul"\.. "Awi"\.. "Set"\.. "Ott"\.. "Nov"].. ::msgcat::mcset mt BCE "QK".. ::msgcat::mcset mt CE "".. ::msgcat::mcset mt DATE_FORMAT "%A, %e ta %B, %Y".. ::msgcat::mcset mt TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset mt DATE_TIME_FORMAT "%A, %e ta %B, %Y %l:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1209
                                                            Entropy (8bit):4.313626715960843
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83B0tSYuZrIsmYmPAxyIQ4HU92W16EL3Tvav31:43qhuZrIPAt04yTcF
                                                            MD5:42D02C3CAF28BE4994F27CEF5A183AB7
                                                            SHA1:DC411E8AC12C3D588AB2F3A3C95A75D8689AD402
                                                            SHA-256:534C5DACEF12F818FAF4ED806997A559F95D591F1B6236B0C30B07A107DD13F3
                                                            SHA-512:0BE27572106324FE2B6CDFF4513500DE7582AD1ABEF451FFC62B2050D3875A149DDDB66451E1B3F5BA9216268E9998D2A1C1E8343BBB9EF97947DA054B82818E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nb DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset nb DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset nb MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nb MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nb BC
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1129
                                                            Entropy (8bit):4.235969198645435
                                                            Encrypted:false
                                                            SSDEEP:24:4aR837Ed+RxRMZZsmUmnZAEEHM92WFU5vtrvs:43AAHRMZZPnZALsCtt7s
                                                            MD5:B9B949794203D204628D4DBEA29587AE
                                                            SHA1:1642D8040144469B5C359E80693E68036F87B849
                                                            SHA-256:9E2FE3851CF13EC79A9B10A09B01CEB0A26044AE0DC90A4E00BE57745E854C79
                                                            SHA-512:0CCCCF6D61423CEE0389C3BA1A8E94F2B092C53465D1937F5595AF91E46DD38B318D6C7EE3D88B89F32BFB952C0D55E0E67B46D7DF306ECA6690E283ADEB2CB9
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl DAYS_OF_WEEK_ABBREV [list \.. "zo"\.. "ma"\.. "di"\.. "wo"\.. "do"\.. "vr"\.. "za"].. ::msgcat::mcset nl DAYS_OF_WEEK_FULL [list \.. "zondag"\.. "maandag"\.. "dinsdag"\.. "woensdag"\.. "donderdag"\.. "vrijdag"\.. "zaterdag"].. ::msgcat::mcset nl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mrt"\.. "apr"\.. "mei"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset nl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "maart"\.. "april"\.. "mei"\.. "juni"\.. "juli"\.. "augustus"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset nl DATE_FORM
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.865165930946383
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xo4gPPdjog9X3vLjog9X3v6mjo49+3vnFDoAkvn:4EnLB3835gHdPF3vjF3v64I3v9dmn
                                                            MD5:3261F397ED0291368FF1881E7BA08ECE
                                                            SHA1:7147ABB62034EB152B1FED9246A533535F07372C
                                                            SHA-256:77A69DD60D171B321512B14794E75A66FF753410C007997B310790D86E09B057
                                                            SHA-512:C1526F454FA594DAD056B056F76F01D8B2AB713D04EB2A3643416B8E741B248CC94E000BAEE5B0F60436B88B1216FB1DE7F7C3FA456D4A4FBDE24F97C3B739B8
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl_BE DATE_FORMAT "%d-%m-%y".. ::msgcat::mcset nl_BE TIME_FORMAT "%T".. ::msgcat::mcset nl_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset nl_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1200
                                                            Entropy (8bit):4.282788574144479
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83tCtrJwuQrIsmYmLAxyIQ4HU92W1W4/3Hv+v31:434suQrILAt0EafIF
                                                            MD5:985E97517C2BF37719A618F575DF392C
                                                            SHA1:65BC07FC3A955300ED09B7485F90AEC18CBAD43F
                                                            SHA-256:06FA2D6D8C59D0B8EAC2EDE5AB0DDB8B6E095D1A023B1966FCE3B65916FA14FB
                                                            SHA-512:75BC14DBAD147A98D32D2AF0BE0BE50F115BB9C3BBE283B53977B9F264A055734B30F6B1C4EEE9686F1874D178C535111731C92D495B7D370FB17213B65C9A40
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nn DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "m\u00e5"\.. "ty"\.. "on"\.. "to"\.. "fr"\.. "lau"].. ::msgcat::mcset nn DAYS_OF_WEEK_FULL [list \.. "sundag"\.. "m\u00e5ndag"\.. "tysdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "laurdag"].. ::msgcat::mcset nn MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nn MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nn BCE "f.Kr."
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1263
                                                            Entropy (8bit):4.459506202908786
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83lUj0ORGgIzdW6RDYKG7FwRc0ypvOvX:43+HMg2W6RDYnFwRc0ydYX
                                                            MD5:79AB7C13AA3833A1DAEADDB1144CCE55
                                                            SHA1:C01ABC2F16549CAEC6B081448B2CBA88A680E250
                                                            SHA-256:61462C325DB0065352D8155307F949869862A86CAC67AD7BB6703F57A7FA2FF3
                                                            SHA-512:79EB696164FDDD9B121558C2780E54E295FF2DC4D8E87A0DE507B4F2925612721A98FF5010199CB68CF894ACA7A07884E9E02F3DC1E078D241431E3DC884C0A1
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pl DAYS_OF_WEEK_ABBREV [list \.. "N"\.. "Pn"\.. "Wt"\.. "\u015ar"\.. "Cz"\.. "Pt"\.. "So"].. ::msgcat::mcset pl DAYS_OF_WEEK_FULL [list \.. "niedziela"\.. "poniedzia\u0142ek"\.. "wtorek"\.. "\u015broda"\.. "czwartek"\.. "pi\u0105tek"\.. "sobota"].. ::msgcat::mcset pl MONTHS_ABBREV [list \.. "sty"\.. "lut"\.. "mar"\.. "kwi"\.. "maj"\.. "cze"\.. "lip"\.. "sie"\.. "wrz"\.. "pa\u017a"\.. "lis"\.. "gru"\.. ""].. ::msgcat::mcset pl MONTHS_FULL [list \.. "stycze\u0144"\.. "luty"\.. "marzec"\.. "kwiecie\u0144"\.. "maj"\.. "czerwiec"\.. "lipiec"\.. "sierpie\u0144"\.. "wrzesie\u0144"\.. "pa\u017adziernik"\.. "listopad"\..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1177
                                                            Entropy (8bit):4.394980756969744
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83CYkjBc1yHYJt//0/I31YMY47flV7YaqgCyt9Fo8g6Gtvt76svi:43C5LHcNnxJ9Ltg6Gpt76Ki
                                                            MD5:8F53B3571DD29E12BD33349CFA32F28F
                                                            SHA1:C125E059B8BFE5FECD482D1A1DA50B8678872BF6
                                                            SHA-256:6F6EEEDDCF232BDCB952592A144810CED44A1CBB4BCC2C062D5F98D441505380
                                                            SHA-512:5CD7E7097B720E5399795126A71348816CBA697FD8F14160779E982ADAB00D5994978E2F9445785B0DE62F6F14232278AD1A65BC53730CA58D676B057F0BC406
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Seg"\.. "Ter"\.. "Qua"\.. "Qui"\.. "Sex"\.. "S\u00e1b"].. ::msgcat::mcset pt DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Segunda-feira"\.. "Ter\u00e7a-feira"\.. "Quarta-feira"\.. "Quinta-feira"\.. "Sexta-feira"\.. "S\u00e1bado"].. ::msgcat::mcset pt MONTHS_ABBREV [list \.. "Jan"\.. "Fev"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset pt MONTHS_FULL [list \.. "Janeiro"\.. "Fevereiro"\.. "Mar\u00e7o"\.. "Abril"\.. "Maio"\.. "Junho"\.. "Julho"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Dezembro"
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):286
                                                            Entropy (8bit):4.8608779725401785
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xofm6GPWWjofAW3vLjofAW3v6mjofm6T+3vnFDoAkvn:4EnLB383+NGdg93vk93v6fNK3v9dmn
                                                            MD5:A2626EA95C2480FEA68906AE6A1F6993
                                                            SHA1:A0592902337C00FC2E70B1DFB3A42453A86535BB
                                                            SHA-256:320BE7D5B730091E6FA35F196314737261C8E154577DCF6AC8C2057D44394AD7
                                                            SHA-512:9801A87D024565676D4F3EAF0702C213E59FC2B6719D8BE95C19C9ED53FC43487F65F5408378B401A2B4C2BD4E2E391C2D848CA87739A6082AB7766EC6B9EFE1
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt_BR DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset pt_BR TIME_FORMAT "%T".. ::msgcat::mcset pt_BR TIME_FORMAT_12 "%T".. ::msgcat::mcset pt_BR DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1224
                                                            Entropy (8bit):4.350784108088039
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83coPUMSeZmkTMm41icpK+7ZVoImEcVUCWdvHvWIn:43lPHFmkm1iMVoxEc+CWZPWIn
                                                            MD5:F6575EC17966320106FF7ABDFB3186E2
                                                            SHA1:68C6B72D664FDA27450FCE8B5734AB627CE825D7
                                                            SHA-256:25ED6AC7A353E23B954B98611AE3B7E56BDCF2B0CB0DB358253CFB8BEBBB831C
                                                            SHA-512:E564543231922A17C898419545BFA65E5E31FE9F005FDD201B735CFDE08E96FB3B98349C2A7959E29CA8F7E6934B0C4C6DE6B5E67209D0DD9A7746DFEBF037B3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ro DAYS_OF_WEEK_ABBREV [list \.. "D"\.. "L"\.. "Ma"\.. "Mi"\.. "J"\.. "V"\.. "S"].. ::msgcat::mcset ro DAYS_OF_WEEK_FULL [list \.. "duminic\u0103"\.. "luni"\.. "mar\u0163i"\.. "miercuri"\.. "joi"\.. "vineri"\.. "s\u00eemb\u0103t\u0103"].. ::msgcat::mcset ro MONTHS_ABBREV [list \.. "Ian"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mai"\.. "Iun"\.. "Iul"\.. "Aug"\.. "Sep"\.. "Oct"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset ro MONTHS_FULL [list \.. "ianuarie"\.. "februarie"\.. "martie"\.. "aprilie"\.. "mai"\.. "iunie"\.. "iulie"\.. "august"\.. "septembrie"\.. "octombrie"\.. "noiembrie"\.. "decembrie"\.. ""].. ::msgcat:
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2091
                                                            Entropy (8bit):4.2886524607041006
                                                            Encrypted:false
                                                            SSDEEP:48:43D+pQ7keidQfRQPgQHB81Z/sFIAZSQWQXQrQxJQjQRnQBFQiWftkWt:26pgkeoSnpjA4tMYiJcCMFmVRt
                                                            MD5:9F1C8DD58550558977821FD500E7C0E0
                                                            SHA1:EFDD809BC2872A5BE0E353D31BE6D7D72E4B829C
                                                            SHA-256:BB35BB6F07BAEF72C329EC3E95D6527A2736070EE2FFE5DE227E1FF0332390F8
                                                            SHA-512:AA3C5C40AE9D342F8287958355C3321CF60566AD3E84E3D18D782FC022A998DA275506A61010A65D2E7D7578F2919C47C63AB0BA63A38800AA48D4B88ACE54D3
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru DAYS_OF_WEEK_ABBREV [list \.. "\u0412\u0441"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset ru DAYS_OF_WEEK_FULL [list \.. "\u0432\u043e\u0441\u043a\u0440\u0435\u0441\u0435\u043d\u044c\u0435"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440\u0433"\.. "\u043f\u044f\u0442\u043d\u0438\u0446\u0430"\.. "\u0441\u0443\u0431\u0431\u043e\u0442\u0430"].. ::msgcat::mcset ru MONTHS_ABBREV [list \.. "\u044f\u043d\u0432"\.. "\u0444\u0435\u0432"\.. "\u043c\u0430\u0440"\.. "\u0430\u043f\u0440"\.. "\u043c\u0430\u0439"\.. "\u0438\u044e\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):248
                                                            Entropy (8bit):4.9420431225061
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoVAgWIZoVY9X3vtfNrsoVA9+3vW6Q9vn:4EnLB383SFWIyaX3vtNl/3vWHNn
                                                            MD5:DC98D88964650E302BE97FDB3B33326E
                                                            SHA1:1DDDCC4265D7B980B867FEE674BEF2FD87D823F7
                                                            SHA-256:13E4E79A0ED82034BADE0CFF8DEF5DE1222F6968108AD710662BDB7DAF36D7E1
                                                            SHA-512:F3B9D528C529DD520FEDA3C20ED354E521C5B3C29F3317E15B7939CE06A3D67554D34DD6E54FE038585E46C560C604A1FD7E7F84914086B5994D52CE2C9E99CE
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru_UA DATE_FORMAT "%d.%m.%Y".. ::msgcat::mcset ru_UA TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset ru_UA DATE_TIME_FORMAT "%d.%m.%Y %k:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1212
                                                            Entropy (8bit):4.359036493565628
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83/YIXo4YY0dD6kMm7fX2NaSIvZdHZgHZ/IxvaGWxvtl9svWTN:43rLTR44/yWltOWB
                                                            MD5:E297221FA73BD78577B398BC7D061D21
                                                            SHA1:F2A6B456272F913A9E97C495CEE73AC774C90FA1
                                                            SHA-256:E65D6E5E837DF0A2DF0DB77BCE45334BBC27EFFF9023C37119E75D49932D9D6C
                                                            SHA-512:AB9DDAE7CB21193C7753041F0B88CF2D40987E7E604B47816219458D217F084AA4EBF36719E22AAB3FD71A271D9F956ADC353182991903D7ADE8C8F00F6B2F9B
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sh DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Uto"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sub"].. ::msgcat::mcset sh DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljak"\.. "Utorak"\.. "Sreda"\.. "\u010cetvrtak"\.. "Petak"\.. "Subota"].. ::msgcat::mcset sh MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maj"\.. "Jun"\.. "Jul"\.. "Avg"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset sh MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "Mart"\.. "April"\.. "Maj"\.. "Juni"\.. "Juli"\.. "Avgust"\.. "Septembar"\.. "Oktobar"\.. "Novembar"\.. "Decembar"\.. ""].. ::msgcat::mcset sh BC
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1255
                                                            Entropy (8bit):4.4043119723436135
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83c46o40u3rIsmJIcm93ApLDVb2IcU95WFGEXF3eUCvtz/v3e6:43c3ow3rF93Ap7tEXFREtznp
                                                            MD5:24DA40901D907D35195CC1B3A675EBC7
                                                            SHA1:8AF31248F06FADA5CFB0D83A940CFF5CE70E2577
                                                            SHA-256:976813F6C53C9BEBBF976B0F560FD7FC5E4EC4C574D7E1CD31F9A4056765CB7A
                                                            SHA-512:A9BC6AAFE9AEEDFD1E483E54A2D27871A09ADD6807D8F90410CD2BB82A91BA9DF435652EC9A7C3AD0A080D7F153CA848BB47DAD3936BA30E4AEFF3C474C433CC
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sk DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "Ut"\.. "St"\.. "\u0160t"\.. "Pa"\.. "So"].. ::msgcat::mcset sk DAYS_OF_WEEK_FULL [list \.. "Nede\u013ee"\.. "Pondelok"\.. "Utorok"\.. "Streda"\.. "\u0160tvrtok"\.. "Piatok"\.. "Sobota"].. ::msgcat::mcset sk MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sk MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "marec"\.. "apr\u00edl"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "august"\.. "september"\.. "okt\u00f3ber"\.. "november"\.. "decem
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):4.333705818952628
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83MIXpC9opYuGS/BrIsmZ5hv1yAxyIVjd392WFThENvt0vJoO:43fXYujZrqyApYJtyR
                                                            MD5:CB76F54CBE0D1AAE8BA956B4C51CBD2A
                                                            SHA1:C1F78375EDB0BD2504553E33B2024C0C63FDB1B2
                                                            SHA-256:11A6264676DBED87E4F718075127E32E107854F35F141642454F484984084486
                                                            SHA-512:69964348FF08DE6EEB5E3DD61057FF0DF5441105EB7BEE7FB7E9AC5E26DCC164E3C7C011CA5CD7BC5B97A7872532331C97CCBC80563F6C5A3548014BFA8BEF16
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sl DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Tor"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sob"].. ::msgcat::mcset sl DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljek"\.. "Torek"\.. "Sreda"\.. "\u010cetrtek"\.. "Petek"\.. "Sobota"].. ::msgcat::mcset sl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "avg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sl MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marec"\.. "april"\.. "maj"\.. "junij"\.. "julij"\.. "avgust"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset sl B
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1321
                                                            Entropy (8bit):4.408176575111904
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83F7ONQEwXwjjTlVoSEh76W/X+WZQJ4hv+H6v2V:43NwjPEwl4VQ8q
                                                            MD5:E606F620F03EC0FBDBE6551601299C5F
                                                            SHA1:0B50AB679E8D90D8E7319BCADAC426E004594D3B
                                                            SHA-256:1F4EFD78F6B45B65F73F09B2F52FC13C2A7C4138DCB7664804878D197B6EBDF9
                                                            SHA-512:08AF2B51EB7111E334ADDA3A03F9A8816C104E9742B523EC363FB5131A3DF73D298A8DDCD573D23C23C65CCFD2B8898DF75AE3D4F04BF80744044FB6BAB5EC0A
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sq DAYS_OF_WEEK_ABBREV [list \.. "Die"\.. "H\u00ebn"\.. "Mar"\.. "M\u00ebr"\.. "Enj"\.. "Pre"\.. "Sht"].. ::msgcat::mcset sq DAYS_OF_WEEK_FULL [list \.. "e diel"\.. "e h\u00ebn\u00eb"\.. "e mart\u00eb"\.. "e m\u00ebrkur\u00eb"\.. "e enjte"\.. "e premte"\.. "e shtun\u00eb"].. ::msgcat::mcset sq MONTHS_ABBREV [list \.. "Jan"\.. "Shk"\.. "Mar"\.. "Pri"\.. "Maj"\.. "Qer"\.. "Kor"\.. "Gsh"\.. "Sht"\.. "Tet"\.. "N\u00ebn"\.. "Dhj"\.. ""].. ::msgcat::mcset sq MONTHS_FULL [list \.. "janar"\.. "shkurt"\.. "mars"\.. "prill"\.. "maj"\.. "qershor"\.. "korrik"\.. "gusht"\.. "shtator"\.. "tetor"\.. "n\u00ebntor"\.. "dhjetor"\.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2087
                                                            Entropy (8bit):4.307749748884122
                                                            Encrypted:false
                                                            SSDEEP:48:43ilQTSBQrQP9QenzMKSFD9NI/QiNQEQrQL1KKYjU5rtAx:2I5EyLMKSFZNIYMzYMKKiqW
                                                            MD5:BF363AB60B57F6D8FDCDBFD230A28DDF
                                                            SHA1:6375CBA0A2197DA7E65BEE45C42F02C4F0B9142D
                                                            SHA-256:FA00A7B22C9941F6C2B893F22B703DCB159CA2F2E4005FD6A74A632AEB786BFA
                                                            SHA-512:91AD8085EF321A5A0E4D2ED204940CB66E8E230BBEDE59A8A07D1CEED9155FCC6B075A1FCC44AE834C1FEEEB3A59256C4310684C5AC453D4C50DFABD88469814
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sr DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0435\u0434"\.. "\u041f\u043e\u043d"\.. "\u0423\u0442\u043e"\.. "\u0421\u0440\u0435"\.. "\u0427\u0435\u0442"\.. "\u041f\u0435\u0442"\.. "\u0421\u0443\u0431"].. ::msgcat::mcset sr DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u0459\u0430"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u0459\u0430\u043a"\.. "\u0423\u0442\u043e\u0440\u0430\u043a"\.. "\u0421\u0440\u0435\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u0440\u0442\u0430\u043a"\.. "\u041f\u0435\u0442\u0430\u043a"\.. "\u0421\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset sr MONTHS_ABBREV [list \.. "\u0408\u0430\u043d"\.. "\u0424\u0435\u0431"\.. "\u041c\u0430\u0440"\.. "\u0410\u043f\u0440"\.. "\u041c\u0430\u0458"\.. "\u0408\u0443\u043d"\.. "\
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1219
                                                            Entropy (8bit):4.3542418837714285
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83qoLt6yLQoAusrIsmZ5m4AcjTHX92WFfjr4MvBvX:43ZLxQNusrr4Aw3Jkq1X
                                                            MD5:3B5C3FFA0829768470BDA1B46D882060
                                                            SHA1:C96799036EC5CCDE799A6B50CD7748908935A2F3
                                                            SHA-256:483916B51BD7E071E88F9EC36AAF3E08FEA823991532F832DE491C6C40B55A9F
                                                            SHA-512:684FA249123878AA7F856DF0FD3B0D9F041113CFEA8EEFA47D0E1948DA23694330BF0D62BA896A3891CD559C16CAE9330BF31508F530AC003D2929D5FD9246D8
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sv DAYS_OF_WEEK_ABBREV [list \.. "s\u00f6"\.. "m\u00e5"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f6"].. ::msgcat::mcset sv DAYS_OF_WEEK_FULL [list \.. "s\u00f6ndag"\.. "m\u00e5ndag"\.. "tisdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f6rdag"].. ::msgcat::mcset sv MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sv MONTHS_FULL [list \.. "januari"\.. "februari"\.. "mars"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "augusti"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat:
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1040
                                                            Entropy (8bit):4.108744949579904
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383A4mScvhkzoR4mtuWckRkoay3UVxMmALfG7IdzVJ633xRCPLMYMvYo76u:4aR83/Shkz1uckO76kMmEf62qOTdMvvn
                                                            MD5:5774860C8AEECBD48F1502E616158CAB
                                                            SHA1:DE7059713EA7913A0C79F5386833CE2BCAD2CFD7
                                                            SHA-256:1DA068C9AA02EF14A2440758C6040D632D96044A20EC501DBB9E40D8592E0E7F
                                                            SHA-512:91E69222DDF55E9E0E389DB77D7A0F2E082351DC3FB34A1A2C1E350E4187E8BB940F6C2EDE1B8651159C2787AA0BE4D7268F33F7A82CAED03514FCE462530408
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sw DAYS_OF_WEEK_ABBREV [list \.. "Jpi"\.. "Jtt"\.. "Jnn"\.. "Jtn"\.. "Alh"\.. "Iju"\.. "Jmo"].. ::msgcat::mcset sw DAYS_OF_WEEK_FULL [list \.. "Jumapili"\.. "Jumatatu"\.. "Jumanne"\.. "Jumatano"\.. "Alhamisi"\.. "Ijumaa"\.. "Jumamosi"].. ::msgcat::mcset sw MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset sw MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Machi"\.. "Aprili"\.. "Mei"\.. "Juni"\.. "Julai"\.. "Agosti"\.. "Septemba"\.. "Oktoba"\.. "Novemba"\.. "Desemba"\.. ""].. ::msgcat::mcset sw BCE "
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1874
                                                            Entropy (8bit):4.080580566597515
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83AI0xnJdnQhmHlHYPKtul+eOPfIxyH5ztUSLu8tptLtrl+eOPfIxyH5ztUSU:43N0dQmHlHYPKtu1HxMtr1Hx/
                                                            MD5:85288236C3997302EA26D7403BBA2C15
                                                            SHA1:05AB389CC4DCF17B37BFF6ED1ECD58D6E9850A01
                                                            SHA-256:AEFDC4255890D5B3FFE5CEE1B457B7D711283C2287ABA644155C10956012F6C1
                                                            SHA-512:8E389D46606176EE14B8356153095B49C9426B80139B672A620F488891F091D1A272D4FB116775900E4AB4EC84DDDEBD8D6AF81AC672F14F148F2BFC638D2B10
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta DAYS_OF_WEEK_FULL [list \.. "\u0b9e\u0bbe\u0baf\u0bbf\u0bb1\u0bc1"\.. "\u0ba4\u0bbf\u0b99\u0bcd\u0b95\u0bb3\u0bcd"\.. "\u0b9a\u0bc6\u0bb5\u0bcd\u0bb5\u0bbe\u0baf\u0bcd"\.. "\u0baa\u0bc1\u0ba4\u0ba9\u0bcd"\.. "\u0bb5\u0bbf\u0baf\u0bbe\u0bb4\u0ba9\u0bcd"\.. "\u0bb5\u0bc6\u0bb3\u0bcd\u0bb3\u0bbf"\.. "\u0b9a\u0ba9\u0bbf"].. ::msgcat::mcset ta MONTHS_ABBREV [list \.. "\u0b9c\u0ba9\u0bb5\u0bb0\u0bbf"\.. "\u0baa\u0bc6\u0baa\u0bcd\u0bb0\u0bb5\u0bb0\u0bbf"\.. "\u0bae\u0bbe\u0bb0\u0bcd\u0b9a\u0bcd"\.. "\u0b8f\u0baa\u0bcd\u0bb0\u0bb2\u0bcd"\.. "\u0bae\u0bc7"\.. "\u0b9c\u0bc2\u0ba9\u0bcd"\.. "\u0b9c\u0bc2\u0bb2\u0bc8"\.. "\u0b86\u0b95\u0bb8\u0bcd\u0b9f\u0bcd"\.. "\u0b9a\u0bc6\u0baa\u0bcd\u0b9f\u0bae\u0bcd\u0baa\u0bb0\u0bcd"\.. "\u0b85\u0b95\u0bcd\u0b9f\u0bcb\u0baa\u0bb0\u0bcd"\.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):257
                                                            Entropy (8bit):4.863003494480733
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xosDv+IZosK3v6ry/5osDo+3v+6f6HyFvn:4EnLB383ZDvl5K3v6ry/ZDF3vmSVn
                                                            MD5:CF078352DA0507C767F04E31D6C14296
                                                            SHA1:0A9B1255BD85B60D3620AE61370F54748AB7A182
                                                            SHA-256:4978A193076DE56944236F7F1DCECACFF739536DFB3DBEFC1F7FE2B97A8AEAF4
                                                            SHA-512:6FFC85B2A8DECB373EC76B1CD1A9459A30E443319F2C8DB9BBE6E115F5EFEEBAC314D4E8BE996EA55EE46466C6F6057A73078F5FDCF1C4CBAF1A270E45BC10C0
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset ta_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset ta_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2149
                                                            Entropy (8bit):4.097884113767283
                                                            Encrypted:false
                                                            SSDEEP:48:43a8mxI9k3JR0UjjFbPcniLHVktjjFbPcniLHVM:2a8v9k3JdbPcIidbPcIG
                                                            MD5:61E4CB2AAD66285E9113071057F39C35
                                                            SHA1:A2BD21090859669C4B6A875E077825381B7E2702
                                                            SHA-256:9E96C7123100234A7018533764502985A208F2EB3314F5B6332D46016725A63F
                                                            SHA-512:589A2D65508B07B5FDEDA883F71A4B496B25458CA1ECE7C4D4F5DAE82EB683DA82C8E21E57D63A235AB600174C9D362A746B2E27BAA6E3ADE1B7BD9D6000BE27
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te DAYS_OF_WEEK_ABBREV [list \.. "\u0c06\u0c26\u0c3f"\.. "\u0c38\u0c4b\u0c2e"\.. "\u0c2e\u0c02\u0c17\u0c33"\.. "\u0c2c\u0c41\u0c27"\.. "\u0c17\u0c41\u0c30\u0c41"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30"\.. "\u0c36\u0c28\u0c3f"].. ::msgcat::mcset te DAYS_OF_WEEK_FULL [list \.. "\u0c06\u0c26\u0c3f\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c38\u0c4b\u0c2e\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2e\u0c02\u0c17\u0c33\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2c\u0c41\u0c27\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c17\u0c41\u0c30\u0c41\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c28\u0c3f\u0c35\u0c3e\u0c30\u0c02"].. ::msgcat::mcset te MONTHS_ABBREV [list \.. "\u0c1c\u0c28\u0c35\u0c30\u0c3f"\.. "\u0c2b\u0c3f\u0c2c\u0c4d\u0c30\u0c35\u0c30\u0c3f"\.. "\u0c2e\u0c3
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):419
                                                            Entropy (8bit):5.058324650031252
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383LjZWsn0sHjoD0savzda3v6ry/ZF3vMSVn:4aR833Z1nnHjoDnavzd8vSCZNvMSV
                                                            MD5:BCA040A356E7E8CC597EFB9B9065F8E1
                                                            SHA1:ADAF7EC8C2035BC06E168D3F1BD7F39277E9273F
                                                            SHA-256:B110FEEDDA21ECCEFA624BEF8E1476E9F221FB253880AC370967AE4D0237CA7A
                                                            SHA-512:D408ECE8CF89FB23B45420D3CBA7655EEE713498210889A84EE25D3417360705546D97028EAAAA47764B6E9B0A3699669B98C0A53861A38E0DFCB9F3B8A47BEC
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te_IN AM "\u0c2a\u0c42\u0c30\u0c4d\u0c35\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN PM "\u0c05\u0c2a\u0c30\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset te_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset te_IN DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2359
                                                            Entropy (8bit):4.382796122808316
                                                            Encrypted:false
                                                            SSDEEP:48:439X4QKPQJecQwFA0P9JmDsxQ7KHfWkD2CQM0DnWxFDzCYmdrtVP:29ohCi1028QmHfIC4jW3DmHB
                                                            MD5:7F61E1EA256D78948189EF07119663CD
                                                            SHA1:6867E9780049FACE9984B7788B6F362B8D1AD718
                                                            SHA-256:48BEAF693BF5B6EED15234DB0D375B97E6D576A749E9048420C153E6CAFC0259
                                                            SHA-512:F3E24E0B41A7D722AC2FA0E429A2DCB1CCB5BAECC9912ADF6AF79C51366EA1AC9F931F0F44F068F3CEE6873516E6223CC5E7616CF523B1DFB9E528DE4D58454A
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset th DAYS_OF_WEEK_ABBREV [list \.. "\u0e2d\u0e32."\.. "\u0e08."\.. "\u0e2d."\.. "\u0e1e."\.. "\u0e1e\u0e24."\.. "\u0e28."\.. "\u0e2a."].. ::msgcat::mcset th DAYS_OF_WEEK_FULL [list \.. "\u0e27\u0e31\u0e19\u0e2d\u0e32\u0e17\u0e34\u0e15\u0e22\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e08\u0e31\u0e19\u0e17\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e2d\u0e31\u0e07\u0e04\u0e32\u0e23"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e38\u0e18"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e1a\u0e14\u0e35"\.. "\u0e27\u0e31\u0e19\u0e28\u0e38\u0e01\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e40\u0e2a\u0e32\u0e23\u0e4c"].. ::msgcat::mcset th MONTHS_ABBREV [list \.. "\u0e21.\u0e04."\.. "\u0e01.\u0e1e."\.. "\u0e21\u0e35.\u0e04."\.. "\u0e40\u0e21.\u0e22."\.. "\u0e1e.\u0e04."\.. "\u0e21\u0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1183
                                                            Entropy (8bit):4.390397293529625
                                                            Encrypted:false
                                                            SSDEEP:24:4aR83ZVUflVdq4qTr6dyX59508THHCh5LbQgWiNv9KvWIn:43PXTtbTngLhWiJGWIn
                                                            MD5:017F0F989BD5DBBF25E7C797CE09C45C
                                                            SHA1:162922DBD55A31A74410375A36EE7BC50E092BDD
                                                            SHA-256:4B85B345D6C43F7257C6849A60A492397FD5FD9D82DF3A2252189D7A1ECCBB64
                                                            SHA-512:73B6CF395753D863330687404E8A584CB08B81A8CC456DCE7BB49C4EA15EA19E45E3CC1E1367E10915DE14AC6258383289BCFEF55AD2768A50889DF390D37EF9
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset tr DAYS_OF_WEEK_ABBREV [list \.. "Paz"\.. "Pzt"\.. "Sal"\.. "\u00c7ar"\.. "Per"\.. "Cum"\.. "Cmt"].. ::msgcat::mcset tr DAYS_OF_WEEK_FULL [list \.. "Pazar"\.. "Pazartesi"\.. "Sal\u0131"\.. "\u00c7ar\u015famba"\.. "Per\u015fembe"\.. "Cuma"\.. "Cumartesi"].. ::msgcat::mcset tr MONTHS_ABBREV [list \.. "Oca"\.. "\u015eub"\.. "Mar"\.. "Nis"\.. "May"\.. "Haz"\.. "Tem"\.. "A\u011fu"\.. "Eyl"\.. "Eki"\.. "Kas"\.. "Ara"\.. ""].. ::msgcat::mcset tr MONTHS_FULL [list \.. "Ocak"\.. "\u015eubat"\.. "Mart"\.. "Nisan"\.. "May\u0131s"\.. "Haziran"\.. "Temmuz"\.. "A\u011fustos"\.. "Eyl\u00fcl"\.. "Ekim"\.. "Kas\u0131m"\.. "Aral\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2165
                                                            Entropy (8bit):4.289021158621493
                                                            Encrypted:false
                                                            SSDEEP:48:436yILgoQjQPxUIkgPDRQnQ0vVQbC1iQwweIgWQDIoZI7QDI3QbI87IVQnIzQ7mh:2AzUe3EhV8CYgrbH7z3fLVTzgn5jyX7p
                                                            MD5:323BD95809A44B0BADC71AD36E5F095B
                                                            SHA1:44F6016873CA955D27545C56CCD24BDB06A83C43
                                                            SHA-256:7093DA7E39CEB6D3F51EB6CF1CCA2D7F3680ED7B8FE4A5F0CECEEF6BEB21AC77
                                                            SHA-512:DB16E0E2D17CE47673DE781A7171944C14CC550FB8EB0920C05B979E4D067E36DF0B59B8BFA81F82D8FCE1FFDDAAD2755E68BFE5BC0DBB11E8716A4D18BA5F7E
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset uk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0432\u0442"\.. "\u0441\u0440"\.. "\u0447\u0442"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset uk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0456\u043b\u044f"\.. "\u043f\u043e\u043d\u0435\u0434\u0456\u043b\u043e\u043a"\.. "\u0432\u0456\u0432\u0442\u043e\u0440\u043e\u043a"\.. "\u0441\u0435\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440"\.. "\u043f'\u044f\u0442\u043d\u0438\u0446\u044f"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset uk MONTHS_ABBREV [list \.. "\u0441\u0456\u0447"\.. "\u043b\u044e\u0442"\.. "\u0431\u0435\u0440"\.. "\u043a\u0432\u0456\u0442"\.. "\u0442\u0440\u0430\u0432"\.. "\u0447\u0435\u0440\u0432"\.. "\u043b
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1471
                                                            Entropy (8bit):4.44729506678271
                                                            Encrypted:false
                                                            SSDEEP:24:4aR836DNjYTP55YAUy2tJ9kyzW68IFYHMBSW1K1pvhv1O:43dbYJyC8ySgI1dV1O
                                                            MD5:C127F54C462917D3B3EEF5F29F612138
                                                            SHA1:B1D9A67F856D93F98524C6372B352EA0DE1B9CD3
                                                            SHA-256:E9B7AECD456F1D2288604C982B5DED0DCF71DCA968C0B0EAFF4CA16CC3B73EC2
                                                            SHA-512:0B0F132F10580751258D37E070338C3B39DF57FDECDB9D0AFA67E90D6766DDCB4D711876E551ED759D177F1B8F4E9E1DD8F7899F7CB57F8039F55EC4C2984E87
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset vi DAYS_OF_WEEK_ABBREV [list \.. "Th 2"\.. "Th 3"\.. "Th 4"\.. "Th 5"\.. "Th 6"\.. "Th 7"\.. "CN"].. ::msgcat::mcset vi DAYS_OF_WEEK_FULL [list \.. "Th\u01b0\u0301 hai"\.. "Th\u01b0\u0301 ba"\.. "Th\u01b0\u0301 t\u01b0"\.. "Th\u01b0\u0301 n\u0103m"\.. "Th\u01b0\u0301 s\u00e1u"\.. "Th\u01b0\u0301 ba\u0309y"\.. "Chu\u0309 nh\u00e2\u0323t"].. ::msgcat::mcset vi MONTHS_ABBREV [list \.. "Thg 1"\.. "Thg 2"\.. "Thg 3"\.. "Thg 4"\.. "Thg 5"\.. "Thg 6"\.. "Thg 7"\.. "Thg 8"\.. "Thg 9"\.. "Thg 10"\.. "Thg 11"\.. "Thg 12"\.. ""].. ::msgcat::mcset vi MONTHS_FULL [list \.. "Th\u00e1ng m\u00f4\u0323t"\.. "Th\u00e1ng hai"\.. "Th\u00e1ng ba"\.. "Th\u00e1ng t\u01b0"\.. "Th\u00e
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with very long lines (1598), with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3385
                                                            Entropy (8bit):4.5164095151631125
                                                            Encrypted:false
                                                            SSDEEP:48:43qrY2BBT7uxDqwPqDa8c3FLbYmhyvMDKbW0YGLuoEyke2gdr:2yPTKdo
                                                            MD5:2F356DE14D48B1091DEAA32D20C38D96
                                                            SHA1:4AB78D47A73290000955A7C1DFDF7106093F69FD
                                                            SHA-256:EB247F5184A59414D3DF7E3ECA51F5998C248CFB27D2C02E62A7A30AB35197A7
                                                            SHA-512:602410830018B455C68AE2EBDD83BA561CF59DA5898E00C80CE7EF619912E591EB38B4C8FE8D9B1F024E7105B0C4D2D326FC855F31E79C1B954429B947DFFBB1
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh DAYS_OF_WEEK_ABBREV [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh DAYS_OF_WEEK_FULL [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh MONTHS_ABBREV [list \.. "\u4e00\u6708"\.. "\u4e8c\u6708"\.. "\u4e09\u6708"\.. "\u56db\u6708"\.. "\u4e94\u6708"\.. "\u516d\u6708"\.. "\u4e03\u6708"\.. "\u516b\u6708"\.. "\u4e5d\u6708"\.. "\u5341\u6708"\.. "\u5341\u4e00\u6708"\.. "\u5341\u4e8c\u6708"\.. ""].. ::msgcat::m
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):319
                                                            Entropy (8bit):5.167825099880243
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoX5YBoHJ+3vtfNrsoHJ+3v6MYBoXa+3vYq9vn:4EnLB383U5YMJ+3vtN3J+3v6LcL3vYqN
                                                            MD5:9FCDC2E80E13984D434E3CC91E1ED14C
                                                            SHA1:710D9EE2A71021F4AB609886138EED43C1380ACD
                                                            SHA-256:4C8A855700FEFE8EE21B08030FF4159D8011AE50353F063229C42DE6292475CF
                                                            SHA-512:D899A1F58DF1051BB2C2C4AC859C52A2D19B1593C37022A29439B37A8057ADC3941F3564E2E1D9CEB72AE123A4E12E24C3736343AA3A5EC8749AB5AEBBF65085
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_CN DATE_FORMAT "%Y-%m-%e".. ::msgcat::mcset zh_CN TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset zh_CN TIME_FORMAT_12 "%P%I\u65f6%M\u5206%S\u79d2".. ::msgcat::mcset zh_CN DATE_TIME_FORMAT "%Y-%m-%e %k:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):780
                                                            Entropy (8bit):4.716025632367214
                                                            Encrypted:false
                                                            SSDEEP:12:4EnLB383HmSBBHZovDh4ToC4qU3WwVW3v6P3v3WwSn:4aR83Hxo14u3Ww+viv3WwS
                                                            MD5:CFDA7B6463305FA15DBBA72D725A1876
                                                            SHA1:2BF885073FBAF4A38B7AFDA76CA391F195A5A362
                                                            SHA-256:7E1C5BD9EC1A17BB851B0DCABD0DFA9FF9D64B89603D9D3FBEAAC609172346AE
                                                            SHA-512:55F974C706933ECE0575A33C381D9B370B8A408C5C5514C805EC04C8B0CA5BAFAA47267DA98E1805B478A9589FFB7549D79002B2A7AF387049011D78DD7605B6
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_HK DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u4e00"\.. "\u4e8c"\.. "\u4e09"\.. "\u56db"\.. "\u4e94"\.. "\u516d"].. ::msgcat::mcset zh_HK MONTHS_ABBREV [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"\.. ""].. ::msgcat::mcset zh_HK DATE_FORMAT "%Y\u5e74%m\u6708%e\u65e5".. ::msgcat::mcset zh_HK TIME_FORMAT_12 "%P%I:%M:%S".. ::msgcat::mcset zh_HK DATE_TIME_FORMAT "%Y\u5e74%m\u6708%e\u65e5 %P%I:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):347
                                                            Entropy (8bit):5.062880051437783
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoOpEoPpFocMohX3v6Zwoh+3v6fxvn:4EnLB383J53v6O3vCn
                                                            MD5:3218F8E6BEDD534277DE0849C423158E
                                                            SHA1:10C006446A10406A5644C4033665E877EBF72AF7
                                                            SHA-256:500546B3211D454659D845B4AB9AEF226125100DF40407C49530DE17CDD4363F
                                                            SHA-512:3142893DA85BA8F83A5B6851B313B5F5FF80D2B989C1AE015665EE70373249B44EFB4FF7C621F1D8F37AC6019EF5E8D6D21C76C48998C3D9072F9C5060AA8813
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_SG AM "\u4e0a\u5348".. ::msgcat::mcset zh_SG PM "\u4e2d\u5348".. ::msgcat::mcset zh_SG DATE_FORMAT "%d %B %Y".. ::msgcat::mcset zh_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_SG DATE_TIME_FORMAT "%d %B %Y %P %I:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):354
                                                            Entropy (8bit):5.124064818715749
                                                            Encrypted:false
                                                            SSDEEP:6:SlSyEtJLl73oo6d3/xoAykaRULH/XRxy/5oAyjZRULHi5oAyU/G0OMoAyxW3v6ZQ:4EnLB38315xDOiKRRW3v6F3v8A2n
                                                            MD5:9010E34791B5DDB7F1E0AD4DA6BD4623
                                                            SHA1:418F7374BABEF27FEC8E00D3A32F535084593AB9
                                                            SHA-256:DBA0584B8E1925B439F06E0BF0965E97AFB7EB39E70E0E4C9B70769EBC5F996C
                                                            SHA-512:D3AB698B725E84DAB06E472C41FF2EB55D63885D22B4598C596800BAC83A02A44CB524524F267D090952AF7E0031F47720786ACF9E354EF672CF9EEFB7DB3BD4
                                                            Malicious:false
                                                            Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_TW BCE "\u6c11\u570b\u524d".. ::msgcat::mcset zh_TW CE "\u6c11\u570b".. ::msgcat::mcset zh_TW DATE_FORMAT "%Y/%m/%e".. ::msgcat::mcset zh_TW TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_TW DATE_TIME_FORMAT "%Y/%m/%e %P %I:%M:%S %z"..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):33788
                                                            Entropy (8bit):4.601784206224566
                                                            Encrypted:false
                                                            SSDEEP:768:4DXxAptehhnN+ZgG6sRclBAdtsPLKiF64aJQ2L:kOSh14pCBAdqua5aJvL
                                                            MD5:C85D3EC03DB63784633093EB972EB2CF
                                                            SHA1:F59DF2682935AC8C21051A85A07B4A130F58FA3D
                                                            SHA-256:95A81D0B5F3CD0E6E9DA7145A253E309CF325B2F4F8E459AE5590469A5B87F49
                                                            SHA-512:C04D4CD37E50A3BF3C07A3D94C7469899DAF9DCBC7C83F86BB05B18C18AC3F868DBC730E7C1051674A65CEA0A8924064D8E39A148FAE784C58857DFA2AE66C8C
                                                            Malicious:false
                                                            Preview:# optparse.tcl --..#..# (private) Option parsing package..# Primarily used internally by the safe:: code...#..#.WARNING: This code will go away in a future release..#.of Tcl. It is NOT supported and you should not rely..#.on it. If your code does rely on this package you..#.may directly incorporate this code into your application.....package require Tcl 8.5-..# When this version number changes, update the pkgIndex.tcl file..# and the install directory in the Makefiles...package provide opt 0.4.9....namespace eval ::tcl {.... # Exported APIs.. namespace export OptKeyRegister OptKeyDelete OptKeyError OptKeyParse \.. OptProc OptProcArgGiven OptParse \... Lempty Lget \.. Lassign Lvarpop Lvarpop1 Lvarset Lvarincr \.. SetMax SetMin......################# Example of use / 'user documentation' ###################.... proc OptCreateTestProc {} {.....# Defines ::tcl::OptParseTest as a test proc with parsed arguments...# (can't be d
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):620
                                                            Entropy (8bit):4.705703425068367
                                                            Encrypted:false
                                                            SSDEEP:12:jHxIRu9zhjJS42wbGlTULuUAZb3KykszLYIGbyAkXaHQ+pBb6:biRUJS42wbGlTUcZ+yk2LY0XaHB4
                                                            MD5:9726D1C368576A0957C0AD45B3C1AF1B
                                                            SHA1:57F751795EAA03AF853C0BFD0AA77BDE1D3A958B
                                                            SHA-256:61AC4633062D17210BEF868D94C25ED0BB9285DF0DE3E0CF4108F38E98A5B278
                                                            SHA-512:61C63A159069DE8F1717322910D1F1F4DBA7950D4558703A65F50BB6739422250A5244D00ACDD72E33DD3FC3C553630B34FB50C0921214D722102FC07C868AE2
                                                            Malicious:false
                                                            Preview:# Tcl package index file, version 1.1..# This file is generated by the "pkg_mkIndex -direct" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....if {![package vsatisfies [package provide Tcl] 8.5-]} {return}..package ifneeded opt 0.4.9 [list source [file join $dir optparse.tcl]]..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):23996
                                                            Entropy (8bit):4.8847996949190495
                                                            Encrypted:false
                                                            SSDEEP:384:8xgjBNIpEHsdAW2UfnImRqXqux6XmihmCchzPLrXJjJh6PLfzd7lG:8xgjBNIwsdnvIm86uGLhLchzDzJ9h6DS
                                                            MD5:2A64C7B059B27472FDAEDE8E4D7606C6
                                                            SHA1:75248B9878B17B8C218F8E0C5000FAD3203FF633
                                                            SHA-256:B547022FEB2A72D8251D2A467BCFC8487CD8FEF10BCEF884465FDE49176F6E35
                                                            SHA-512:556EE1703065FFFCFD84828F0C075533029CEAF906979962197DB581B598BD21071658776C6E2006B4E7E0B274DA145F8C8AAE09CE2A779F41AF2D183D15331F
                                                            Malicious:false
                                                            Preview:# package.tcl --..#..# utility procs formerly in init.tcl which can be loaded on demand..# for package management...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval tcl::Pkg {}....# ::tcl::Pkg::CompareExtension --..#..# Used internally by pkg_mkIndex to compare the extension of a file to a given..# extension. On Windows, it uses a case-insensitive comparison because the..# file system can be file insensitive...#..# Arguments:..# fileName.name of a file whose extension is compared..# ext..(optional) The extension to compare against; you must..#..provide the starting dot...#..Defaults to [info sharedlibextension]..#..# Results:..# Returns 1 if the extension matches, 0 otherwise....proc tcl::Pkg::CompareExtension {fileName {ext {}}} {.. global tcl_platfor
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):844
                                                            Entropy (8bit):4.883013702569192
                                                            Encrypted:false
                                                            SSDEEP:12:TF7S2n2wn2SNHaeYF9xcwrmXhbs1GUiSYX3EtSK78ex4VIpynEw88/McUBbPgnz:TF7Hn2wnlk2KwyZSM4SkV/3UB7Cz
                                                            MD5:577787C2F4F5956BA70F83012B980AE5
                                                            SHA1:040B2469F796F3FDFCD1E1DD2EB1C5B799EDEF62
                                                            SHA-256:E269029C8263E3CBC1920C3604ECDCF15EDCCB208A0D68F9EB42B73954D620C0
                                                            SHA-512:C2940F6F3D77412EFC537B8AB67352F519DFFA95739FCC17BF1817335AFD9E5BFE91ABE98CBA99E278CB4923D4E6D431ED9D72282745203C0F7D73193F550238
                                                            Malicious:false
                                                            Preview:# parray:..# Print the contents of a global array on stdout...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....proc parray {a {pattern *}} {.. upvar 1 $a array.. if {![array exists array]} {...return -code error "\"$a\" isn't an array".. }.. set maxl 0.. set names [lsort [array names array $pattern]].. foreach name $names {...if {[string length $name] > $maxl} {... set maxl [string length $name]...}.. }.. set maxl [expr {$maxl + [string length $a] + 2}].. foreach name $names {...set nameString [format %s(%s) $a $name]...puts stdout [format "%-*s = %s" $maxl $nameString $array($name)].. }..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):42225
                                                            Entropy (8bit):4.822562315054199
                                                            Encrypted:false
                                                            SSDEEP:768:H/Jo8y7AyERYhZfc9njlVdRIpEfOtoYx4WneNiBq5vIhNEaqadlUCJ2Pbb1P6:H/c7AOhZunjvdRI6924WneNiBq5+NEaV
                                                            MD5:AD3C7619BFD9956B8BE313DF8FC3977F
                                                            SHA1:D516274ECC148119920C63A6C2E40E5248AFF0E2
                                                            SHA-256:D692C79367E3FF467275B11FF275DCB9BF4968C98C20C1A48EA4F47146EAABFD
                                                            SHA-512:2B6BCEEDA58740988D620DCEEF97A21C00D2D317DBDD83192D21CA24F082B86186324CD451D7120321B6C3DAA5A8C062B186EF97A14266AE26EAA8EEE8C309CB
                                                            Malicious:false
                                                            Preview:# safe.tcl --..#..# This file provide a safe loading/sourcing mechanism for safe interpreters...# It implements a virtual path mechanism to hide the real pathnames from the..# child. It runs in a parent interpreter and sets up data structure and..# aliases that will be invoked when used from a child interpreter...#..# See the safe.n man page for details...#..# Copyright (c) 1996-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....#..# The implementation is based on namespaces. These naming conventions are..# followed:..# Private procs starts with uppercase...# Public procs are exported and starts with lowercase..#....# Needed utilities package..package require opt 0.4.8....# Create the safe namespace..namespace eval ::safe {.. # Exported API:.. namespace export interpCreate interpInit interpConfigure interpDelete \...interpAddToAccessPath interpFindInAccessPath setL
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5692
                                                            Entropy (8bit):4.746278870125795
                                                            Encrypted:false
                                                            SSDEEP:96:eOaVhNUMUuUQU2UsUIUbUEUEeUkgU6UWhSO0DT5RTdcvsilrvs+jscMK57ehXowX:ejVHRRLP3LWDXewTbhSO0DT5RTdcvsiu
                                                            MD5:9078AA0D1C876D910ED65E9837D08CD7
                                                            SHA1:F17AEA3BB439AFEC1BB6BC1C7B81D72F4DC4C57C
                                                            SHA-256:36EF92DDAB00EE8E3219D6D4EAF0B11F33D6C33A2C6ABC2C7DE30C23E90ACC40
                                                            SHA-512:E0AA87A624FBB074ACD2B390C2085DF407F4959284FB0CDAC41C25701679E9A47373F73C222842C23B88718CFF725C022FBD205419BC51BFB95750D79EA7A322
                                                            Malicious:false
                                                            Preview:# Tcl autoload index file, version 2.0..# -*- tcl -*-..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(auto_reset) [list source [file join $dir auto.tcl]]..set auto_index(tcl_findLibrary) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex_old) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::init) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::cleanup) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::mkindex) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::hook) [list source [file join $dir auto.t
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):12207
                                                            Entropy (8bit):4.762666663869519
                                                            Encrypted:false
                                                            SSDEEP:192:55CjnlRfMf8aOH5bEcKBNkkpgpCmqkkuoBoh9PTYMsvSO+Hy8h/1uKisM68E:5q3MfmH5bEHBNkkpgomq/u5PTYMC+S8Z
                                                            MD5:EB9B227FA756105F4B4444D551996C19
                                                            SHA1:4FC88AA018533A664E122EE39C37F6B44ED052ED
                                                            SHA-256:A84CF30F218BB7BC793D1451A867A060F311F84B932601668B665C0F92A549C0
                                                            SHA-512:CBF96D6B60CBA4BD51173BF3F95FD8DAA8575B9427DE2FCB8FF130061AC164211DA06C2CC6D6C483FA832CD6FB0C95E504D9FD35A4A0B5439837004DA5A62F2D
                                                            Malicious:false
                                                            Preview:# -*- tcl -*-..#..# Searching for Tcl Modules. Defines a procedure, declares it as the primary..# command for finding packages, however also uses the former 'package unknown'..# command as a fallback...#..# Locates all possible packages in a directory via a less restricted glob. The..# targeted directory is derived from the name of the requested package, i.e...# the TM scan will look only at directories which can contain the requested..# package. It will register all packages it found in the directory so that..# future requests have a higher chance of being fulfilled by the ifneeded..# database without having to come to us again...#..# We do not remember where we have been and simply rescan targeted directories..# when invoked again. The reasoning is this:..#..# - The only way we get back to the same directory is if someone is trying to..# [package require] something that wasn't there on the first scan...#..# Either..# 1) It is there now: If we rescan, you get it; if not you don
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):147
                                                            Entropy (8bit):4.995501022397479
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2DcsBdNMXGm2OHnFvpsYoHsdSalHFLwy:SlSWB9eg/2DBpDm2OHnFvmYoH1alHOy
                                                            MD5:FF8B5540631A6EE93507338C4E7AA49D
                                                            SHA1:817B261A1B6B92AA498EC286349964EA10FB5A84
                                                            SHA-256:7213997BB9CF9D384A7002B8C8EFEF25C01ABA6083D9835A16D583D5DCEE40A0
                                                            SHA-512:8D78AC4868ED0013EDA536C0E82E0E91398772AA18C637AEFE22F24B142FCDA55A4CB853B2282951E907C9E2F62BD3F831A5CF995F52898F5225D16889943A9C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Abidjan) {.. {-9223372036854775808 -968 0 LMT}.. {-1830383032 0 0 GMT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.832432925672155
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dc9XfBQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DUGDBS
                                                            MD5:52FDFD3DB98475FBBB620D0D5565C5CC
                                                            SHA1:C7750452859663605272553DBEE0B6C134E1517C
                                                            SHA-256:6040827AFED8CEF45F252FBD7E3E862C0B5E9D06C1C98C58BAD61DFE67BD57CC
                                                            SHA-512:2FF9D96D81279148A86BE208FEEACCBCB8B4224D093D6C092ECD1C4EA2186589CCF947027D3A726600C703611B4CFEE029AA14ED3E8593C477B427C4F342CF27
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Accra) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.817170256300069
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DczqIVDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DnaDkO
                                                            MD5:30CDD4D37E9DD60FBF6D754C9343F364
                                                            SHA1:56F896C21068764B7B8F884F374B18913CA3D9CA
                                                            SHA-256:E11FD8AD8572B684333810CFDC23B92E1ACF619875866985E288D92F8277D07F
                                                            SHA-512:78FC8043CCE25713404E70996229E5EA8238BF5C0F59029064EDA5494E2D4F54398931F3D855E30C82B2C53B789C40EE4CBF09D0F98C2BA6734595D4AA75017A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Addis_Ababa) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1080
                                                            Entropy (8bit):4.187497782275587
                                                            Encrypted:false
                                                            SSDEEP:12:MB862D7nmdHh5Cv6/lHY8SOSuvvzXipFSgSO5vW5aKmvbsF6VWsXN87QBWcAFy:5veSvKlHYXNujXipFSjKRKXiWsXCGWJy
                                                            MD5:E8D3DF11CE0E7575485573FA07D955D5
                                                            SHA1:3B2C00C85B6C0BFAA1C676C970D6DF1B4BDC3D4A
                                                            SHA-256:E6874647561CE1C5FD1F650C9B167F77AC5B24FD2026046399A9043CF998E5C4
                                                            SHA-512:E2968BE847622CF243C0E498436FD21BDC2E1DF0FD8D694F2C70569D17CE896CDE4968BB8ABDEF9F687439E4EA2D955AE87D6C15E81F881EE1413416A90765D4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Algiers) {.. {-9223372036854775808 732 0 LMT}.. {-2486592732 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1531443600 0 0 WET}.. {-956365200 3600 1 WEST}.. {-950486400 0 0 WET}.. {-942012000 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796262400 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766630800 3600 0 CET}.. {-733280400 0 0 WET}.. {-439430400 3600 0 CET}.. {-212029200 0 0 WET}.. {41468400 3600 1 WEST}.. {54774000 0 0 WET}.. {231724800 3600 1 WEST}.. {246240000 3600 0 CET}.. {259545600 7200 1 CEST}.. {275274000 3600 0 CET}.. {309740400 0 0 WET}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.801054282631739
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjEUEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DGs+DR
                                                            MD5:A543BDEB3771017421FB75231F0004F2
                                                            SHA1:D682C58C27562FF3ABAB8EDE8EB6EA754DA7C02E
                                                            SHA-256:064EB7F9A1FA05A317C6BDCA6B102BC1560D980758F9E4DDB010C9E7DC068ECB
                                                            SHA-512:44848D60EDC79AF784A819714C0D9F62DCCB6329B47F25D74AB8C174BF9EC3F783C66FEB27F588A93FABA9BECAF076F453D6D797CE4F28461F7AE69440EA54C7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmara) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.806258322241929
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjAWDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2D8DkOn
                                                            MD5:1B5E386E7A2F10D9385DE4C5683EBB85
                                                            SHA1:FECBA599C37493D2E0AEE8E21BAB40BF8E8DC82A
                                                            SHA-256:76939852A98EA7BF156D0AC18B434CC610DAF5232322C0FBB066CD52C5B72AF7
                                                            SHA-512:B36FABFCDB2187A3A4A211C8E033D96C91E3C4D47907D284E10786555562C82231566033EAB4753EF1E48DF1233CFC8C6C0FB3CA50748BE0B2554A972A88FBA0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmera) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.883634030944169
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcxAQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwNDBS
                                                            MD5:6B9BB5B37C41AA727E31BF03483DC1CA
                                                            SHA1:CB3BBA37B063EA4A54CD15C6E30C14D8CA30D3C0
                                                            SHA-256:F6D1BA22115A6565B6D6ABEB578F001DDB41E673C422C8EA70D0DF77B24115F6
                                                            SHA-512:23DB3E298FDEB165FD85D99E03C00835B584984B814AF7F54A9CDD4A9F93E16B0C58342D319129F46CF8EC36F93DE5EA51B492CA4CABDAB75D84709BC6C26119
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Bamako) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.882974805254803
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcx2m/2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dw/2D4yn
                                                            MD5:92FF9E5835C0C80F358BFE69120660A0
                                                            SHA1:724758B43BD79DD8A29B02BE6910D492924F8280
                                                            SHA-256:5047A507D22B68C9349EB6A48C41C80DB4C69F98F99C6574059DEA87178E36C0
                                                            SHA-512:6FCB709DB4AC19191FECE1E8BAC55E77F265B5AF89F7A3565F06BFAF0BEE12E3EAF2F52CA09C68D75C358C25A31867505CE8AD75D7386DCD15F4BE1CE61272CD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Bangui) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.888193386512119
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcx79FHp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dw7J4c
                                                            MD5:46E5703CF284E44E15E5872DF075FCBC
                                                            SHA1:EA4BFA6D568DFA877F72302ADA21ECC2840D9FD5
                                                            SHA-256:77E610A02CCECE3045B09D07A9BE6100F5AA9C3C2AEB543535C9AE941194F4E4
                                                            SHA-512:1454467FE63E97DFA4DE66E359F68B2D80C92CDE59FC15A4BE513629FFD154D2281EADF3FC78F7AFDDF5A5896195F3A69E66697A659BBB1A0EAFD3E1DA6565EC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Banjul) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.847843768169462
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2Dc5iDMXGm2OHGVkeoHsdSawwF6hSVPVFwy:SlSWB9eg/2D4uDm2OHCkeoH1awwFMmMy
                                                            MD5:7E710C939B9CC0C1AC1ECF4239B543C5
                                                            SHA1:429CC87086FB22727815ED05AC6472333FF06013
                                                            SHA-256:2A870E534DE67713C27F2F3B9BF26FA7498C240CF633988CE76DBDAC5B69214D
                                                            SHA-512:70D9365C31C43A95211FC20E9290B24D356FFEFA935B8829CE32831026A196DECDD12226097F6DA3B4B919E137AA0181714680CDBB72B00C130A87E3A4735004
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Bissau) {.. {-9223372036854775808 -3740 0 LMT}.. {-1830380400 -3600 0 -01}.. {157770000 0 0 GMT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.904342145830274
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc8ycXp75h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAmp1hs
                                                            MD5:7AD3749D7047855CB9B9EC9696015402
                                                            SHA1:F792359AD9EEC2ABD98DAFA6661C1E57BAB89EBE
                                                            SHA-256:8F700409B8EEE33ACE5F050414971FFEE0270949842E58E9299BB5CD6CCF34DE
                                                            SHA-512:681C1B318746C587DEBA6E109D1D5A99D1F3E28FE46C24F36B69D533D884FDDC6EA35BB31A475575D683B73BF129FED761523EC9285F2FF1E4CACA2C54C046C5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Blantyre) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.901235831565769
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DciE0TMJZp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D4qGp4D1
                                                            MD5:7028268EE88250AC40547A3FDBBFC67C
                                                            SHA1:5006D499CD1D1CB93EB3DA0EC279F76B7123DAA6
                                                            SHA-256:596DB2D64CDD6250642CB65514D5BCB52F3E3EA83F50D8915D9D4FDEA008F440
                                                            SHA-512:D623C69FE8A6050E77FB819C2F5FAEE35D5034182B1D30A409C17208155501656133E774E402875537335F8201E4734A0B5D327712CBF623AC330F1014D9025B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Brazzaville) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.947752840781864
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DclbDcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkbDEi
                                                            MD5:0EBC2D8F0BD1A32C21070F9397EAC9E2
                                                            SHA1:95AAA97427265635784E8AC624CA863DB9F1475D
                                                            SHA-256:9A15867255B43A954CA60DA11660F157553AAB6A15C50ACD49D182276E0CF4CC
                                                            SHA-512:4CD2E14F84C58E955742637A51D99DB9493972671A2B5D801EBD9D901D4903654E374C59BF010C70071D33FA17788358F78004201A787CCA2AD714D670393488
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Bujumbura) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8472
                                                            Entropy (8bit):3.7175261751408253
                                                            Encrypted:false
                                                            SSDEEP:96:fLg1GbJFp3gHRQVy7DPUUQkiHMC/+56DEXirCM6Qvrs/PDGgtB9vJzi3kp/o:fWGbJv3yRQaD8UQN/ZiFp/3DGt
                                                            MD5:53F7730B6725D3E41CAE8DB4C205BF67
                                                            SHA1:E09588FC1C2E909F9108866347ACBD0F7495663E
                                                            SHA-256:A7985E0D2273B26BFFA18EE4D87F10FB1AFB9A0F316505919FE99A24909F5E3D
                                                            SHA-512:E7D8AC7499E512FF9364DC870D4336BCE6B9F1A4BC5654AA945C69540A65E8D2B03A592DFE054FFA455CBEBEA362587B9E63B142425F7F9C7ABCE83E57BB56D7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Cairo) {.. {-9223372036854775808 7509 0 LMT}.. {-2185409109 7200 0 EET}.. {-929844000 10800 1 EEST}.. {-923108400 7200 0 EET}.. {-906170400 10800 1 EEST}.. {-892868400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-857790000 7200 0 EET}.. {-844308000 10800 1 EEST}.. {-825822000 7200 0 EET}.. {-812685600 10800 1 EEST}.. {-794199600 7200 0 EET}.. {-779853600 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165801600 7200 0 EET}.. {-147402000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5532
                                                            Entropy (8bit):3.5390967530717847
                                                            Encrypted:false
                                                            SSDEEP:96:zE+CJZtmaG6/eszBrlJs5M2kyUxCHvyKbGKCVpsvA:7MZSszBrl1iJCbR
                                                            MD5:1F5D7CCD63B55ED651CDDC39DA5CFD2F
                                                            SHA1:7525B6DB7ED59D9639CB7BE0D5D4A6941CBC0805
                                                            SHA-256:02C4452923405B4662D3A38DD6D79E24AC206F4B3FCC513D989F364B6F1778C2
                                                            SHA-512:F6203CB05861AFC61BCED3B4F059BFAB1C53D539838EB957C549824E761E6175F06DA56168AC66A1FEC28BB96442F6F56A3C723F35AEC69DFC9160AB0D5559C8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Casablanca) {.. {-9223372036854775808 -1820 0 LMT}.. {-1773012580 0 0 +00}.. {-956361600 3600 1 +00}.. {-950490000 0 0 +00}.. {-942019200 3600 1 +00}.. {-761187600 0 0 +00}.. {-617241600 3600 1 +00}.. {-605149200 0 0 +00}.. {-81432000 3600 1 +00}.. {-71110800 0 0 +00}.. {141264000 3600 1 +00}.. {147222000 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {448243200 3600 0 +01}.. {504918000 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {13731
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7536
                                                            Entropy (8bit):3.8315604186920704
                                                            Encrypted:false
                                                            SSDEEP:96:TzLdXKy9f4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:TdayR41sFpM5vwA6Efv03TBZLl
                                                            MD5:30155093248C4F7E45EF7C0132D2B2AB
                                                            SHA1:FAD100CC49F0CB0910BDE39B43295A47512E1BE6
                                                            SHA-256:8827F7311EDE69A9679BDF2B7418DBF350A2FC8F973E8B1E1E4390D4D5C6D2E8
                                                            SHA-512:469A24AF0C2A4A40CB2488C3E21BB9BBDE057F876EACA08A31FC6F22845063D917A0A4AE96680401E45792DE534EE3A305F137A93C4DF879B4602510D881270E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ceuta) {.. {-9223372036854775808 -1276 0 LMT}.. {-2177452800 0 0 WET}.. {-1630112400 3600 1 WEST}.. {-1616810400 0 0 WET}.. {-1451692800 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1293840000 0 0 WET}.. {-94694400 0 0 WET}.. {-81432000 3600 1 WEST}.. {-71110800 0 0 WET}.. {141264000 3600 1 WEST}.. {147222000 0 0 WET}.. {199756800 3600 1 WEST}.. {207702000 0 0 WET}.. {231292800 3600 1 WEST}.. {244249200 0 0 WET}.. {265507200 3600 1 WEST}.. {271033200 0 0 WET}.. {448243200 3600 0 CET}.. {504918000 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.88110192592456
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcmMM1+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DCM1+c
                                                            MD5:8CDD2EEB7E0EC816F3EC051350FEBF13
                                                            SHA1:37F3A149B4A01DFA2EAB42A28C810BE66AAB7C52
                                                            SHA-256:3176C99FC45337CBCE0CD516DE4B02B8BAA47D00E84F698122A2ADD57797984E
                                                            SHA-512:5A90B6DB45EDAD7734D596FB81FD1959A433F57E71D2212E1DCBD6A12F3FD1FE747FA363C4C787A4D3023F542553C1E2C9CF4F61E28F1BB13042E4AFE3D0FF31
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Conakry) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.856992353568779
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXXMFBx/2DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DKXEBn
                                                            MD5:946D3B52F915445DBB8EE8BF67F4EFAB
                                                            SHA1:18345968B95E886CA72634D49F2B38F9B29BA629
                                                            SHA-256:D50F9732757B284BAC75526F2CFA585DF7F6974160827AFB0FF66124C7CFD361
                                                            SHA-512:00B531D1352CF35045EE25C777C7FEA17294E9861E68CE2DE0D9884C05EBDEA84D5F4F0E8B5605721295E25C259979446B7DB76525A633C7D2FA35B38962CF43
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Dakar) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):191
                                                            Entropy (8bit):4.8447607449193075
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2Dc8bEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DJbVDR
                                                            MD5:7A819572758BC60F4085DF28F1DD1C01
                                                            SHA1:0A5BA34EBFBA5A8E8B896713BA527781FC90FF01
                                                            SHA-256:AB69948637416219A3D458777990FA4568BEBC89388884BBF129C0E1370A560B
                                                            SHA-512:C03E785D1E85292056BB0BDD8DF8326C5DFEB6070AB1C071E1032D14EA69C9DEBC57B2CC7852E35D31652187126CCF0009A6A5C32F9DBB75D56C705535DF05CC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Dar_es_Salaam) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.829357904445218
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcRHKQ1BQDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DOrkDR
                                                            MD5:7981499F9430DC1636C9F834273E0B91
                                                            SHA1:1D63F8578420D56E4A5D9D0881FBEC015421E416
                                                            SHA-256:E7F7560CCD65D53C446ADAE7128A74D37E17DD0B907A2F2FD85322FB8707B497
                                                            SHA-512:3C3F7D78E9A0DE6E2950E1C305EA2DBC986754AE9FB10AC410685F30C39EC235F6F221393099C012E62EE5A7B4F1BED67C96B7B81E90BBA064BA9FE685FE4050
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Djibouti) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.850101792457859
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcnKe2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dml2D4yn
                                                            MD5:44881E75AC32FA95FF6143066EF01B90
                                                            SHA1:A221619B4CDE8BE6A181E1F3869EAB665F2E98B8
                                                            SHA-256:FCF2DAD148F4D2951320EA99730C56D5EB43D505F37416BE4BAD265CE2902706
                                                            SHA-512:4FA67A5F84758366189F0FC4A7FA6C820BA083E1C56EA95D25D21A367F25F76261B7EB5631DFFEB20E095CFD64E770338773F76BD50D4CF6AE29AD3EDFCEC408
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Douala) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5235
                                                            Entropy (8bit):3.544982035908217
                                                            Encrypted:false
                                                            SSDEEP:96:+eCJZtmaG6/eszBrlJs5M2kyUxCHvyKbGKCVpsvA:+eqZSszBrl1iJCbR
                                                            MD5:2D1BEC251404EFD45E344BD7145457C8
                                                            SHA1:968F3EEF22410AB812A9938A84D00CDA21364024
                                                            SHA-256:79FC1181C194BE52C5E4D147FC06E864C6DC0A8FAF308CD767322AFFB4275DDC
                                                            SHA-512:D29B1A662CA36E708C8B2A3887204CE9642BE3DEA91499F4EC7C1E0C0268D49DF146621A1A1AE5A262FB84B7B7D318BA8E38A7211C838D80ED0357B0810E90C0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/El_Aaiun) {.. {-9223372036854775808 -3168 0 LMT}.. {-1136070432 -3600 0 -01}.. {198291600 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {1373162400 0 0 +00}.. {1376100000 3600 1 +00}.. {1382839200 0 0 +00}.. {1396144800 3600 1 +00}.. {1403920800 0 0 +00}.. {1406944800 3600 1 +00}.. {1414288800 0 0 +00}.. {1427594400 3600 1 +00}.. {1434247200 0 0 +00}.. {1437271200 3600 1 +00}.. {1445738400 0 0 +00}.. {1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.866631090752554
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcu5sp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dk4DBS
                                                            MD5:6C115220CF951FC2EE3C299F86935B6D
                                                            SHA1:A1CAB8C710BF20553AF45343118C1726CFE922B7
                                                            SHA-256:BC53A4D489F48F14C594C4B0E52079B34E043A5751BBC7DF254A560352243575
                                                            SHA-512:E87A4FD145B645DF034182CAD7F9D2BE5B2D9F3A17B6A9B6C84A0B3E846D92EC4C69DF2E85129B7A1AFBC0CCAAC8E3B1D47EB09F0900A82B908E9F6BF63B9736
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Freetown) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.899477454245453
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcHK0o/4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAV+4Dt
                                                            MD5:07222D8ED83CDC456B4D5D84C4BDE320
                                                            SHA1:2C657F461FA3F48D56C791AFE4AB7D2EAF45AF60
                                                            SHA-256:653AF88955C4418D973E2F8681A99552EB7BE95BCA64C736072F488462F7B373
                                                            SHA-512:3016D0636F401BD88BCD460F6A61782E7E8A2C32CE4ECB904C711DF414038A5818F0CA3D7FC671C5ABCE70647FC674A2EF9081C5289EBFD184B44885902E007A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Gaborone) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.884642061266759
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc0B5h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2Dlfh4Dt
                                                            MD5:8666DABE8D196ACD94A9691C592FAF4E
                                                            SHA1:9F7EE009DCEAACA79C6EAA6FC73015D595467919
                                                            SHA-256:06B82C524585192E0E8FC69DCC1CF86183A8C5EF404645DC413FCF3F8C16B0AB
                                                            SHA-512:AAA32FD1B01BFECDD0D1C9C1DF1163374DAFE094C75720EA4095C34F7EAE7DCB594D1A7F6A2A90FB43FF01020F7AEB48E92496E0EE2D039AF23076CD369DD2A7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Harare) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):309
                                                            Entropy (8bit):4.695542624694403
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2DWbzDm2OHePoHvmmXsd//HF2d7d6VcF2d6KsYov:MB862DW7mdHePCvmmcZvF0cVcF/KsFv
                                                            MD5:F0E153FC9B978E30742ABC025CA45E02
                                                            SHA1:73D96F3188190DAC2453E6F18A1C683CECB9CDE3
                                                            SHA-256:5EEF6475E1312051037FCAE3354E32DC0910BE7A5116B71F8CCBE1CCA08D3F1C
                                                            SHA-512:E66F4B5FF18BAAD53AFB1ED36A0827115C793075A61F794F26F32BC9F6799DF816A1F817BEB0C0BC938F89E6F5BFBE1AB4F504F1AF518764103FB287746552C7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Johannesburg) {.. {-9223372036854775808 6720 0 LMT}.. {-2458173120 5400 0 SAST}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {-829526400 10800 1 SAST}.. {-813805200 7200 0 SAST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1127
                                                            Entropy (8bit):4.027824722230131
                                                            Encrypted:false
                                                            SSDEEP:24:5mesdOkMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8M5:5YMV04MSHMzNxMbwM0JXMfCsMzaMq0QJ
                                                            MD5:32EC0589260D9D4BCC85FE91E6F04D00
                                                            SHA1:BAA269852C4AC6B89EA7941E7A75A007E0CF9EDF
                                                            SHA-256:F2646E15488ABF2E960759CEFE5705416E71DA71BB8407B26196244FD1A3394F
                                                            SHA-512:4F485453BE1D186ADBE0908852475C63C57BA498091C222EFFB9A5FEA2DB7F55E1BB2DBDBF6AC0F24CC67D47549FA3F5257655B5449B1BCF1FB5CDB27B03D501
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Juba) {.. {-9223372036854775808 7588 0 LMT}.. {-1230775588 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.837466713772859
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcJEl2DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DIEl2V
                                                            MD5:E929ED1BC316C71AABE7E625BD562FB1
                                                            SHA1:C20C172518C02D93327F4BBBC5D410BFFEF5039D
                                                            SHA-256:8EA3028CE2B025F0C457DC8F7601279CA5AF565A88B9FE80208F9F1030F2B0D0
                                                            SHA-512:B2FBCF06EACCF18DE97AF1D6BC57D9638E0A36DBF17044FF97F6B9E5089CF9E13E1304F304495324C0ACC1128A7D2D494E7C1FDB95DB0855FCE54F7028096C50
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Kampala) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1131
                                                            Entropy (8bit):4.0421745451318385
                                                            Encrypted:false
                                                            SSDEEP:24:5xe9dSXMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8MM:5hMV04MSHMzNxMbwM0JXMfCsMzaMq0Qc
                                                            MD5:2BD3850DDBE2F05BF6F24F3AEFF7516C
                                                            SHA1:22B0DBB54E071F30D51A8654CF103F99537F74CD
                                                            SHA-256:F475DB8A857A46B310B12C21D6A9BC6CA9FF2960DA429A9D57FA375F9439E13B
                                                            SHA-512:1CF82FC07348C697F26625673DA7E3D734358B3FBE69D8E2132CAC0D9F00C7E8CDC353676CD9BAC4CBB9E26CF6638CEAE41DF559E7445D9C453409D7115FFC6C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Khartoum) {.. {-9223372036854775808 7808 0 LMT}.. {-1230775808 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.910322325134086
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcCJRx+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DRX+DEi
                                                            MD5:3017253E1C6ACCA8D470A014E4BB321D
                                                            SHA1:671B7AC04580B56E2C34F88D123E8296947DDD7E
                                                            SHA-256:73FEB807006897B4B485CB82394867444E890265EFE960EC66D6C0E325DA9372
                                                            SHA-512:2498C380D761A16C183D78BC1BB18B1D2A1BFCB9C703D86A3FC04CCCE43D88C8D4BC3C47CC31639B78A5FE9C8A7445E9DBB52062E2F3B737DA1E7D0FF70F140A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Kigali) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.866127364448228
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcqQFeDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DdD4yn
                                                            MD5:41209A335A99803239A854575190C5ED
                                                            SHA1:E6EA627C25513B9DDE053F9A24D509AA317C30A1
                                                            SHA-256:611375C4901AD6C4844C2BB7D02FB17F34996F49E642546A6784D6F0B28530CC
                                                            SHA-512:DF2C0B131F35F54DF5EBF7F8459F98DBABEB6F081247BA95B5D7B41146E2A2EF9BC6B1D909DE57A1223D9C258AB197D9668ED2E111A365C86BABDAA7DF551FB6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Kinshasa) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):235
                                                            Entropy (8bit):4.7936510664790815
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2D4JDm2OHWQvvoHvBsp9boFvoHzIX7uRe6vF9:MB862DymdHWQCvqpmVCzIq
                                                            MD5:EC08046589E85D999A597252FF5368B7
                                                            SHA1:126E3DE158E1E7AF4737D0AB5B51C0F92F416DC7
                                                            SHA-256:DCC9F52F539A67DFD7ABAFDE072ACDAE2B67754C559C8A5FE61979F5A286A066
                                                            SHA-512:84B9AB18BC343C8B8934F5FDD2E2EB413925B04D6F5394AA8337B7B55E6487FB071A83A69BD4D0FA40F7F31EBC57B9908729674542CEA3083D700FCD02D77633
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Lagos) {.. {-9223372036854775808 815 0 LMT}.. {-2035584815 0 0 GMT}.. {-1940889600 815 0 LMT}.. {-1767226415 1800 0 +0030}.. {-1588465800 3600 0 WAT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.865878143076229
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcr7bp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dgfp4D4y
                                                            MD5:35D8A58EE21E603C6FC4FB896AE6B3D0
                                                            SHA1:F1D0A939D761F3F0954F045814CF5339A5597036
                                                            SHA-256:AB3E797548C7663CF9ABA7FE163635FF7CAB9E6CB61FA1644C0F7B4B5CCE8B99
                                                            SHA-512:97717961987F6B6832C24A7833150CDFE7E82BBEB32DFDB84D2500442AAD9263F8BD4E879591E913D56E9A1991C389EF730211853647A889F358AE3FA37C0185
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Libreville) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.862780607964543
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcih4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DNh4D4
                                                            MD5:EA21ABBF8B11953916A1C509B8A1B427
                                                            SHA1:35ADC230C57B001BE8A99A3D2E34B609A60A1162
                                                            SHA-256:EACA9124F17E5B11F27D11FA6141D19EB3AC23E155E155B73467BDAA3BC99AA7
                                                            SHA-512:A7972D4F1C5FB988CA04B39E2CDD580F51383BA9D7A66C478275C11A07B8D7A6EFF53A3E1929B0D89F10BCC39D22F285DB2601ED60DB4647C65465643F70C137
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Lome) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.856982839546061
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DccLtBQDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DXQD4yn
                                                            MD5:40CD47F6DCF51EBEFEF42489F1716257
                                                            SHA1:DF245192A1899A72DE01A57F6969AC060E841734
                                                            SHA-256:4C2FD1E44DFAAF0C0DD2EB56B84B538F1E2D84B301AB2CFB8EE7759783501444
                                                            SHA-512:D39BEB0EEF344B1A44F7D6A806A1D5B956D7D402648EE0C67C4BA46493236840AF975D89A91B2D33B8AA7D6DC9A051E66718DCDBC1C83B0E964215C2E32ED923
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Luanda) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.940313336280723
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcfpT0DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2D8pT0Dt
                                                            MD5:71A5DE1276902DB1542840318F9B1AF3
                                                            SHA1:AC3825BF343482E0E4D9D6FAA6FCA4D1A125433B
                                                            SHA-256:24384EEC359FD24D181AAEF3C017E3C345490A8D352B29D19B1B143A29A811C2
                                                            SHA-512:2984EB42A79B8B32BB93DFE71F1C4C0CABFDC9B0A199971347BB3473463FA07FDB5D20227D288BF8653B1BDE347E1297459BBB4C3C34AF7A5434FBF945683577
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lubumbashi) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.905174746463853
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcOf+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkDEi
                                                            MD5:1D7FDB388535CC59742CA0F1AEE27FBD
                                                            SHA1:A99FF2CAC47FD333429C22B271E190D979EEC024
                                                            SHA-256:B00801A7279741434D9C2D7EC7322DD93B85EA4F5C9976AB3A43F0AB142E1553
                                                            SHA-512:0174D3C6F9116C36C62AD1EB58203EE7DFE8C37F618B8449D5E45AD6290CF8334F28798877D7A563A12EE533026244D6A49BCCF29B5D7FCB5BCC91481D0DDDE2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lusaka) $TZData(:Africa/Maputo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.857096806490649
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcn2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D42D4yn
                                                            MD5:1CA9B3E7BCD5BC1CC881453D16B09389
                                                            SHA1:1B1964B314E72847D71A42C147CF2BF331B44461
                                                            SHA-256:35D56EFFE9E7E60F17B32BD30486E566B635F0AE7A8948D77395B8E6332E26F1
                                                            SHA-512:9E08D57B7824F5B076D159D9A5106E51450DF24729C36F485B9B68E8F47E8DFC50F9BEC3F11E0AE6579A8E372A5C0F0DA18A2E797CF2115519D1B4E5B64413DD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Malabo) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):149
                                                            Entropy (8bit):4.952872531197478
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2DcfKiMXGm2OHoVoHvdSF2I:SlSWB9eg/2DEZDm2OHoVoHvdI
                                                            MD5:CD429B6891CBF603A93F9A9733E2391B
                                                            SHA1:C6833B83B6D1694AC632018A27915E6F97F708AE
                                                            SHA-256:FE6B6A4BE1B61F7F909A3F6137530DFE6D1754499A4D9B0D1CE4952FFF0AE62D
                                                            SHA-512:6E57B70B71515998AD617954F9DDAE19968B20946542201153DAB47FBE63790D42F41AE29148ECBCE6D12812879BCF0A4EC881507B62CDB2675AB20267220BF9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Maputo) {.. {-9223372036854775808 7820 0 LMT}.. {-2109291020 7200 0 CAT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):199
                                                            Entropy (8bit):4.964472328419063
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DZQs+DWb4n:MByMaHw7NH/t2DZiDWU
                                                            MD5:88C8FF2B480648EDADBD0FB93F754275
                                                            SHA1:BED7A784C378909914CEB0D303DFE6D05FD576B7
                                                            SHA-256:1D80FD86CB733D57D88ECD404E702F750B233ED0CCBFBFFFEED1AAD3B7F1CB04
                                                            SHA-512:CB7F831CF099E85B948AE57FCE9D91C7EAAD39753AF82C56EC15B65830EB4115A71BBC83A71A2AC947CAB24DEDDB557E02FAA5A3264546AE6E60607DF6BD2FA3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Maseru) $TZData(:Africa/Johannesburg)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):200
                                                            Entropy (8bit):4.957246428185456
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DzjEHp4DWb4n:MByMaHw7NH/t2DzjEJ4DWU
                                                            MD5:CA7255B86425BA706D214924856B6818
                                                            SHA1:E9BE6CF871BB1786E842953D41392299952EC9AC
                                                            SHA-256:547197C09C1987350AE5720A4EEC7E8D8F4B9F4A0559726E225E13C707F7C564
                                                            SHA-512:23F9AD0F926A0945A17BBC3DCFF9A3D7EE68EC9423EA78985F5FFC60CC61641B57871F9AA703B5FB9BE842DCD4693D0641F9EDED702240873F58D24CD4D60C32
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Mbabane) $TZData(:Africa/Johannesburg)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.877126792757121
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcBEBXCEeDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DFSVDR
                                                            MD5:5C2E2B5189E0E816D5BD7AFC8B49A35E
                                                            SHA1:4E43A1ED51399528636D6442B1DDFFD820911407
                                                            SHA-256:25E221BE49DEC5547A74AEB91B0041859C59BC866987272A447AB2343D1CC30C
                                                            SHA-512:B74735CFAB692756BAADFB1A51A8CC0C986F981D8E7E7A8182370A9017E67439875F0115820A349AFB3BE2FA581A721440968EF817471DD2C5E1286E53B2FE99
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Mogadishu) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):208
                                                            Entropy (8bit):4.8660011420394955
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2D3NPDm2OHrFGxYoHvlHIg5pTwdPsy:MB862D3NbmdHhmYCvdIg5GPsy
                                                            MD5:1B3C94B5098E454981C73C1F2AF80164
                                                            SHA1:1EBA9E2DBEA70BB1AE5EB13739518AB5A62D2130
                                                            SHA-256:2BF0D90610211651127402680519B29AB50B15D344263D0C1A22EDEBE5E01E27
                                                            SHA-512:DA4A0BCE7C6750BD7D3BA76B6301B9390723BE0C001C39BE453D80BD87020C2253A75629F68F83C19410D2A75FAF5223A435299CD4AA53DE545EC7C5B5AA54B7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Monrovia) {.. {-9223372036854775808 -2588 0 LMT}.. {-2776979812 -2588 0 MMT}.. {-1604359012 -2670 0 MMT}.. {63593070 0 0 GMT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):277
                                                            Entropy (8bit):4.655052651600954
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2Dk1Dm2OHsvT5oH99VCV22ufPnVCkVBKBQn9q:MB862DGmdHsvVCjkifvdH9q
                                                            MD5:B640661FB37BB74FAB172DBDF1B433E1
                                                            SHA1:0236A5B53443A4A18B8B9D6AA7732620BE9A6553
                                                            SHA-256:BD8E9765174431C0D403249D3E881C949C83966E9F8162552DA88AE53132467B
                                                            SHA-512:53DCC6DF7C3E0B00A6D98A8DCC4988C8CFD6B53CC89E6F8D32DA41CB532A62D9C6A823675C5039F5639CE0D423F6D571F46F5B93FFC7EFFB4EDFFBF89D46AA12
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Nairobi) {.. {-9223372036854775808 8836 0 LMT}.. {-1946168836 9000 0 +0230}.. {-1309746600 10800 0 EAT}.. {-1261969200 9000 0 +0230}.. {-1041388200 9900 0 +0245}.. {-865305900 10800 0 EAT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):208
                                                            Entropy (8bit):4.856754881865487
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2DjUfDm2OHNseoH1axCXFHzaSmkFWTvF9:MB862DjULmdHPC1XNzaS3yz
                                                            MD5:EDB548348E590C8CFE04ED172D96B86C
                                                            SHA1:AD3B631FB03819772164402E202AFA781687F597
                                                            SHA-256:9ADA5F5AFB25E823E1F0E8AD2489AAA1C09F01356634A9403670D7AB21CA2E2C
                                                            SHA-512:17E396A9BE497077B774AD1108CC8760ED35FC92F65FFF070F9ACD3C4FB67A335C1C57DF1CCB1570DE14B708EFCA0063990A969E30759C9A47731DA45ED25EFE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ndjamena) {.. {-9223372036854775808 3612 0 LMT}.. {-1830387612 3600 0 WAT}.. {308703600 7200 1 WAST}.. {321314400 3600 0 WAT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.871519187180041
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcdhA9Ff2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dsh2f2D1
                                                            MD5:0134039CD1666E983A9B6E43ABD6AF59
                                                            SHA1:A2A99345390F4D17C892CEADE58C604257686764
                                                            SHA-256:B517120AD8DB3F21EAB4E44A78001EE856EB4EA35852C54CCA96D38887DEBCFA
                                                            SHA-512:E5911ADD3D776D87ACFC986C4D2564E3ED9AB12C67F23391ED35FF2A31AD8314B873E31DB8DA4D5E0DAEA12BE34110A8F0C27C9C6126977BAD51C6AD5CDFA39B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Niamey) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.909962899502589
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcboGb+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dqbb+c
                                                            MD5:550E482599C2F4280F2C258019BB2547
                                                            SHA1:A39045BEF313094CEDC100A7D695AE51BC9E498D
                                                            SHA-256:64CAF2BF9D45095DF97F419714D5617CF6300ACDB544B621DCE1D594AA9B910C
                                                            SHA-512:4FD29C5B4C0D2BDE69C437E9BF4F08A11E1DAAA689B69F28F3551F550BDCCDD055E4C1A241EDB2FA48B18825AFF792F4860F55983E106EA8224F1D87ED4F7546
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Nouakchott) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.920023025906233
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXCZDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2D1DBS
                                                            MD5:6CFC4E938E50C9B591F8CC42A14FA82A
                                                            SHA1:FCE14A5CA62C9005C76D27B849A238E76C834F8A
                                                            SHA-256:03B9C1FE350B5E9F6F333F9519FA394DCC562308D9388A903AF3D3FECEBDC762
                                                            SHA-512:98F22F1D23A9930276A2D306A1473E64DC43547A16CFD01226E4F030A26A3CC4FDED77F790583CC5C078FC6DFCCE81C16A50879AE46A0D3A6F1FA98373F413C7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Ouagadougou) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.893842293207225
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcyTKM0DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DQD4yn
                                                            MD5:6D979FCD225D5431C7391AE568C6409F
                                                            SHA1:6C9DCD222061CC00FD386773C6BB2861F3429A60
                                                            SHA-256:8FB8692DB9281AE2B087D704168BFD47D3D0901781FEF65BFD62FCB213BA6B50
                                                            SHA-512:32AFA6AF6BFC3D42CA636DD2B96906048EF1ADFBB135BB7E7B77C444FED99FDABB84FBBADF56EC63828FFA7B3371191FF1311822B1C75241EBD9CF602467088E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Porto-Novo) $TZData(:Africa/Lagos)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):234
                                                            Entropy (8bit):4.818597723513168
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2DXDm2OHH5oHvzdoH1aNbbFHRMy:MB862DTmdHH5CvzdC16bZRMy
                                                            MD5:28A5967C797F4B38FB63F823D6F07168
                                                            SHA1:17872E91683B884191D2E4C777FB79DCE6D73EE7
                                                            SHA-256:BA1D60DF2B41320F92A123A714E17E576C89383526B96E0541A464C3FBA415B7
                                                            SHA-512:B335E3D3268631F3A71F4BAD59740F3A5222344E8223C201B8FE885BAA7F1A550FA7778E498D6DC2111F41053856F50B21413AECCE84B80833EC8176F2A1009C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Sao_Tome) {.. {-9223372036854775808 1616 0 LMT}.. {-2713912016 -2205 0 LMT}.. {-1830384000 0 0 GMT}.. {1514768400 3600 0 WAT}.. {1546304400 0 0 GMT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.905303708777235
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcHdDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwdDBS
                                                            MD5:F2D7F7BC4EA3629EC7F0E45300A0CFD2
                                                            SHA1:E7594D378C5DCFEB1E87E13AC79A026260D2E630
                                                            SHA-256:9D8009ACAB019B32B1E87AB10E0AC3765ABCABE8066318DA8CA4905D41562F72
                                                            SHA-512:795E58172907020C85CF0B10BBA35842D5F92872CCB3382DFDC787BAA504C79927FA23BC3104AD63541A95C44CA80977E8247846DE918A0B00963B970F4823D2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Timbuktu) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):954
                                                            Entropy (8bit):4.151253074491018
                                                            Encrypted:false
                                                            SSDEEP:12:MB862DrmdHrCDWR+f7Zn9ueRSmNvlTtuyI/ZBv8dq8Jw4VFZBZYEuAENSfp8kSYx:5veuDkWx3NdT18kbjjAkxTx
                                                            MD5:2DF9B050D82B06EB89DA908C31C1F1C9
                                                            SHA1:CB294E12560A98D5CEA3BA7004B5519B6C22BAAC
                                                            SHA-256:B447B6B1C351E77F22A2D77C0437F2BBB7D8BDFDFDC3D6285E0D260519CC7110
                                                            SHA-512:BBE281D551E9F8DA7B6BB08D809177615410A11E4B1184ABD220EA8B1F355B2BBC090C6BAAF7E07FD61286891388ECD4026D4433C4E4B6A8D201F8D95E174532
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tripoli) {.. {-9223372036854775808 3164 0 LMT}.. {-1577926364 3600 0 CET}.. {-574902000 7200 1 CEST}.. {-512175600 7200 1 CEST}.. {-449888400 7200 1 CEST}.. {-347158800 7200 0 EET}.. {378684000 3600 0 CET}.. {386463600 7200 1 CEST}.. {402271200 3600 0 CET}.. {417999600 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {465429600 3600 0 CET}.. {481590000 7200 1 CEST}.. {496965600 3600 0 CET}.. {512953200 7200 1 CEST}.. {528674400 3600 0 CET}.. {544230000 7200 1 CEST}.. {560037600 3600 0 CET}.. {575852400 7200 1 CEST}.. {591660000 3600 0 CET}.. {607388400 7200 1 CEST}.. {623196000 3600 0 CET}.. {641775600 7200 0 EET}.. {844034400 3600 0 CET}.. {860108400 7200 1 CEST}.. {875919600 7200 0 EET}.. {1352505600 3600 0 CET}.. {1364515200 7200 1 CEST}.. {1382662800 7200 0 EET}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1111
                                                            Entropy (8bit):4.150944563639585
                                                            Encrypted:false
                                                            SSDEEP:12:MB862DHmdHjCvbB/lxRjntMVyoKCyFWeey0XSe/OSyHaCgmvLOcSFQSFeSTC6ZPJ:5LemvbplxRhbv+yuh2tIee6kvcw9Cy
                                                            MD5:0C99335A41D33AA8BC1EDA0CB4CDCBF5
                                                            SHA1:5CABC28D318FA5B8307429EA571FFF91EB8E1252
                                                            SHA-256:0760D1028E733888E43E7F1E057217DC2B52786029FCEC67B27EB69CC6A54938
                                                            SHA-512:C8FE685ACA46FD4836F3AABC15833F294E5EBED123A487D04E74A8C5668BDFAFB96D2326760452A6E5A1B9CC25AC6C3918D8C10A7F8EF737456640E3000BBA2F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tunis) {.. {-9223372036854775808 2444 0 LMT}.. {-2797202444 561 0 PMT}.. {-1855958961 3600 0 CET}.. {-969242400 7200 1 CEST}.. {-950493600 3600 0 CET}.. {-941940000 7200 1 CEST}.. {-891136800 3600 0 CET}.. {-877827600 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-842918400 3600 0 CET}.. {-842223600 7200 1 CEST}.. {-828230400 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796269600 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766634400 3600 0 CET}.. {231202800 7200 1 CEST}.. {243903600 3600 0 CET}.. {262825200 7200 1 CEST}.. {276044400 3600 0 CET}.. {581122800 7200 1 CEST}.. {591145200 3600 0 CET}.. {606870000 7200 1 CEST}.. {622594800 3600 0 CET}.. {641516400 7200 1 CEST}.. {654649200 3600 0 CET}.. {1114902000 7200 1 CEST}.. {1128038400 3600 0 CET}.. {1143334800 7200 1 CEST}.. {1162083600 3600 0 CET}.. {11747
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1649
                                                            Entropy (8bit):3.9974091170263066
                                                            Encrypted:false
                                                            SSDEEP:48:5t+Lmcz0iMHHWMbnHoMcHiM0H+MCySHr/MDHqMafHO8MwHJMHHOMHSHWMHHXM5Hs:OLjQDI6jZ2WFcv
                                                            MD5:4846FB13467BA93EB134D88228D7F534
                                                            SHA1:477FC6144B7DF365606A2E44EF1430F8DF6FB841
                                                            SHA-256:DFC3D1FC182B315B31D999BC103C264BD205EB16F971C8636003A71170D7BD7C
                                                            SHA-512:A719F5083F66CE44FE047880A10B2ED04B66E01C7F0F7DADAE2FFB95172308F091D669BCFED5A236D2A0F80A4A1D78DA7A778DDE3FAECB40170ECDA705573769
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Windhoek) {.. {-9223372036854775808 4104 0 LMT}.. {-2458170504 5400 0 +0130}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {637970400 7200 0 CAT}.. {764200800 3600 1 WAT}.. {778640400 7200 0 CAT}.. {796780800 3600 1 WAT}.. {810090000 7200 0 CAT}.. {828835200 3600 1 WAT}.. {841539600 7200 0 CAT}.. {860284800 3600 1 WAT}.. {873594000 7200 0 CAT}.. {891734400 3600 1 WAT}.. {905043600 7200 0 CAT}.. {923184000 3600 1 WAT}.. {936493200 7200 0 CAT}.. {954633600 3600 1 WAT}.. {967942800 7200 0 CAT}.. {986083200 3600 1 WAT}.. {999392400 7200 0 CAT}.. {1018137600 3600 1 WAT}.. {1030842000 7200 0 CAT}.. {1049587200 3600 1 WAT}.. {1062896400 7200 0 CAT}.. {1081036800 3600 1 WAT}.. {1094346000 7200 0 CAT}.. {1112486400 3600 1 WAT}.. {1125795600 7200 0 CAT}.. {1143936000 3600 1 WAT}.. {1157245200 7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8447
                                                            Entropy (8bit):3.867931581740766
                                                            Encrypted:false
                                                            SSDEEP:96:6hvOs5vveFaHU6lgqN/zNMkixlrxYTMcmo1LWF59:6hvOstgqN/zNMkArxiZmf
                                                            MD5:DF52E726B33FA47EB115C1233614E101
                                                            SHA1:26B0E49022FCB929F0160617F9C9D2DBEDC63610
                                                            SHA-256:77231D179260C08690A70AEE6C2517E4B621ED4794D9AEEA7040539F4FF05111
                                                            SHA-512:48AAF25419E07B06E076B0E19F9A0C27EB257556E62FD8F7B2AA963A817823DD89D33AB6AFEAAC2EF2230361D76776355E19CC2BBBB4D19536F823A347AC8AA4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Adak) {.. {-9223372036854775808 44002 0 LMT}.. {-3225223727 -42398 0 LMT}.. {-2188944802 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8685
                                                            Entropy (8bit):3.9620252256806845
                                                            Encrypted:false
                                                            SSDEEP:96:esKLO6KLC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:etLhN9DiaJCUbPI+D/iMpCIBSuk
                                                            MD5:BFEACEA04AAA8A69A9AC71CF86BCC15C
                                                            SHA1:1693971B8AAA35021BA34799FB1B9FADC3DA0294
                                                            SHA-256:DE7FBE2B3ED780C6B82099E1E249DD41F4452A3ADB9DD807B1D0EC06049C2302
                                                            SHA-512:E94112A2A5F268C03C58CE3BB4C243B2B9B0FC17CB27FDD58BCD2CCC8D377B805C87A552AE7DE1C5698C5F2C4B0FCAB00A3420B1DAD944C1A2F7A47CE7118F78
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Anchorage) {.. {-9223372036854775808 50424 0 LMT}.. {-3225223727 -35976 0 LMT}.. {-2188951224 -36000 0 AST}.. {-883576800 -36000 0 AST}.. {-880200000 -32400 1 AWT}.. {-769395600 -32400 1 APT}.. {-765378000 -36000 0 AST}.. {-86882400 -36000 0 AHST}.. {-31500000 -36000 0 AHST}.. {-21470400 -32400 1 AHDT}.. {-5749200 -36000 0 AHST}.. {9979200 -32400 1 AHDT}.. {25700400 -36000 0 AHST}.. {41428800 -32400 1 AHDT}.. {57754800 -36000 0 AHST}.. {73483200 -32400 1 AHDT}.. {89204400 -36000 0 AHST}.. {104932800 -32400 1 AHDT}.. {120654000 -36000 0 AHST}.. {126705600 -32400 1 AHDT}.. {152103600 -36000 0 AHST}.. {162388800 -32400 1 AHDT}.. {183553200 -36000 0 AHST}.. {199281600 -32400 1 AHDT}.. {215607600 -36000 0 AHST}.. {230731200 -32400 1 AHDT}.. {247057200 -36000 0 AHST}.. {262785600 -32400 1 AHDT}.. {278506800 -36000 0 AHST}.. {294235200 -3
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):202
                                                            Entropy (8bit):4.908728298285591
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/8J5290ppv:MByMYbpwt290/8m90b
                                                            MD5:1C3CE9F156ABECEAA794E8F1F3A7ADDB
                                                            SHA1:6F84D0A424FD2DE85E3420EA320A186B277B0295
                                                            SHA-256:F38610019C0A2C18AC71F5AA108B9647D9B5C01DCB55211AFB8312308C41FE70
                                                            SHA-512:CA2DA6F9551E4DBF775D7D059F6F3399E0C4F2A428699726CD2A1B0BB17CCF5CDEEF645EE1759A2A349F3F29E0343600B89CE1F4659CF5D2B58280A381C018AD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Anguilla) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.898881450964165
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290//MFe90ppv:MByMYbpwt290//V90b
                                                            MD5:DB16FFE76D625DEC731AB6320F5EF9BF
                                                            SHA1:D286994E03E4F82C08DE094B436FA098648AFADE
                                                            SHA-256:561E58E11DC5A86CAE04B5CB40F43EFCFF9ABC0C841FAC094619E9C5E0B403F8
                                                            SHA-512:8842B616205378AF78B0B2FC3F6517385845DE30FFD477A21ACFA0060D161FB6462A3C266DCFD54F101729446B8E1B2ECF463C9CF2E6CE227B2628A19AF365F9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Antigua) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1782
                                                            Entropy (8bit):3.733307964154526
                                                            Encrypted:false
                                                            SSDEEP:48:5KChlvEw6kSSx5H4a8tf3fkuozd23t8VZDG8+GCRRRd:QIlvEwJSSxdF8tfMuozdCt8VZy8+GCRB
                                                            MD5:9B01680A362EA7B462DC236F6A35E14C
                                                            SHA1:456A5E771F6B749BFDB2BFD59836A6A930499881
                                                            SHA-256:B1327CBEC20A21E3FF873E28A2EDFA271EE3A5C01933779300EABD6B185DA010
                                                            SHA-512:E6C2F5C489BEA31B0AAC3CB1DB750AC2B665DAC0AC82C1CE6756E768305300297BA5E3B32EDEB9E1715452F02223E47674C4F2B1844920F664623C9F34309240
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Araguaina) {.. {-9223372036854775808 -11568 0 LMT}.. {-1767214032 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2048
                                                            Entropy (8bit):3.7664759014118188
                                                            Encrypted:false
                                                            SSDEEP:48:5p9uuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0wi:jIu3pfe92jCs/VOHv2kdeRtnxafwwfF0
                                                            MD5:2B9A1EDE5110B46E24F4726664EA1E3F
                                                            SHA1:939D1A7A50544F34B318ACDB52BC6930FE453F6D
                                                            SHA-256:BC86AC89121EC4AA302F6259CCC97EFFD7022DC6CEE3B291C57DA72B6EA0C558
                                                            SHA-512:C204740DACBCECF2CC5CF4FEB687E86B9150512623203C999D6F4EB5FB246D07681A35C28D8445F6A50F49940C321E0AA5E51FE5A73B8ED076F29CEB5B4D4CA2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Buenos_Aires) {.. {-9223372036854775808 -14028 0 LMT}.. {-2372097972 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2077
                                                            Entropy (8bit):3.742645155048276
                                                            Encrypted:false
                                                            SSDEEP:48:5/nuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0NC:Vuu3pfe92jCs/VOHv2kdeRtnxafww3mP
                                                            MD5:3D2AF5714DFC392ED4BC976784D5A58A
                                                            SHA1:9252DE40B6EF872E1D2F7CDD53DDD21145E93C5C
                                                            SHA-256:A516BB0937977EF949D47B3C8675E30F1CA6C34F8BD298DCF6EBB943580D5317
                                                            SHA-512:8D5FFDB5B578B8EA0291D3A21BDDE25F8301CB16B11AE794FFBA8DCFFE46F6AC5EC03D93E511061B132D84E69E5FAF1BB212837EB8A5A4B4BE517F783837E615
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Catamarca) {.. {-9223372036854775808 -15788 0 LMT}.. {-2372096212 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522740
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):242
                                                            Entropy (8bit):4.72138001874583
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/290/MquQ90/MMXAy:MByMY/MYp/MrRt290/MquQ90/MK
                                                            MD5:8A609667DE461CEDC1127BE38B161459
                                                            SHA1:557D2D55DEA38D1CD1103E183F89C65F4016662B
                                                            SHA-256:8CCD6FC77D55582938F1912B1BA66035882D1BFC18A797C631E5E89ABFBF570B
                                                            SHA-512:DBAFDA069DB5FDBCBA11050AC91A733C1712BD6395939CFFFC5EAA78BD0B70B4AF2D9FB8954C6841CCF3AC5F8EDCF08E604D3F2CF67F1CBEA5EB6D3C4DC7F2FA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Argentina/ComodRivadavia) $TZData(:America/Argentina/Catamarca)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2043
                                                            Entropy (8bit):3.7481312409221594
                                                            Encrypted:false
                                                            SSDEEP:48:5lxQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0n:/xBu3pfe92jCs/VOHv2kdeRtnxafww3j
                                                            MD5:8C1D665A25E61CE462C2AC57687763BF
                                                            SHA1:B5BBC26CF6A24BD5BEA42AC485D62C789B80905F
                                                            SHA-256:FA75E274240A341C6BFE3539CFDC114D125AEAEA3161D3C2409347CF8046042A
                                                            SHA-512:A89A7A92C025B87DA4CDFE99BF70CD0E64690D7BFE827DCBFBF0E91B188003FA26487E72B6B950D3BFC9C854B890E5936F414BBEAAD5F3F0673AC5EFE273CDF4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Cordoba) {.. {-9223372036854775808 -15408 0 LMT}.. {-2372096592 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2041
                                                            Entropy (8bit):3.7481290145270245
                                                            Encrypted:false
                                                            SSDEEP:48:5HluuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwcSPAC8OS0E:xwu3pfe92jCs/VOHv2kdeRtnxafwcDCK
                                                            MD5:995EDE9E1E86DB500C7437A196325E21
                                                            SHA1:4A8FB1511AA124CA2D299EC8DE155EE9D0479180
                                                            SHA-256:43EB79ABC03CBAC661C563DE1BC09D9DD855CBC72DD2B6467EA98F0F90421BA9
                                                            SHA-512:B58B35EA1B2F0388B8108DCF254F3BD1B21894F00A9F313ABC093BC52C36FCDD94B7486DBA38161C9EFCDB12BC3CD81E7E02395B0CA480A7F01148C43CD3054F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Jujuy) {.. {-9223372036854775808 -15672 0 LMT}.. {-2372096328 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2106
                                                            Entropy (8bit):3.744252944523733
                                                            Encrypted:false
                                                            SSDEEP:48:5lduuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0NC:Tou3pfe92jCs/VOHv2kdeRtnxafwwkFP
                                                            MD5:4A45A063D45EB94214005EF3CA5BCD6D
                                                            SHA1:2420E8591DC53A39EE1A58B2E45DCFAF9503685F
                                                            SHA-256:2B018B791E48269FA9EDA12662FFEC3E2DC33603A918E8B735B8D7D6BEB3B3AA
                                                            SHA-512:0B2824FA3D40B2EDBE8488D50C30368F4CF6E45A39FF6DEBC5BB4FD86F85AD52F5331AD1EB50E5166FA2E735B7E8AA9D94A5FED9421334DB0499524DBE08F737
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/La_Rioja) {.. {-9223372036854775808 -16044 0 LMT}.. {-2372095956 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2077
                                                            Entropy (8bit):3.738002814507529
                                                            Encrypted:false
                                                            SSDEEP:48:5CPBuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwGSmSc8OSI:GUu3pfe92jCs/VOHv2kdeRtnxafwGJld
                                                            MD5:F6CB24E8567B2443224E9E17EE438BFE
                                                            SHA1:8029426C30C4C645EA77C6240391CDB1C3107568
                                                            SHA-256:DC39400BBFD5BDDDC174FE099194806FBFD3FC3AA20E670D67BE0AC35FE97AD4
                                                            SHA-512:6869CFC24C21FBB2DFCCAA9AE7E21A0B24DC002EE792FB28A8F2F05C75C20E93C95A39BD8653AA272AF10FE95922B99EECC1208AACE814817D9441F84360E867
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Mendoza) {.. {-9223372036854775808 -16516 0 LMT}.. {-2372095484 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2080
                                                            Entropy (8bit):3.7580685839169545
                                                            Encrypted:false
                                                            SSDEEP:48:5oQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0NC:qBu3pfe92jCs/VOHv2kdeRtnxafwwfFP
                                                            MD5:212D13CE27AF114A8EC2E04023D218C4
                                                            SHA1:C4C5F86BC6EC0D5EA4C9CF199309D085767B97E8
                                                            SHA-256:A05B6708DEFF0607396BFC6661C2287341C3432841AE353D94A67AC742B5FAFA
                                                            SHA-512:CE7201EEA6A86FB49641410D2EEE4030EDB1B96F3218D764762F5AE23883C796F5742ED69CEC985A9D3582D6C72ED74114DE81508F6DEB4B54865B6974ADC965
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Rio_Gallegos) {.. {-9223372036854775808 -16612 0 LMT}.. {-2372095388 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2011
                                                            Entropy (8bit):3.7415813345133975
                                                            Encrypted:false
                                                            SSDEEP:48:5NPuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0wF:72u3pfe92jCs/VOHv2kdeRtnxafww3mz
                                                            MD5:A06C33CDFD7E7B630CB1DF34E72E61E5
                                                            SHA1:694826B9B910DA0BD70A9CB547C26E6838B08111
                                                            SHA-256:CAEFC60F2F36EF9FFE0C5921C3C392DE1E95755683A96C1C4EC0BA2C242A4D84
                                                            SHA-512:D6696A6C14EECF2B77EC586F40137BDD95E5CE5C5193570C809FAB9E5FCA4B8744283CEB6818E525C73F6EFF657274410B2622902EE8C15912C8D5F5FA5C805E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Salta) {.. {-9223372036854775808 -15700 0 LMT}.. {-2372096300 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2106
                                                            Entropy (8bit):3.747934819596411
                                                            Encrypted:false
                                                            SSDEEP:48:5vXxuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0K:hUu3pfe92jCs/VOHv2kdeRtnxafwwkFl
                                                            MD5:32A50D0ABF408D9E59C0580D5B8CC472
                                                            SHA1:EA5BB8860982F8BAFEAEFDE1D6ACD440DA132DFE
                                                            SHA-256:41B2C25E42146A76934B866061BB3245B8ADA0FF4E1BFBA6F8842A30BDD5C132
                                                            SHA-512:E5D2521A4EF53AAD3E74506708EC2768C4D2EE8D6D014DCCF4A6DC290B713B4D46021B66527548C35004E10D753E1B685EEFD55BBE7BF01EC6104D7D8AAC4403
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Juan) {.. {-9223372036854775808 -16444 0 LMT}.. {-2372095556 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2081
                                                            Entropy (8bit):3.7399269084699975
                                                            Encrypted:false
                                                            SSDEEP:48:5MDuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafw6bS2nZSbdI:yCu3pfe92jCs/VOHv2kdeRtnxafwWnZr
                                                            MD5:FB06B66F5D41709C7E85C8B1E9BFCFA0
                                                            SHA1:D5C0C4B12C6190856C300321B1C106C7474BA54B
                                                            SHA-256:A43B35F25E54EF359D046E33281C0A978F0EE8811C93A6809F1F65750878BBB6
                                                            SHA-512:D445F46D6A17A075AD995885E45234A711F53BF3FE2DFC6DFBB611E8AC154B10C91E137927DD66D6A7C596A93BAE5DE283796F341B5095FA0DD05595E1C3A077
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Luis) {.. {-9223372036854775808 -15924 0 LMT}.. {-2372096076 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2105
                                                            Entropy (8bit):3.741704529449777
                                                            Encrypted:false
                                                            SSDEEP:48:5yZujuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OSf:suiu3pfe92jCs/VOHv2kdeRtnxafww3w
                                                            MD5:D9497141EC0DC172E5FF5304FED0BE6B
                                                            SHA1:CD20A4F0C127A84791093010D59DF119DD32340A
                                                            SHA-256:0F7DB23E1280FC19A1FB716E09A9699ADA2AAE24084CAD472B4C325CC9783CCF
                                                            SHA-512:0B71952055013CD6045ED209FD98168083550655FAB91B7870C92098E40C4FE6827EAAF922D34ECE28298CBB14327A76AD6780D480E552F52F865AA11A4AA083
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Tucuman) {.. {-9223372036854775808 -15652 0 LMT}.. {-2372096348 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2075
                                                            Entropy (8bit):3.7445758155279836
                                                            Encrypted:false
                                                            SSDEEP:48:5SHuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0jE:YOu3pfe92jCs/VOHv2kdeRtnxafwwfFn
                                                            MD5:16A89FD2CDEE50E534301A9797311A9D
                                                            SHA1:4A4EBA1798214C7CF5ACDC0B2EC8B4716CD968CB
                                                            SHA-256:10B6FF51314D8EE1D010187D8805C4E3D71B778BC6DECB26E66193A5BB3E9EA2
                                                            SHA-512:DBB0BA3F8AA2B54C86EA8B6530C16DF95AF1331FC5F843B113A204DA20B8EF011FE93C27EB917D01B9040D4914057687B4AACCD292A847559AF69150D1BDC4B5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Ushuaia) {.. {-9223372036854775808 -16392 0 LMT}.. {-2372095608 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):199
                                                            Entropy (8bit):4.893042770292303
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/V90ppv:MByMYbpwt290/V90b
                                                            MD5:CC015E3E5D3293CAA1348B4E0EE5795C
                                                            SHA1:75E7EFD905C9001CE9CA5872DA3915A19BCB00E0
                                                            SHA-256:7490CD66408B8A14C549278FE67DC3338FE9E458F423F01CCBEA00B5E6F6CEF6
                                                            SHA-512:66523F050E4A42A1C9FC8C02B822CD3864A6E35F6364FB6A675F2A503BD8030FE6E380B252068668A79A6593B5042520EE40700DA033517742B3F0ED33D79DAF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Aruba) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7944
                                                            Entropy (8bit):3.5156463862656775
                                                            Encrypted:false
                                                            SSDEEP:192:j7RXBXLqbvdvZsV4GGdzVUFg7XaMOhKpJq3o5GMJq90vRFhjGF3RxTBhcXBACBLo:jEJgXh
                                                            MD5:181203CAD98E94355B9914A205514904
                                                            SHA1:D361CB53955437270905A9432DE9E7F6C1AE7189
                                                            SHA-256:EAEFE21276EE60C7F876C1D65039999AC069339DCDB82A23FC9206C274510575
                                                            SHA-512:AE9262DFC35579AEB610DF8BB5F7FBB49232195F55F78402405017681F72C0D2A09FA9EB605B406065A1F44FE6785AC0163870C921DAFFC4746DA6EDA3081521
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Asuncion) {.. {-9223372036854775808 -13840 0 LMT}.. {-2524507760 -13840 0 AMT}.. {-1206389360 -14400 0 -04}.. {86760000 -10800 0 -03}.. {134017200 -14400 0 -04}.. {162878400 -14400 0 -04}.. {181368000 -10800 1 -04}.. {194497200 -14400 0 -04}.. {212990400 -10800 1 -04}.. {226033200 -14400 0 -04}.. {244526400 -10800 1 -04}.. {257569200 -14400 0 -04}.. {276062400 -10800 1 -04}.. {291783600 -14400 0 -04}.. {307598400 -10800 1 -04}.. {323406000 -14400 0 -04}.. {339220800 -10800 1 -04}.. {354942000 -14400 0 -04}.. {370756800 -10800 1 -04}.. {386478000 -14400 0 -04}.. {402292800 -10800 1 -04}.. {418014000 -14400 0 -04}.. {433828800 -10800 1 -04}.. {449636400 -14400 0 -04}.. {465451200 -10800 1 -04}.. {481172400 -14400 0 -04}.. {496987200 -10800 1 -04}.. {512708400 -14400 0 -04}.. {528523200 -10800 1 -04}.. {544244400 -14400 0 -04}.. {5
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.791603790249234
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE/qlOi+4IAcGEu5B:SlSWB9vsM3y7oDSHAIgpdN/290/qlf+M
                                                            MD5:5A45B70C79F533548B3DD332F988E15B
                                                            SHA1:C7485828619A1D4F5CA59D80ABD197100AC58F64
                                                            SHA-256:518BEB6E54AE811F8C725EA8CC42787D48FC605A3476D6E7A00A1B5733CBD6AC
                                                            SHA-512:A81C2EBE282E019ED011EADDB8F74C3E6FBE88D87E8D8706B3022CDCC48EF92AD90F9BCF9F25031664BB6EFE069EAFDD23D9B55BF672FC7528A2DD8CB6B986B4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Atikokan) $TZData(:America/Panama)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):177
                                                            Entropy (8bit):4.812527147763069
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/2IAcGE/ol7x+IAcGs:SlSWB9vsM3y7/yrHAIgp/yH0AN/290/e
                                                            MD5:13479F64BFBDC7583C637E1562C454B4
                                                            SHA1:2F59484C779B0D6033FC14E205DA9BCAB7A5FCB1
                                                            SHA-256:1D6FEE336E71FFFB64874A830C976867C071EBF6B133C296B32F87E3E7D814C9
                                                            SHA-512:D2C5D35BBBDAB8D58BF6185328124796C06B67ADFB4C1828BA5A9CCA500A01BB8BE69635AE7EEA7FA837A27B20D488A08A29B121DD1617BC373390AD95D67E39
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:America/Atka) $TZData(:America/Adak)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2012
                                                            Entropy (8bit):3.703391569010329
                                                            Encrypted:false
                                                            SSDEEP:48:5/ChlvEw6kSSx5H4a8tf3fku+da2XUd23t8VZDG8+GyOd:VIlvEwJSSxdF8tfMu+da2kdCt8VZy8+K
                                                            MD5:69DCC2477D8D81E2F49D295DB6907190
                                                            SHA1:3C6ED0CEF15D3265C962873480EE1809A4DCACA2
                                                            SHA-256:64F1EC14F6B43FF10B564F839152E88DF9262F0947D1DB347557FA902F6FD48C
                                                            SHA-512:71DEA6D47F267AA7326A011872FA74762FA4F8CD57EB149E3B56B3DE9097B0B9258BC4F6C29188B49FC60C1942869B92D9E59FEE6980A5DA5D0029C383D99F39
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia) {.. {-9223372036854775808 -9244 0 LMT}.. {-1767216356 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2073
                                                            Entropy (8bit):4.021485901155292
                                                            Encrypted:false
                                                            SSDEEP:24:56hey9WUQwuz/V/NF01Y3A6S++S+vS+QQS+1S+9fS+BrS+HoS+8S+/N5S+5zNZf+:5pUIdFS1Y3FUlWQnH7eelN5Lh9LY5Lj
                                                            MD5:4655AE5AB9C39CA05C1FF36FC366679F
                                                            SHA1:F3F1D08EC35907A8F45AA2CFD097F6DCCA75C9B8
                                                            SHA-256:A6233E5BB0D3B30D0E3B94CD797718041AC3C2E75B387D6646A5C0376C5591CD
                                                            SHA-512:3915B845A312147C5B047096033B3D153E4E83AF4C8E4AAA73C8D12E2A8386CFE8EC4568730F9F28863017A60622DD9CC7D97991C966779B4068BC29F6C6B2B3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia_Banderas) {.. {-9223372036854775808 -25260 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):648
                                                            Entropy (8bit):4.251560000277241
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290eWmdH9Colj/uFkv/lC1/uFkOzQs/lps/Ozfah/OzT/lN/uFkX/ll/uFki:5TWeUo5Skv/Y1SkA/g/Bh/m/rSkX/zSt
                                                            MD5:DC4FA44B2174A4E6F0644FA8EA2E83F9
                                                            SHA1:C12DF8C862A05D569EAF189272F8BF44303595A1
                                                            SHA-256:FD5E04136506C6543A9ACDC890A30BCF0D561148E1063EC857E3913DE1EBA404
                                                            SHA-512:5AC307CD48132B57215CCBAF0BB63F7FA9C5B28DC9F6217C905885D75B0DF131238D4DB2AE707C3DDEE2EDE6C0914644B435FB1CDD9913600D8B69AE95578B0F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Barbados) {.. {-9223372036854775808 -14309 0 LMT}.. {-1841256091 -14400 0 AST}.. {-874263600 -10800 1 ADT}.. {-862682400 -14400 0 AST}.. {-841604400 -10800 1 ADT}.. {-830714400 -14400 0 AST}.. {-820526400 -14400 0 -0330}.. {-811882800 -12600 1 AST}.. {-798660000 -14400 0 -0330}.. {-788904000 -14400 0 AST}.. {234943200 -10800 1 ADT}.. {244616400 -14400 0 AST}.. {261554400 -10800 1 ADT}.. {276066000 -14400 0 AST}.. {293004000 -10800 1 ADT}.. {307515600 -14400 0 AST}.. {325058400 -10800 1 ADT}.. {338706000 -14400 0 AST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1031
                                                            Entropy (8bit):3.8842563546204225
                                                            Encrypted:false
                                                            SSDEEP:24:5fe300cChlrLPsw6kSS3h5R14eH8tf3xd:5+CChlvEw6kSSx5H4a8tf3xd
                                                            MD5:DFA5E50F6AEF1311A4CF74970477E390
                                                            SHA1:5B63676EB8039B2BE767BAA44820F2DAE5B62876
                                                            SHA-256:549625CCB30BD0E025BAC47668BA3AA0CDD8569E5887E483C8D62B5B7302FA50
                                                            SHA-512:4BBB43694E3B54339C549AC3A5488B77366DB1189D8D1834DCF618D9448084A950B575E207064521B1CDFD2E41F7D1D8C5CD9CEB4668D4459585649556136EB0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belem) {.. {-9223372036854775808 -11636 0 LMT}.. {-1767213964 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3284
                                                            Entropy (8bit):3.8546064195941097
                                                            Encrypted:false
                                                            SSDEEP:48:5pKSxZwR9IVQU55DG5krgGN8wW+YeD1yyfCwoc:HKSjgIVzrG5krRN8wWheD1yu
                                                            MD5:4DA622B685B3B075CC94FC4E23322547
                                                            SHA1:DEB23F0A434549DAE1BE60ACF757BB212C907B92
                                                            SHA-256:E07F45264E28FD5AA54BD48CB701658509829CF989EC9BD79498D070A1BA270F
                                                            SHA-512:9B00BF8870BC4AAEF7F06FCDFEEEF54686A2CC890103696631EB4DEF5AEEAD051EC9069D70A2B22397F18C0067E03A54E75DA18474D6B1BD3BDA2D5313E0AD16
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belize) {.. {-9223372036854775808 -21168 0 LMT}.. {-1822500432 -21600 0 CST}.. {-1616954400 -19800 1 -0530}.. {-1606069800 -21600 0 CST}.. {-1585504800 -19800 1 -0530}.. {-1574015400 -21600 0 CST}.. {-1554055200 -19800 1 -0530}.. {-1542565800 -21600 0 CST}.. {-1522605600 -19800 1 -0530}.. {-1511116200 -21600 0 CST}.. {-1490551200 -19800 1 -0530}.. {-1479666600 -21600 0 CST}.. {-1459101600 -19800 1 -0530}.. {-1448217000 -21600 0 CST}.. {-1427652000 -19800 1 -0530}.. {-1416162600 -21600 0 CST}.. {-1396202400 -19800 1 -0530}.. {-1384713000 -21600 0 CST}.. {-1364752800 -19800 1 -0530}.. {-1353263400 -21600 0 CST}.. {-1333303200 -19800 1 -0530}.. {-1321813800 -21600 0 CST}.. {-1301248800 -19800 1 -0530}.. {-1290364200 -21600 0 CST}.. {-1269799200 -19800 1 -0530}.. {-1258914600 -21600 0 CST}.. {-1238349600 -19800 1 -0530}.. {-1226860200 -21600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):206
                                                            Entropy (8bit):4.938043196147077
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290F490ppv:MByMYbpwt290S90b
                                                            MD5:09FD8280CC890F238126F9641DB7C90E
                                                            SHA1:98AB4E0DE8173C2BB2532B07FAE2E71F588AB26F
                                                            SHA-256:FACD0A835D1F425CD323EE453ADE231810B2D1CF6EBA227BA1B50522AE3879F7
                                                            SHA-512:117C24389B7BFB079F4409B1FA6AA547654D7C69A6CBB19218BF2B96F6CFE3CBAAD400D4C2EFE8A9BFE25F44402057427FC8A62DC20A98018D23A7CF9B87401F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Blanc-Sablon) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1199
                                                            Entropy (8bit):3.7988385604912893
                                                            Encrypted:false
                                                            SSDEEP:24:5EThevwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQZ:5EHSeSFESoSQSrSsCSeSPS1cSQSQlSsp
                                                            MD5:9529221F9B4E104CC598491703B10E6C
                                                            SHA1:5ACD61B525A18DE1919A7484C92EC5D787DF2F25
                                                            SHA-256:10592EA1CB0D02C06A61059EC601F70A706A5053AC923B9EED29388D5E71EF3A
                                                            SHA-512:66BEDB631469651A5E426155428764E3C1C14483E6FEE1505812E8676EB6E82CF0A88F6CC697F03FDA0AF906D91C7DE6E940DF3D33DD247BEF51DBD9A13DEE16
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boa_Vista) {.. {-9223372036854775808 -14560 0 LMT}.. {-1767211040 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):246
                                                            Entropy (8bit):4.69807324941896
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/290bJhDm2OHDgoHvcuknov/zEXPKV2kR/uFhU/KVg:MB86290bLmdHDgCvcukCz8O2Y/uF2/Og
                                                            MD5:AA84D4825AF12087954CCBE711D8A888
                                                            SHA1:364913969307A2C04A0C85391B297FE9DFFB4F78
                                                            SHA-256:23DAAA64D1A902A24A3D0772B078E771562CAE4A1A0FE786C3C704643AE4D24A
                                                            SHA-512:CD902554CEC573120C1F8FF9E026927A1C43D1D2B4DB0E0F0CAD5D192211C540ABCCAF8E53DAF43B4ECE1012DAA624109AEF0073E109FA3191EDDED03D9F4C07
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bogota) {.. {-9223372036854775808 -17776 0 LMT}.. {-2707671824 -17776 0 BMT}.. {-1739041424 -18000 0 -05}.. {704869200 -14400 1 -05}.. {729057600 -18000 0 -05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8605
                                                            Entropy (8bit):3.8563913604109064
                                                            Encrypted:false
                                                            SSDEEP:96:eSwtktXNmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/jXNDPlLv/PCenJzS6cy
                                                            MD5:005D0BF1320030A7E9CDC97D0C8BB44B
                                                            SHA1:CB236DA840A49B4BCD261114DCA38DADA567B091
                                                            SHA-256:93AF910CB2AD2203B71C1AD49D56DF4A4A14D07F885AFD4E755271F1372A517C
                                                            SHA-512:16A5483392741673BEC020EF6EBE963AB0FB12629D662C586C27A1E9A1BE3FEA8DC3D05A0E84917B8166E48CADA45C74DFABFDC897A6BC94D3C5058D31AD5126
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boise) {.. {-9223372036854775808 -27889 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-1471788000 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126255600 -25200 0 MST}.. {129114000 -21600 0 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):239
                                                            Entropy (8bit):4.821972751564724
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MQA+zAHAIgp/MQA+zE5N/290BFzk5h490/MQA+zd:MByMY/MV+zhp/MV+zE5t290rzy490/MW
                                                            MD5:6700956D5FE96CEC8D34EB49FF805374
                                                            SHA1:69B9973EF31AE204EFED7485E59CEA99E00815C8
                                                            SHA-256:DEFC5C9DA2D4D4146145A50D692A6BFF698C3B0A1F19EFD82AD0EE7678F39FCF
                                                            SHA-512:A80C03A519F00A4270248E885463090A34B3992B3DEBA94DD6AEBCC50736541655461E4AA10856125B8EF9B92CEB697429EE7088DBC6AB4FAE383FDF11521B7A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Buenos_Aires)]} {.. LoadTimeZoneFile America/Argentina/Buenos_Aires..}..set TZData(:America/Buenos_Aires) $TZData(:America/Argentina/Buenos_Aires)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8154
                                                            Entropy (8bit):3.865968458565713
                                                            Encrypted:false
                                                            SSDEEP:96:z+bOGaLV9T1sF7Lv/PCewtA8CzSPyDLbrcUia:6f5lLv/PCenJzS6cy
                                                            MD5:DBF49625E87C9C44748A2C6D51BB1015
                                                            SHA1:A135E864687DB354B4C6195986EA29F8F08B3F08
                                                            SHA-256:172706B4ABBC9B8AFA07069CE49223208601D9DC55A986B5814D2D5E5ED73672
                                                            SHA-512:66FE34FF31C5558DBCE9A22BB18B8830C92CABC0E588C92770121244AAC02FA9EE237D7E56028FB6ADD2E0148A8F8E67C3BEC5F8B369EEA5239FA1F1F81C3626
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cambridge_Bay) {.. {-9223372036854775808 0 0 -00}.. {-1577923200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {136371600 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {167821200 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1 MDT}.. {247046400 -25200 0 MST}.. {262774800 -21600 1 MDT}.. {278496000 -25200 0 MST}.. {294224400 -21600 1 MDT}.. {309945600 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {4
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2918
                                                            Entropy (8bit):3.6039149423727013
                                                            Encrypted:false
                                                            SSDEEP:48:591PSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxSs:5VsE3LMuJALTvn1ZdP7ZbvLfeAh+KIic
                                                            MD5:230A9F7A87BA56C30ACB3B1732F823F3
                                                            SHA1:8263EA723F2AEA7740C7EC54BE0000A06982D765
                                                            SHA-256:6D5BD1355016B03EDEA58DF98BEC26281CD372725B2DCB60B4D748D2FB4346C8
                                                            SHA-512:C357AA33833DBBDC6BC7DD3F23469EADDF08564AF17D7EE935C8AEA5F35B6E3BBDE1E181BC0DBF264051C4BE139261055633D191413DD610B0150AB3CDE161AF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Campo_Grande) {.. {-9223372036854775808 -13108 0 LMT}.. {-1767212492 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1412
                                                            Entropy (8bit):4.034087321254386
                                                            Encrypted:false
                                                            SSDEEP:24:5s5edTS/uVV3iVP/uaP/uAyAhbS+V8S+FfS+UvS+MS+FB3S+QS+rcS+kS+RS+dSB:5DziZAmELf0On9uhcinzPPoUlWQW3
                                                            MD5:7FBCA91F4B7100C4667F24A9AB263109
                                                            SHA1:163A77FF9EAC49B00B5F838DF4D47F079ECF6A83
                                                            SHA-256:FD6C370F82E5CFE374637E0E222E72570857AC3F85143BEEEF9C3D0E7A6C0D04
                                                            SHA-512:124A5D7F58B38F15A90BA48E63D1D38335371D98A2503E691EC6426EB51E87FD61CA05FCA83573DD1DC06DB9E599302C64D226D5DF13B8A62E0A6943318431BE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cancun) {.. {-9223372036854775808 -20824 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {828860400 -14400 1 EDT}.. {846396000 -18000 0 EST}.. {860310000 -14400 1 EDT}.. {877845600 -18000 0 EST}.. {891759600 -14400 1 EDT}.. {902041200 -18000 0 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):284
                                                            Entropy (8bit):4.588048586971241
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2909+ETlDm2OHXoHv8HkISlvFVFQVgVJUF/R/OXFxWnVVFQVgVVvR/e:MB86290XmdHXCvydSltvAUeFZ/O/qVva
                                                            MD5:5DDB49759D58931A06740A14F76B431C
                                                            SHA1:E9AC99265D42D140E12BB4DAAA24FABAC65E79FA
                                                            SHA-256:D558C25F165E956E980AA8F554AB3BF24E91B51EADBD2B1065EF6DFDA0E2F984
                                                            SHA-512:318804ED41F36A3A8746C8CD286116787A768B06CAD6057559D1C7105170DE6EAB807EFA52AA8A0E353491B6F8C47D623D4473C1AEAD20B5C00747E07BB282B2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Caracas) {.. {-9223372036854775808 -16064 0 LMT}.. {-2524505536 -16060 0 CMT}.. {-1826739140 -16200 0 -0430}.. {-157750200 -14400 0 -04}.. {1197183600 -16200 0 -0430}.. {1462086000 -14400 0 -04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):227
                                                            Entropy (8bit):4.666638841481612
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/29094SXAFB5290/MMXAy:MByMY/MYp/MrRt290mh5290/MK
                                                            MD5:EEB851BE330BCC44A4831763534058B9
                                                            SHA1:A5FC3E69DDBD3C40D9EB4317BBD5BB6C78751B36
                                                            SHA-256:37CD6BDAA6C6EEDFAC3288CA1C11F5CBBE8A17E5F2E790E7635A64B867AFBD87
                                                            SHA-512:7CD0BC822550325EB3198B4AD6CCD38938FA654A03A09C53117560D1FE3FDCD9C892D105F0D7AF44ED52DD7E0475721240D74A10C98619BE9EC4F5410B8FD87D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Catamarca) $TZData(:America/Argentina/Catamarca)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.832612867310476
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGE91INMXGm2OHEFvpoeoHsdR4FIUPvGXFkUwXvp3VVV:SlSWB9eg/2909qDm2OHEdGeoHm4vOXF6
                                                            MD5:6052E52C8E5A5F43102C47D895797A1F
                                                            SHA1:23DBD40AE96C84E44ADCD1AC33E7871D217C17BC
                                                            SHA-256:873285F3E13CB68DD28EB109ECAD8D260E11A9FF6DF6A4E8E0D4C00B0182695B
                                                            SHA-512:DDE89C70B6F24AD4F585DC5424A6D029E5C898254C9085C588AE699CED4C8316840FF7C87685D7CFAA2E689F01687985454A0C9E3886342E936C56AB688DF732
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cayenne) {.. {-9223372036854775808 -12560 0 LMT}.. {-1846269040 -14400 0 -04}.. {-71092800 -10800 0 -03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.774923706273939
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE91mr4IAcGEu5pvn:SlSWB9vsM3y7oDSHAIgpdN/2909Yr49F
                                                            MD5:AD6E086BEDF05A0BEB66990BD9518BEE
                                                            SHA1:FA0B7E8D6931E79092A90F7EECBA2293AE886AE3
                                                            SHA-256:C38C49AE1C3E67BD2118002DCFCC3C0EFB6892FB9B0106908A9282C414D0BF2E
                                                            SHA-512:A1E40422D15DBCB24A6FE353639A1541FAD7F394D20F8AEB32D4E39667BA264C3E815BAA703B88B90D381540168016A0641CA220BACAF05E80EAA698642B6FFA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Cayman) $TZData(:America/Panama)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11372
                                                            Entropy (8bit):3.814348526052702
                                                            Encrypted:false
                                                            SSDEEP:96:l6u30Ke1rdJ8SUklvgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:l1EKwdJ8SUkl4aUqtfA604qSBgI7DBch
                                                            MD5:763E23AA7FB20F8D7CB2F0E87FAFD153
                                                            SHA1:B131A10C1C208BB5E5E178ACD21A679FD0537AC5
                                                            SHA-256:C7707AF88D650F90839E7258356E39D85228B33B6DBCC5C065C3D8733AE28CEE
                                                            SHA-512:FE9C5D2EA253338DDFD79CC8ED2F94D6817BD770C0895752EFB1917E2313735C18475D67191C29BCCD53DEFFF35C1BF0CA5D98C92091DDCD1E97CD6302DC73A4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chicago) {.. {-9223372036854775808 -21036 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-1563724800 -18000 1 CDT}.. {-1551632400 -21600 0 CST}.. {-1538928000 -18000 1 CDT}.. {-1520182800 -21600 0 CST}.. {-1504454400 -18000 1 CDT}.. {-1491757200 -21600 0 CST}.. {-1473004800 -18000 1 CDT}.. {-1459702800 -21600 0 CST}.. {-1441555200 -18000 1 CDT}.. {-1428253200 -21600 0 CST}.. {-1410105600 -18000 1 CDT}.. {-1396803600 -21600 0 CST}.. {-1378656000 -18000 1 CDT}.. {-1365354000 -21600 0 CST}.. {-1347206400 -18000 1 CDT}.. {-1333904400 -21600 0 CST}.. {-1315152000 -18000 1 CDT}.. {-1301850000 -21600 0 CST}.. {-1283702400 -18000 1 CDT}.. {-1270400400 -21600 0 CST}.. {-1252252800 -18000 1 CDT}.. {-1238950800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2040
                                                            Entropy (8bit):4.006586050664275
                                                            Encrypted:false
                                                            SSDEEP:24:5wE2e49WU0S+VS+TjV/NF01YmM/parZ375+XiBn:5wEvU033FS1YrpaV5+yBn
                                                            MD5:67738E07092EDB5A9F484ED5CA217EFB
                                                            SHA1:9E428C67AE4BDACA48D189DF60374F3B6523E120
                                                            SHA-256:93438D65EA8F95691748FF749219FAFA1940469BC61CED0B7CBF995B417F20B4
                                                            SHA-512:57C9FE7EAE37504465F33B2AB079ED91700528E330D227E94AE8A06C58DEFA65F1EA1CDF89F835910D92D037DADB45E684A2EA96512B08F83650DD33CCEB8EB6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chihuahua) {.. {-9223372036854775808 -25460 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):6657
                                                            Entropy (8bit):3.80139797662668
                                                            Encrypted:false
                                                            SSDEEP:48:5T5U9RM/6M/Mp5tyTc8Ln4ypZ9giGuWGwZIoktiz+hL5Cw5feQ5YcT5rBSNNOVQ+:d5LNfzo+C2mWYcNQMsmNTxf6AeO+cblX
                                                            MD5:D4137B6046EE2ABFF42B16B8E5600224
                                                            SHA1:1885B2E30A4973693D3B3AB0546E56F0AC104EDE
                                                            SHA-256:68D45B552D5967172AB7685750C85866D9B4AD25E18C0E837C0CF74B0AB6510D
                                                            SHA-512:78A47479B7BAFE6C28E07A03218AE6059BC992405D58F589CAA99810CEA7F2C5A000EF71B62783C47D0C94B3BE9A5A5C6A477DEA5321B952312A5CA101E987A2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Ciudad_Juarez) {. {-9223372036854775808 -25556 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 1 MDT}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {820476000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {883634400 -21600 0 CST}. {891766800 -21600 0 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600 1 MDT}. {1162108800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.844590153688034
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE9WtEaQXs+IAcGEi:SlSWB9vsM3y7oDSHAIgpdN/2909qEacn
                                                            MD5:A0BF04CD77026DC1D2749848AB0EE45E
                                                            SHA1:EA0F1BC11379DF2E421675BC5DE4805CE94B96D6
                                                            SHA-256:C8CBF5A29CC1D0827390CA6E98B2EFCF90743C6DD0ECA143B300050DD4164041
                                                            SHA-512:61968B4E42ECC60C801F959D18D13187AD39D9B81FA1A947F6B6862F99D73E3A30849AC4233DB5705D46F5373C42D8748B15BE9B82822971B4F47E601E5766D8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Coral_Harbour) $TZData(:America/Panama)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):219
                                                            Entropy (8bit):4.78887878252354
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/29093+90/M7:MByMY/M7p/M16t290c90/M7
                                                            MD5:C7CCF5CEC7AA60D6063D1C30F4263ADC
                                                            SHA1:FD8E9AEEEE50656FD3C694CA051895DDC8E5590B
                                                            SHA-256:28B84710EADEF7AD5E7FA63EF519A9D93996D3BB91DD9018333DE3AC4D8FB8DD
                                                            SHA-512:6974F8B238977EE5222368C4B79327BB240580819FCA082261D6994781144D81E2E8843B4F1C9D07EFBEE27311C8930BDAC9C0D6D6718F6FB1600D0000576CDE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Cordoba) $TZData(:America/Argentina/Cordoba)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):431
                                                            Entropy (8bit):4.506976345480408
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290lnmdHd5CvZN/Mi3yvI8/uF+wSJz/uF+IA/uF+i/X8/uF+ZDVxNv:5mnedIvZN/e5S+w+S+LS+i0S+pB
                                                            MD5:0446EF1A6985A62EDFFB9FFAC7F1DE0E
                                                            SHA1:A43468E120E585E2DCC20205BA1D1E2CCB6C0BC2
                                                            SHA-256:E3061DC6FA9F869F013351A9FDF420448592D7F959C2B4404093432508146F7E
                                                            SHA-512:86D41B0C49489572C3EAEDD5466AA92319C721CCEC9437EBB0F2AAD772FB5ED91A2F2061E00448FB48096B0BAAE9A4E1E644F8AF595B76BE05DBC0C801E6D6ED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Costa_Rica) {.. {-9223372036854775808 -20173 0 LMT}.. {-2524501427 -20173 0 SJMT}.. {-1545071027 -21600 0 CST}.. {288770400 -18000 1 CDT}.. {297234000 -21600 0 CST}.. {320220000 -18000 1 CDT}.. {328683600 -21600 0 CST}.. {664264800 -18000 1 CDT}.. {678344400 -21600 0 CST}.. {695714400 -18000 1 CDT}.. {700635600 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.8664633847782905
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/2IAcGE9mM7x/h4y:SlSWB9vsM3y7OBHAIgpONYyHN/2909vr
                                                            MD5:0757DD22C0E297CCE8E6678ECA4B39C7
                                                            SHA1:81B31299F9A35C8BA2EC1F59EC21129FFCDCD52F
                                                            SHA-256:A01DDB460420C8765CE8EF7A7D031ABD7BDB17CFA548E7C3B8574C388AA21E17
                                                            SHA-512:F1AFC0F6371A10E4CB74FB2C8985610AEE6C3511861BC09384EDC99D250E9099A1F4430BFC3B0B396C2702BF9991A5A4ECFD53A82C92883460715FA2C1E04579
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:America/Creston) $TZData(:America/Phoenix)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2912
                                                            Entropy (8bit):3.588248620238414
                                                            Encrypted:false
                                                            SSDEEP:48:5tSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxS1S4:rVsE3LMuJALTvn1ZdP7ZbvLfeAh+KIil
                                                            MD5:264E0CEA9491B404993594E64F13479F
                                                            SHA1:6D4D277FA470A2C7AD0A59B5DA3CC15BEEB74E78
                                                            SHA-256:2D8281CF3FD9E859C5206F781E264854FA876CB36562A08C6C01343C65F8A508
                                                            SHA-512:759C19B4DD0E1F7F1176872806BFB1F17ADF9C992E41B96FEA67D77DD67E9DD3C1683E3B6D27FB092C731F534C6A7441BACFFF0301907217A064523B86992E23
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cuiaba) {.. {-9223372036854775808 -13460 0 LMT}.. {-1767212140 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.876961543280111
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2909C4e90ppv:MByMYbpwt290690b
                                                            MD5:9459043060E33E8EDC74E78332E96EDF
                                                            SHA1:27963FE063965584D0F226BAE9A08EB2954398F0
                                                            SHA-256:ACCF08CF53C9431E226714DF8BEDE3C91BAF62D5BD7B98CA8B50D7258124D129
                                                            SHA-512:215D9AFAA7227F4447177CE2ABA5A6F7F2F46A9D787845DD32F10D5C22BF9CBE4047AF5E0E66FA7A4F70EEE064A7EC7B67949E565C3C5C60C31F3C19D6915D76
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Curacao) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1128
                                                            Entropy (8bit):3.8794180227436557
                                                            Encrypted:false
                                                            SSDEEP:24:5geNrmFQqFi77FkiVFw1ZFt9SFUXDFH9vMF0mFdS/FyMF8AWXF7HFEJF7cSXHVFS:5/vx7O11pbzvZ+S0xAqe12vey
                                                            MD5:6E37A78AC686A6B48A78541E1900E33C
                                                            SHA1:D41F39FDB6D45921B57341E95A006251B4875961
                                                            SHA-256:968C56F1D0106E1D92C7B094EEF528B6EE1FFA3D7A18BE2F2BA59178C2C0F1E0
                                                            SHA-512:397623149D95FF9A094750EE697F62DF90124BBBE407FB49FBAE335A61629449F2A61EF4471DBD57745B323DFCF3628611CAE9295F2EF7E4A7412A697651FF68
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Danmarkshavn) {.. {-9223372036854775808 -4480 0 LMT}.. {-1686091520 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -72
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3028
                                                            Entropy (8bit):3.9546287557089177
                                                            Encrypted:false
                                                            SSDEEP:24:5IeVvxBn4nRfngnjSXrwIwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZg7yA:5zxKfpj/AOZFCARCeQbvb5wxMN6Ix
                                                            MD5:DDDAA5386F94219C84F966851693B86B
                                                            SHA1:9B084FA2B323F4AF2BD3BC5962030A329FB68A27
                                                            SHA-256:685A9281E2E864562D35EFDDD39F553B89192C7FE0CE9F29CF51B8332A88A843
                                                            SHA-512:D09B5B12317D27B2E9EEE6FBD745FCD67C6ED1DFC2828997C46537622D474BF458D79831CC0635702321E10008EFC57B4958AA9CB26746F411E60088FFD4C306
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson) {.. {-9223372036854775808 -33460 0 LMT}.. {-2188996940 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-157734000 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {120646800 -28800 0 PST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -28800 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1940
                                                            Entropy (8bit):4.024810417421672
                                                            Encrypted:false
                                                            SSDEEP:24:5/eUv5wk7Zw9JmnRsw78wP+7bw+7zwN7SynwpBZ7Fwk47H+wW73wo5775w572Iwl:5DuY/YRRvkGZ+R64CjSUlTGS
                                                            MD5:7868720D39782147B2BD6B039A5BF7E0
                                                            SHA1:6F66404E5CCFF7F020269A316D792D5E7AD4C280
                                                            SHA-256:540804BECDEAB92340EF02D32A62BFD550B71A3DB8D829BE426EE4D210004643
                                                            SHA-512:9CCD124FF954CA2988F07286FFE9ED740E0CEF5F4D76BF090367B74A577E91BF5590EDFE12AFC83ACF5CBFC88C5A68867C58082A2777D08C326A7B18889B08E2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson_Creek) {.. {-9223372036854775808 -28856 0 LMT}.. {-2713881544 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400082400 -25200 1 PDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8920
                                                            Entropy (8bit):3.8540632258197514
                                                            Encrypted:false
                                                            SSDEEP:96:gjGtwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:gUwDPlLv/PCenJzS6cy
                                                            MD5:0D649599A899ECB3FCF2783DCEE3E37B
                                                            SHA1:ACC796BE75F41A12FB1F8CCBD2B2839AF9876FFE
                                                            SHA-256:3FE2EE8C05C5D6F268B58BD9FC3E3A845DEA257473B29F7B3FB403E917448F3C
                                                            SHA-512:C10D41AB95439B8E978F12F9F58D1ACC9AD15404123FA5FBA0D1CC716E5CF5DA6BD2252450055AC3998DBCB8DD49F7A82ACD53413E3EE78CDA2C42F603DE2C56
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Denver) {.. {-9223372036854775808 -25196 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-1577898000 -25200 0 MST}.. {-1570374000 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1538924400 -21600 1 MDT}.. {-1534089600 -25200 0 MST}.. {-883587600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-757357200 -25200 0 MST}.. {-147884400 -21600 1 MDT}.. {-131558400 -25200 0 MST}.. {-116434800 -21600 1 MDT}.. {-100108800 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -2
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8430
                                                            Entropy (8bit):3.826664943157435
                                                            Encrypted:false
                                                            SSDEEP:96:SGiS1A5tCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:SG/K5ItON0HY2iUmUFLqU
                                                            MD5:2BBA922E9377D257CBDF6E1367BBB1A2
                                                            SHA1:6F33A44834E8041E78660A326A5DDAF3D7F9DC2A
                                                            SHA-256:84F6897B87D3978D30D35097B78C55434CE55EB65D6E488A391DFC3B3BB5A8FE
                                                            SHA-512:D225824945C08A3521A8288B92B26DFFA712ED3505E72DEDE4A7D1777E58DEA79ADF3F042D22624E4142DD4203BAA4DFF8EB08B7033FDF00059F6C39954EA1A1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Detroit) {.. {-9223372036854775808 -19931 0 LMT}.. {-2051202469 -21600 0 CST}.. {-1724083200 -18000 0 EST}.. {-883594800 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-757364400 -18000 0 EST}.. {-684349200 -14400 1 EDT}.. {-671047200 -18000 0 EST}.. {-80506740 -14400 0 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {94712400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {157784400 -18000 0 EST}.. {167814000 -14400 0 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):202
                                                            Entropy (8bit):4.86856578093135
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290TL3290ppv:MByMYbpwt290Tr290b
                                                            MD5:398D8DBB24CEA2D174EF05F63869C94A
                                                            SHA1:6D0E04165952E873E6ECA33A0E54761B747F0A98
                                                            SHA-256:3DA98AA7D3085845779BE8ED6C93CCBDA92191F17CA67BBF779803E21DA2ABF3
                                                            SHA-512:2652AFD1A3F8A4B84078A964005FE10C64491EC2D47CDE57D5066D07D1D837308FD696F53B9E7B6B0E72F86F9A85128B8CBF5F302F91EADE6D840DF946DE85CD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Dominica) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8600
                                                            Entropy (8bit):3.8579895970456137
                                                            Encrypted:false
                                                            SSDEEP:96:7SabOGaLm911sF7Lv/PCewtA8CzSPyDLbrcUia:7vf4lLv/PCenJzS6cy
                                                            MD5:EBD169ECA4D45EED28BF7B27809361BC
                                                            SHA1:E89C8484A29D792FB6349CFDFDD30C2FA6B78B6B
                                                            SHA-256:026D51D73D30A3710288F440E0C337E44E3A14D0AA2D7B6C6E53AF43FC72A90C
                                                            SHA-512:45C936ED7D4AF95261180547013454AAEC9FA7672B52AC6077DD99D9FEB6DDD57652FE4EC67BF81F1588384F3027A1872E0C72D9CAEB980B66D2CB6EE9B8ABB0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Edmonton) {.. {-9223372036854775808 -27232 0 LMT}.. {-1998663968 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1600614000 -21600 1 MDT}.. {-1596816000 -25200 0 MST}.. {-1567954800 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1536505200 -21600 1 MDT}.. {-1523203200 -25200 0 MST}.. {-1504450800 -21600 1 MDT}.. {-1491753600 -25200 0 MST}.. {-1473001200 -21600 1 MDT}.. {-1459699200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {136371600 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {167821200 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {23072
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1230
                                                            Entropy (8bit):3.7989525000422963
                                                            Encrypted:false
                                                            SSDEEP:24:5OXUepdkZss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6w:5OXCZsMw57XJh4CxUF/A6GTrtSUUhfL0
                                                            MD5:6766E75702D8C2D1C986DFCEFCE554F9
                                                            SHA1:39553F80D82BC0134FAF70C9830B96BDCBCEFF1C
                                                            SHA-256:48FC987E5999EA79F24797E0450FE4DAB7CF320DFAD7A47A8A1E037077EC42C9
                                                            SHA-512:A812D0D4254BB0B7DB7AE116652D2A8F97D22C59F2709A17D1CE435FCFB38B807A4E0ED6EA114A66897E29D85226875FA84D28B254A5D17BD1CBA95FAD8349B7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Eirunepe) {.. {-9223372036854775808 -16768 0 LMT}.. {-1767208832 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {571204800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):279
                                                            Entropy (8bit):4.760311149376001
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/29078iPDm2OHvJ4YoHxHhgdrV/uF+IcmJ3/uF+ivNv:MB8629078AmdHx4YCJSB/uF+QV/uF+w9
                                                            MD5:CEF7277443EB6990E72C7EA7F79A122C
                                                            SHA1:1D3FEA364B3DC129DE3998A1455D5588EBAA6FF8
                                                            SHA-256:C02C6E79398553BD07BEA0BE4B7F0EBDD8BC821595909CFFB49DE4290A0D1D0F
                                                            SHA-512:E6FC530B2CCF010B8D38BC3F49A6859B5C68F4AB604E6305CE75FBE4FC9FF3FCD0187DEBEF6DAE652EEF9695568DBDE31F426E404CC3CC206D78183E0D919234
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/El_Salvador) {.. {-9223372036854775808 -21408 0 LMT}.. {-1546279392 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.836337676384058
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/2IAcGE7JM7QIAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/2907390eB
                                                            MD5:005D9C0E50291616A727CFB74A9FD37E
                                                            SHA1:846AE6720382B4F67B37B4256E45246C81DAF899
                                                            SHA-256:3E363BF82545F24CCE8CFA6EEC97BA6E1C2A7730B2A9CE6C48F784821D308A5D
                                                            SHA-512:452326D11D01825764BC40A77D17444D822F3AA202582233DD8B122798478FA83E3A27A02508EAC4CF0C7922AC2563742D773AA870562AE496B34FBB41FBAD63
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Ensenada) $TZData(:America/Tijuana)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4578
                                                            Entropy (8bit):3.8944281193962818
                                                            Encrypted:false
                                                            SSDEEP:48:5QIgsB/YRRvkGZ+R64CjSUlTG5Al5pj/A1ZFCARCeQbvb5+:6IgzR864CjSETG5sjgZkR/bvt+
                                                            MD5:4A4E023F635C4202018EA9E8F85B5047
                                                            SHA1:38E121FE2D419413E9E791B6C22BFC8D9F7554BC
                                                            SHA-256:AB15023807E7C7D1026C9970D190F1B405D48952464025242C2BB6C6BBB8391A
                                                            SHA-512:F10D21A2C841224879D1C817FC7F477DF582E1BC3603666B55199C098D51D1D5429F8C088C1083C07FC7588AE5C42A1DFBCC6B7C636AD1BE84ED657807A229E5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fort_Nelson) {.. {-9223372036854775808 -29447 0 LMT}.. {-2713880953 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):231
                                                            Entropy (8bit):4.778858143786314
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/290HXYAp4903GK8:MByMY3GK7Kp3GKnt290Hz4903GK8
                                                            MD5:24C369A3091452DCA7AAEBF4F48F5289
                                                            SHA1:2C2174CB16F490689E6FAC17B6D18F4A0DBD2DC9
                                                            SHA-256:C8948616262CF6990739343ABBBD237E572DB49310099E21DD8F9E317F7D11B3
                                                            SHA-512:80F579572754579706B4EEA49BF30456F3231A308E0616DC430E2428A04992412773421542E4F7FE4E4C7491BA88942FA44B49E87E95A2183211AC2AB523B231
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Fort_Wayne) $TZData(:America/Indiana/Indianapolis)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1423
                                                            Entropy (8bit):3.784027854102512
                                                            Encrypted:false
                                                            SSDEEP:24:5MeajcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaIBXR8nd:5rChlvEw6kSSx5H4a8tf3fkuoYVZDNRo
                                                            MD5:E7939C9A3F83D73B82A6DE359365EFD4
                                                            SHA1:06D6E257DA7C317CAFAF6C0B04567A2453CC1660
                                                            SHA-256:C0A836BDAF07F0376B7B0833A0AB3D52BA6E3E1D6F95E247E1AD351CD1096066
                                                            SHA-512:E2BEA04084489B26ADD9A768D2580C1FF7EBAC8A3EA36818F49E85FB14E01500D59D53904F5A17F4DABEF27B4CC2FC3F977EE4C125E5CE739BBE90C130ED3B07
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fortaleza) {.. {-9223372036854775808 -9240 0 LMT}.. {-1767216360 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8372
                                                            Entropy (8bit):3.8225708746657316
                                                            Encrypted:false
                                                            SSDEEP:192:w4lTPB10KvnpNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/BI:wKCC
                                                            MD5:1C8B0B85BB5578E84A4867546111F946
                                                            SHA1:E08A96F5B369FA53BC1F3F839EC14FF9D334F727
                                                            SHA-256:58C207CBD9DE7A7BB15E48A62CEA9F15DA184B945133DEE88EFF29FD8B66B29E
                                                            SHA-512:54CFBF208AB3E58AFB6BEC40265A452A3C4C684D7F278F51D6495FCA544652A1A5E05BC45F600911191B33C936E5D7D43A28FD2B0884AAB9F63B7AD5EFD574A1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Glace_Bay) {.. {-9223372036854775808 -14388 0 LMT}.. {-2131646412 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-536443200 -14400 0 AST}.. {-526500000 -10800 1 ADT}.. {-513198000 -14400 0 AST}.. {-504907200 -14400 0 AST}.. {63086400 -14400 0 AST}.. {73461600 -10800 1 ADT}.. {89182800 -14400 0 AST}.. {104911200 -10800 1 ADT}.. {120632400 -14400 0 AST}.. {126244800 -14400 0 AST}.. {136360800 -10800 1 ADT}.. {152082000 -14400 0 AST}.. {167810400 -10800 1 ADT}.. {183531600 -14400 0 AST}.. {199260000 -10800 1 ADT}.. {215586000 -14400 0 AST}.. {230709600 -10800 1 ADT}.. {247035600 -14400 0 AST}.. {262764000 -10800 1 ADT}.. {278485200 -14400 0 AST}.. {294213600 -10800 1 ADT}.. {309934800 -14400 0 AST}.. {325663200 -10800 1 ADT}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.973070790103308
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wQbSeyXHAIg20wQboAFARL/2IAcGE5GZJ4IAcGEH:SlSWB9vsM3y7lbSeSHAIgplbLFAN/291
                                                            MD5:8263D2B39C2EC3B38A179F8BAD5972DD
                                                            SHA1:18D3462F6846768E16036E860DE90FB345C93047
                                                            SHA-256:5FB2CFBA25CE2F49D4C3911AFF8E7E1FF84EFC2D01F5783772E88246BFBC56AC
                                                            SHA-512:C175CAF972459759553001D48921268E9C6268CED56021BA6339F8CE3DD032DA6180E2B82974D3DCD0DC5F21566DFDBFBE1B6CF24E5E893F2335A449452DB27F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Nuuk)]} {.. LoadTimeZoneFile America/Nuuk..}..set TZData(:America/Godthab) $TZData(:America/Nuuk)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10353
                                                            Entropy (8bit):3.864463676759425
                                                            Encrypted:false
                                                            SSDEEP:192:zfSacO8f7/ewzlrfFj18KvnpNWMPm4bPJvSuYUHgA0G19OBYEi/B51B7/Bm6BTdW:zfSacOI7/V3SuYUHgAuCC
                                                            MD5:0D646C67105FD0525E7CCC79585CE9DF
                                                            SHA1:06D91FDD8FEEDC299E40079569372F97A9AC6F04
                                                            SHA-256:52D2478289682BF95BFB93D64D679E888C9D23C0F68DFFF7E6E34BFC44B3D892
                                                            SHA-512:FD672613C2B65E12425415630A2F489917EB80DDED41338C9AA7D5D3C6B54E52C516A32493593F518DACF22A91D7A9D2C96DB9C5F1BE2C3BB9842D274BDC04FF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Goose_Bay) {.. {-9223372036854775808 -14500 0 LMT}.. {-2713895900 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1096921748 -12600 0 NST}.. {-1072989000 -12600 0 NST}.. {-1061670600 -9000 1 NDT}.. {-1048973400 -12600 0 NST}.. {-1030221000 -9000 1 NDT}.. {-1017523800 -12600 0 NST}.. {-998771400 -9000 1 NDT}.. {-986074200 -12600 0 NST}.. {-966717000 -9000 1 NDT}.. {-954624600 -12600 0 NST}.. {-935267400 -9000 1 NDT}.. {-922570200 -12600 0 NST}.. {-903817800 -9000 1 NDT}.. {-891120600 -12600 0 NST}.. {-872368200 -9000 0 NWT}.. {-769395600 -9000 1 NPT}.. {-765401400 -12600 0 NST}.. {-757369800 -12600 0 NST}.. {-746044200 -9000 1 NDT}.. {-733347000 -12600 0 NST}.. {-714594600 -9000 1 NDT}.. {-701897400 -12600 0 NST}.. {-683145000 -9000 1 NDT}.. {-67044
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7522
                                                            Entropy (8bit):3.84007813579738
                                                            Encrypted:false
                                                            SSDEEP:96:pGStCt/cL1BRv0HY2iU7KKdFL6Aa2K4gSLf8e:pvItOx0HY2iUmUFLqU
                                                            MD5:A17723CE27EC99D1506C45AB1531085B
                                                            SHA1:A83ED7BD09514A829CC8F2EA47BA113F5DCA1090
                                                            SHA-256:560B39485CED4C2A0E85A66EB875331E5879104187D92CB7F05C2F635E34AC99
                                                            SHA-512:110D1253D6915DB046247E4FD3BA9B881146BC3896DE779215E0CC6D1DCC59958C355441955509F5D38E3A3BA166DFD0F2F277000E9E89D6551FBEA0C16974B9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Grand_Turk) {.. {-9223372036854775808 -17072 0 LMT}.. {-2524504528 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {284014800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600 -14400 1 EDT}.. {499240800 -18000 0 EST}.. {514969200 -14400 1 EDT}.. {530690400 -18000 0 EST}.. {544604400 -14400 1 EDT}.. {562140000 -18000 0 EST}.. {576054000 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607503600 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638953200 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671007600 -14400 1 EDT}.. {688543200 -18000 0 EST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.892013473075135
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905Qb90ppv:MByMYbpwt290Ob90b
                                                            MD5:4B9ABEA103F55509550F8B42D88E84B7
                                                            SHA1:E3AA1BCE5E260264E74F77E59C4071B7E496AB41
                                                            SHA-256:EBED070E8E67C5F12FF6E03FE508BE90789F17C793DFE61237B4045B8222580F
                                                            SHA-512:568E375464FF264C5048CB35995945BDE1D5BCC3A108B2A4D0F8389EBF18B4C58EBB1C2122F10BA777D512504A59C7EFDF6069EABD2A5DEA3189204B7F7A6EB4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Grenada) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.9138787435596765
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905AJLr490ppv:MByMYbpwt290qJLr490b
                                                            MD5:92B091A06198E233B73DF12DFCD818D5
                                                            SHA1:C529488D09F86755E4F22CB4F0E3013C3A1B978D
                                                            SHA-256:6CB1930532831D12057FCB484C60DB64A60A4F6D8195DAFD464826923116A294
                                                            SHA-512:55EAE03CDECAC43BEDD3AA1A32C632A46808F29FF4D97A330F818544E4D10B9E9BA909D6627C38065EB7AC8E2C395FA37797F532CCFC8AB89D4698CCDE17F985
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Guadeloupe) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):399
                                                            Entropy (8bit):4.513185345162455
                                                            Encrypted:false
                                                            SSDEEP:12:MB862906GGmdHKznC972f/uF+mP/uF+K67Jqd3/uF+eBxE/uF+DAWNv:5neQCgfS+6S+K67Yd3S+e0S+1
                                                            MD5:569CDE7CE1AB84C0F16A25E85A418334
                                                            SHA1:EADE79AB6EDD98C7FE8B10B480C5C530CA014F5C
                                                            SHA-256:14F6A98D602F3648C816B110F3A0BA375E1FFE8FA06BEEAB419DC1ABFA6EDCAF
                                                            SHA-512:AE2ACBF09EED857906811BE2984D6BF92BF2955A9FE2F9F3FFEBB6790902F5C2C870F8561CA13AD9CB7826EECA434BED7CFE7D0D2739996BACEE506D0EB730DC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guatemala) {.. {-9223372036854775808 -21724 0 LMT}.. {-1617040676 -21600 0 CST}.. {123055200 -18000 1 CDT}.. {130914000 -21600 0 CST}.. {422344800 -18000 1 CDT}.. {433054800 -21600 0 CST}.. {669708000 -18000 1 CDT}.. {684219600 -21600 0 CST}.. {1146376800 -18000 1 CDT}.. {1159678800 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):249
                                                            Entropy (8bit):4.745656594295655
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2905xDm2OHHjGeoHv5laITicKpKV0EX/uFhfF/KVg:MB86290jmdHHLCv5FT/gOR/uFpF/Og
                                                            MD5:DF661E312C6CE279CD6829120BE33CF2
                                                            SHA1:4ACDB31E27EF9175C5452BF95F94F9BC280A237F
                                                            SHA-256:6806AA5814BDC679C6EF653C518D2699114BE71D973F49C0864F622038DC2048
                                                            SHA-512:04E7FD01F4DAD981EE8A02487F4A889015C41D07D6DCF420183D387E2188FF3239E345B5D65FB195CA485F5C7B4AD8CFEF51FFFC11EE0C91F0C88FF7B7EF17C1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guayaquil) {.. {-9223372036854775808 -19160 0 LMT}.. {-2524502440 -18840 0 QMT}.. {-1230749160 -18000 0 -05}.. {722926800 -14400 1 -05}.. {728884800 -18000 0 -05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):248
                                                            Entropy (8bit):4.673559445766137
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2905R3SDm2OHRLx5oH8ZOXFxSyZ1yV/KMMdVVFAKFZ4KVR/ON:MB86290LGmdHBnC8ZODhyV/4d/OeZ4Ke
                                                            MD5:F06C226D8D53EF8859AD91D7EBA5959C
                                                            SHA1:E0B4E6F4ADCB10F1D79FFD928E8684FFE0C0DC5F
                                                            SHA-256:4078D2E361D04A66F22F652E3810CDF7F630CF89399B47E4EC7B1D32B400FD85
                                                            SHA-512:B4385650A0C69B7BD66415CC4BB9FCA854DBB1427E9F2D6C1D8CDB8CCEF9ECBD699C66A83A9AC289DABC5CDBB0A2B044E4097E9A2977AE1802B3BF6E2BB518CF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guyana) {.. {-9223372036854775808 -13959 0 LMT}.. {-1843589241 -14400 0 -04}.. {-1730577600 -13500 0 -0345}.. {176096700 -10800 0 -03}.. {701841600 -14400 0 -04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11124
                                                            Entropy (8bit):3.8106487461849885
                                                            Encrypted:false
                                                            SSDEEP:192:YpQamC9XD81iWQSufutTLBCN8RWnWQ7Z/xVpmtBwXiCDLxcGMe++wzlrfFj10Kvn:2kXCvNc/1/CC
                                                            MD5:6FB9E47841FF397CE36A36C8280E2089
                                                            SHA1:DA210300DC3D94FC3D8BA0A4531341BCA5C5936C
                                                            SHA-256:01E11C7B07925D05E9E1876C310A2B87E0E80EF115D062225212E472B7A964F1
                                                            SHA-512:F61B5A8A7532BBD54A4976DF17A1C6CF51BCC6DC396482FBE169C3081AF27B6CA863F0CDE3E483C59F5A5BD3365592F6984A97173C736B41D3CEEDAD4263A4E5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Halifax) {.. {-9223372036854775808 -15264 0 LMT}.. {-2131645536 -14400 0 AST}.. {-1696276800 -10800 1 ADT}.. {-1680469200 -14400 0 AST}.. {-1640980800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1609444800 -14400 0 AST}.. {-1566763200 -10800 1 ADT}.. {-1557090000 -14400 0 AST}.. {-1535486400 -10800 1 ADT}.. {-1524949200 -14400 0 AST}.. {-1504468800 -10800 1 ADT}.. {-1493413200 -14400 0 AST}.. {-1472414400 -10800 1 ADT}.. {-1461963600 -14400 0 AST}.. {-1440964800 -10800 1 ADT}.. {-1429390800 -14400 0 AST}.. {-1409515200 -10800 1 ADT}.. {-1396731600 -14400 0 AST}.. {-1376856000 -10800 1 ADT}.. {-1366491600 -14400 0 AST}.. {-1346616000 -10800 1 ADT}.. {-1333832400 -14400 0 AST}.. {-1313956800 -10800 1 ADT}.. {-1303678800 -14400 0 AST}.. {-1282507200 -10800 1 ADT}.. {-1272661200 -14400 0 AST}.. {-1251057600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8729
                                                            Entropy (8bit):3.8227313494100867
                                                            Encrypted:false
                                                            SSDEEP:96:BEsWduCtQA/gF6Y3Umjm67yLb5RCzhV28I:BBWACb/gF6Y3UmjBy7
                                                            MD5:564980AECB32F5778422EA15E8956879
                                                            SHA1:545209C95043721C1839CCE5FEFD1A6F2DE3FE5F
                                                            SHA-256:96B62BFBF0C05CF970245597C691F89EBF631175796459642A85287F131D0215
                                                            SHA-512:25FE5DAA55E3466EAE1CDC73918F189403C3360D4E82D72D745FA04A374DE04F479AA9811D6154FC70CC8EA620F18035EA6A3074116806D4405936FA017CE8E6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Havana) {.. {-9223372036854775808 -19768 0 LMT}.. {-2524501832 -19776 0 HMT}.. {-1402813824 -18000 0 CST}.. {-1311534000 -14400 1 CDT}.. {-1300996800 -18000 0 CST}.. {-933534000 -14400 1 CDT}.. {-925675200 -18000 0 CST}.. {-902084400 -14400 1 CDT}.. {-893620800 -18000 0 CST}.. {-870030000 -14400 1 CDT}.. {-862171200 -18000 0 CST}.. {-775681200 -14400 1 CDT}.. {-767822400 -18000 0 CST}.. {-744231600 -14400 1 CDT}.. {-736372800 -18000 0 CST}.. {-144702000 -14400 1 CDT}.. {-134251200 -18000 0 CST}.. {-113425200 -14400 1 CDT}.. {-102542400 -18000 0 CST}.. {-86295600 -14400 1 CDT}.. {-72907200 -18000 0 CST}.. {-54154800 -14400 1 CDT}.. {-41457600 -18000 0 CST}.. {-21495600 -14400 1 CDT}.. {-5774400 -18000 0 CST}.. {9954000 -14400 1 CDT}.. {25675200 -18000 0 CST}.. {41403600 -14400 1 CDT}.. {57729600 -18000 0 CST}.. {73458000 -14400 1 CD
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):616
                                                            Entropy (8bit):4.351214377567366
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290e2mdH5NCtXwl3UXmMMmxL+voudQCvX70qKOV9kYNv:5Ie5k9WUQwuz/Vyu
                                                            MD5:E35A6C6E9DCF0CA34BFA2993CE445D6C
                                                            SHA1:4FF9C7EDBC73B1AE0815661571B7199379AF479C
                                                            SHA-256:C0A87DC3A474D25083F0CEA0C323D8E780D937453CAD23C98AF367D81AC2CA2D
                                                            SHA-512:56A728ABCD3EA91D2492E1331B3F76F31EF5675BCD95A692F9D94F91518B72569FD8DF1BB0515668E8A9BE0347018B391C65761D316903CA27C59883BBE0DE80
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Hermosillo) {.. {-9223372036854775808 -26632 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {915174000 -25200 0 MST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7230
                                                            Entropy (8bit):3.882344472808608
                                                            Encrypted:false
                                                            SSDEEP:96:nys0KHK1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:nyBKHkN0HY2iUmUFLqU
                                                            MD5:7824B3F2D20F16A9DCC8E0F7DC45C1B8
                                                            SHA1:77014A0502DA1342EFA41B64C5613839B627354B
                                                            SHA-256:4B114545167326F066AB3A798180896B43AC6FDC3B80D32BCC917B5A4A2359EB
                                                            SHA-512:03F6A18C03E79E9177D16CD7AB75AC117197638370FA675BC2854A5A563021F865F3F0672B237B83098787AB9D419AC33D67F28324B1E25AD8560B5838F70807
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Indianapolis) {.. {-9223372036854775808 -20678 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-900259200 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8755
                                                            Entropy (8bit):3.8394539560522585
                                                            Encrypted:false
                                                            SSDEEP:96:+q2KeNrdJ8SvAgahLi8hDlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:+FKUdJ8SvPaUqbA604qSBgI7DBch
                                                            MD5:8AF080A022DA0737E94742C50EAAC62E
                                                            SHA1:704F0565B53AA8A20F70B79A7958D4D07085E07A
                                                            SHA-256:F1253F5F3F5AACD1A5E1F4636DD4E083F4B2A8BD995CF3E684CDD384641849F1
                                                            SHA-512:26AAF6D24B2E2B60451E19A514533DFAEC74F01F9B1AEB9F86690669C14130D77AE1CBFB9FC9091E1CD1FC1CBC2799BB05026DB68768C3CCB960355C18D111ED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Knox) {.. {-9223372036854775808 -20790 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-725824800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-447267600 -21600 0 CST}.. {-431539200 -18000 1 CDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7273
                                                            Entropy (8bit):3.8700915866109535
                                                            Encrypted:false
                                                            SSDEEP:96:7qvrv7+X1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:7Kv7+bN0HY2iUmUFLqU
                                                            MD5:C1A10440E6CCE4C5052E2510182D9AA7
                                                            SHA1:56D4F3CCA1245D626BADA74CF3F6BAE8034BF58D
                                                            SHA-256:675162381639598E7100E90663D42780F8EE1CB62BD6DA5B948B494F98C02FE3
                                                            SHA-512:96B71472AD38ECFC589F935D9F5F1C8D42C8E942D8772FB6A77F9B9C0E2BD7A07FA61729E57EC02356121518E33797A784679F8DED2FCA3FC79F5C114783DD57
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Marengo) {.. {-9223372036854775808 -20723 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-599594400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7611
                                                            Entropy (8bit):3.87971256165061
                                                            Encrypted:false
                                                            SSDEEP:96:TqervJ8SUklggahyBRP0HY2iU7KKdFL6Aa2K4gSLf8e:TpvJ8SUklvaQN0HY2iUmUFLqU
                                                            MD5:A86042668CD478AFFC05D3383EDEE8FF
                                                            SHA1:6476526F94A247C0ECF3B2813F2C5A4FB93E457E
                                                            SHA-256:23B8FA75CE0A9555DFD84549723A12679FF7FC5FAA58E4B745BA3C547071FF53
                                                            SHA-512:07A5487A087108E6D6E88580865885CA6243EF04BE8263FC913F38CADB8EA016386E8BBAD39F65FD081F1A2F14316FEAF008855E9CF2019B169D9511916AFF67
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Petersburg) {.. {-9223372036854775808 -20947 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-473364000 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 1 CD
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7100
                                                            Entropy (8bit):3.8613085681914607
                                                            Encrypted:false
                                                            SSDEEP:96:yqxrvJ8SUklLgzNA604qSScBgN+4ctDzIVQ/c/3hNxTh:yUvJ8SUkl8BA604qSBgI7DBch
                                                            MD5:E7FE9B7CFBC6505C446056967DEBC87B
                                                            SHA1:81ADAD89F040F62E87D2F26D1D98B3E52710F695
                                                            SHA-256:D368123DB703B55244700876906775837D408C274C5A5801D80B77EADB6D5853
                                                            SHA-512:9C0746DE18C80B548AA443D59BB9971BDC304975717C5FCDEBDE72828ACF408FA1D687F87C42E7B8D6D0284C9F792EA236BF79C815947BE773D07364B630AC99
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Tell_City) {.. {-9223372036854775808 -20823 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 0 EST
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6563
                                                            Entropy (8bit):3.866646181493734
                                                            Encrypted:false
                                                            SSDEEP:96:juqv01BRP0HY2iU7KKdFL6Aa2K4gSLf8e:CoKN0HY2iUmUFLqU
                                                            MD5:2CCFC3980C321ED8A852759C0BCCB12C
                                                            SHA1:A8BFE02E4E71B28EF8E284E808F6EDE7C231F8FF
                                                            SHA-256:0623233AA39A1A82038A56DF255ADF49E648777375B8499491C8897EBEA1CDF1
                                                            SHA-512:A4C77689BC9BF871C756D05BAC4157F0FD324D10AC7D15F3543344C6F8C7FC9218AB7ADFBCE70C8ECCDD6EC15FD7960503FC7A8223FECE6D4227BF0BB04190C7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vevay) {.. {-9223372036854775808 -20416 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-495043200 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {94712400 -18000 0 EST}.. {1136091600 -18000 0 EST}.. {1143961200 -14400 1 EDT}.. {1162101600 -18000 0 EST}.. {1173596400 -14400 1 EDT}.. {1194156000 -18000 0 EST}.. {1205046000 -14400 1 EDT}.. {1225605600 -18000 0 EST}.. {1236495600 -14400 1 EDT}.. {1257055200 -18000 0 EST}.. {1268550000 -144
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7226
                                                            Entropy (8bit):3.879195938909716
                                                            Encrypted:false
                                                            SSDEEP:96:Vq8rdJ5UklpRBRP0HY2iU7KKdFL6Aa2K4gSLf8e:VbdJ5Uklp/N0HY2iUmUFLqU
                                                            MD5:56D1930F5FAE2456DEC6C9AB1B0233E1
                                                            SHA1:F6ED52EF769DF2C015C181BCFF3DC0E24497C768
                                                            SHA-256:B8452B6AA739A78AC6D03806463B03D4175639593E19FAA3CA4B0D0FB77F18C9
                                                            SHA-512:AFCFF383DB441DA9154B639A88700D0604F487A20E830146B14061E485A991AD8DC279AF8C0C2329265CF14C901207B9058157FAA1C039082EB7630916834156
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vincennes) {.. {-9223372036854775808 -21007 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-289414800 -21600 0 CST}.. {-273686400 -18000 1 CDT
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7410
                                                            Entropy (8bit):3.8775722319777968
                                                            Encrypted:false
                                                            SSDEEP:96:uq0KeKrv7c1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:unKxv7yN0HY2iUmUFLqU
                                                            MD5:880526DC23E7BDB00506D7EC2A885907
                                                            SHA1:DB3B13A2A4BF80E7B71C7F0604A0A80EF070B9BA
                                                            SHA-256:4B293FDB7680C4597B8C885333719214492ECF09BD5EA342D1EC15F2BF9C8605
                                                            SHA-512:42EEDC5EA28781D62A457F4843F38D0A3FEFCAD83BA01B07CEF0FA169C6440960E04BABD272C5E9AF2F4B0DBB2A786EF9221A48F084F16752E6D0EA66C31911E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Winamac) {.. {-9223372036854775808 -20785 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):233
                                                            Entropy (8bit):4.7047837427916095
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/2903GfJ4903GK8:MByMY3GK7Kp3GKnt2903GfJ4903GK8
                                                            MD5:DEE404D54FD707C4A27F464B5F19D135
                                                            SHA1:AD95D04738F6B15A93DED1DE6B5FA9F47C8E38CB
                                                            SHA-256:437DA148B94DBA4CEA402169878541DB9C3419ABAB6750D1C36625DD3053019E
                                                            SHA-512:421D6AF30F0C64EA6CB9F9DC4E7EF9E8EE5945F81A5E82A6D959D32AD69F325770DB6A07D8F52EFE7EE7F6C3AD4E1F34AA30A6B5E006C928119A54E746D6FE6B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Indianapolis) $TZData(:America/Indiana/Indianapolis)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8053
                                                            Entropy (8bit):3.8653821039202727
                                                            Encrypted:false
                                                            SSDEEP:96:/wIGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/w5PlLv/PCenJzS6cy
                                                            MD5:6BD34D06717C5D9A3697242A5806A4D5
                                                            SHA1:B8A79C3F4F6A272D0E74C44DB0F3FDD326B1056E
                                                            SHA-256:0FFFE17A60FDBB958264704AC03D6F79A6754BDE18C54A663D3CFF9CFE7432F6
                                                            SHA-512:88B7A15013E2CB55ED6985A9D38B65047CF275B31F308B4556BCAD11E9BFF05D26274A3D1FF0F57BBFB08D748F80A321761B6FE0AC5149B01486448B26C558C4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Inuvik) {.. {-9223372036854775808 0 0 -00}.. {-536457600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {136375200 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {167824800 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -21600 0 MDT}.. {309945600 -25200 0 MST}.. {315558000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -2
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8086
                                                            Entropy (8bit):3.827969920963878
                                                            Encrypted:false
                                                            SSDEEP:96:72EtCt/cQ1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:72EIt/N0HY2iUmUFLqU
                                                            MD5:123F07049F1F120E2C5C8A32DF3ADFC4
                                                            SHA1:F02C606A8CB888BD082501E1191C604B17C387D1
                                                            SHA-256:E85ABCABEC22EFEB3DE45545FB1853AC5CBC1900DBEBE3C90E8A868281E64B86
                                                            SHA-512:A3F507D9B7CE0CF541A20C4B662B81CED097FC301D3DAD90DAFC3451F400768EA99ED725A56E8207E990AF31AB8136F5168854D1C37372847F36026C576136BC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Iqaluit) {.. {-9223372036854775808 0 0 -00}.. {-865296000 -14400 0 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {136364400 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {167814000 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):847
                                                            Entropy (8bit):4.206296468996689
                                                            Encrypted:false
                                                            SSDEEP:24:5seRvZGjFS/uk1p/uue/udYR/u+zN5hi/uW9/uoUF0/u8Bb/u33RU/uMZ8/unuR3:5jUjFo1pFGzfAYFqB43RMER3
                                                            MD5:95B59E3EA2A270A34BDF98AA899203C8
                                                            SHA1:93599597797F4BAFE5C75179FB795058B1E3527D
                                                            SHA-256:4B9D5177CBA057CD53D53120A49B8A47ECCB00150018581A84851E9D5437D643
                                                            SHA-512:032BC07F9E92B756A0732AECC2DFEC4C89A58B3D6D3CA57A0F99F2AD1D51676804C7B6CE50EB3B37BB8A1EF382168AC83989D609D37C57308E29B51F1FDEFB1E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Jamaica) {.. {-9223372036854775808 -18430 0 LMT}.. {-2524503170 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {126248400 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {441781200 -18000 0 EST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):211
                                                            Entropy (8bit):4.94277888588308
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MI6HAIgp/MIwRN/290pPGe90/MIz:MByMY/Myp/M9Rt290h390/M4
                                                            MD5:E020D4F9CB1AF91D373CD9F3C2247428
                                                            SHA1:0ADF2E9F8D9F8641E066764BA1BAF068F0332CE9
                                                            SHA-256:4A0495852CD4D0652B82FB57024645916DB8F192EEF9A82AFD580D87F4D496ED
                                                            SHA-512:03190F0E7EC35A358670B1617CB5C17EA3DD41195B2C4B748479D80ABAB4DB395293F688D94B87662D0469F6C5885CF7E7C9A995493A191905753F740DF659E1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Jujuy)]} {.. LoadTimeZoneFile America/Argentina/Jujuy..}..set TZData(:America/Jujuy) $TZData(:America/Argentina/Jujuy)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8682
                                                            Entropy (8bit):3.9620285142779728
                                                            Encrypted:false
                                                            SSDEEP:96:/fCG0rHPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:/aG0rq9DiaJCUbPI+D/iMpCIBSuk
                                                            MD5:8160A0D27EECEF40F6F34A06D5D02BE6
                                                            SHA1:7CAA64F83BAA0C23EE05A72BB1079AA552FA2F3D
                                                            SHA-256:5FBE6A1FA2D3DFE23C7378E425F32BEBCA44735DA25EA075A7E5CE24BFD4049D
                                                            SHA-512:59B8D04595007B45E582E6D17734999074CA67A93F5DF742EFE1EB78DB8ABD359D4C3B213B678C6A46040A13AAB709A994B6A532D720D3EF6FCA2730ABF4885E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Juneau) {.. {-9223372036854775808 54139 0 LMT}.. {-3225223727 -32261 0 LMT}.. {-2188954939 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {309949
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9553
                                                            Entropy (8bit):3.853353361425414
                                                            Encrypted:false
                                                            SSDEEP:96:tfTwKdrdJ9+StCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:tfUKNdJ9+SItON0HY2iUmUFLqU
                                                            MD5:D721B38F1FFF1A6F5C02B72ECC06CDE5
                                                            SHA1:E70D99A9FC1DA9F30389129EE00FE20FA79D66A8
                                                            SHA-256:9EB1F2B19C44A55D6CC9FD1465BAF6535856941C067831E4B5E0494665014BF5
                                                            SHA-512:3C82A8C27026228F359FD96A4306F1BC337DE655FD1BA02C4399162E44DE59AD58CE569DA5AEA36E586C3BDEE7256420AABB84B44D277E244FE5AD771B4BE307
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Louisville) {.. {-9223372036854775808 -20582 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1546279200 -21600 0 CST}.. {-1535904000 -18000 1 CDT}.. {-1525280400 -21600 0 CST}.. {-905097600 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747251940 -18000 1 CDT}.. {-744224400 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8558
                                                            Entropy (8bit):3.869494272122571
                                                            Encrypted:false
                                                            SSDEEP:96:4F8qMahLi8hR1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:4F8HaUqJN0HY2iUmUFLqU
                                                            MD5:AED6497590DA305D16AC034979C8B1E9
                                                            SHA1:AD6F1788310A3A5A761873FEF1A32416B7DBCA89
                                                            SHA-256:1C6C7FB0AE628EB6BB305B51859C4E5594A6B0876C386ED9C1C3355E7CB37AE1
                                                            SHA-512:58D960AB5F2D9F8E4DD0171E5E36CE2E072F74A7AFDBC43F9340BBCF0CDC0D060AC895F9FCF551F4CC7EB6DBF2E9835C8C3D58E87CA4FBC98C720F51C462EDCD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Monticello) {.. {-9223372036854775808 -20364 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-63136800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.8670778268802195
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/2901iZ903GKT:MByMY3GKDp3GKIt290Q903GKT
                                                            MD5:50434016470AC512A8E2BEBA0BCEBC15
                                                            SHA1:F3541F6EE201FA33C66042F5C11A26434D37D42C
                                                            SHA-256:D66E77E6FF789D4D6CA13CDB204B977E1FE64BE9AFEE7B41F2C17ED8217FD025
                                                            SHA-512:EB1FF97050B7E067DCB68FF7C8F912C8A0C02144BB8E2EAA58C1136C6CC4A2B98C897DD23BB1E9C82D9AF6D028EE45227F97676CB34B6B830CDF5D707B990E57
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:America/Knox_IN) $TZData(:America/Indiana/Knox)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.9362668992592456
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2901Qv090ppv:MByMYbpwt290ev090b
                                                            MD5:FE9CEC6C50DF451B599B98AE8A434FF7
                                                            SHA1:60F997825766662B2C5415FBE4D65CEA6D326537
                                                            SHA-256:5AF9B28C48661FDC81762D249B716BA077F0A40ECF431D34A893BB7EABA57965
                                                            SHA-512:1311605021871BAFAF321AA48B352262C6BA42149101CCD4FDD4000435B2584AC564E0F76D481BB181767C010FD922BAA4E4EBB401AC2FF27B21874D89332872
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Kralendijk) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):218
                                                            Entropy (8bit):4.902526230255025
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/290WDm2OHphvoHvKZdcyFXmBVVON:MB86290ymdHphvCvKfcyy/ON
                                                            MD5:3BC04900A19D0152A31B353C6715A97B
                                                            SHA1:58A6D49E0B6FA00CBEAFD695D604D740AD63C54E
                                                            SHA-256:5488D98AA3C29D710C6AF92C42ACE36550A5BFF78C155CDF8769EE31F71CF033
                                                            SHA-512:65302935090F98A81443A1E1158911F57C3A1564564CD401CA72DDBF66D967DB564EF5AE8A4083D83984B9EF55AB53159010EFE2DB5D7A723F7EA61A1795322D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/La_Paz) {.. {-9223372036854775808 -16356 0 LMT}.. {-2524505244 -16356 0 CMT}.. {-1205954844 -12756 1 BST}.. {-1192307244 -14400 0 -04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):460
                                                            Entropy (8bit):4.2444415392593875
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290B2mdH4VCvvCOt/Os/OCQXR/uFfC3/O3e/uFbs/OX/OqF/O+8/OOS1F5/D:59etvqOVLOR/uGD/utsg38xSP5r
                                                            MD5:5F41E848D2DDE91261F45CB577B1B0A9
                                                            SHA1:DF284499CF57479ADE5E1D3DC01D6DCCF6AFDFE1
                                                            SHA-256:6E01002F264DF9A6FC247F95399F4F42DCCC7AB890B0C259DE93DCC97DEC89CE
                                                            SHA-512:2F5472F812734E892182632B8A34A4AD7B342541D0C3F1107BD95FFBE25D9351A0CDF5F58F35A1F37365DDF8A8A5D883C89C3CC40A9AD09D54CA152DC6BE1A09
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Lima) {.. {-9223372036854775808 -18492 0 LMT}.. {-2524503108 -18516 0 LMT}.. {-1938538284 -14400 0 -05}.. {-1002052800 -18000 0 -05}.. {-986756400 -14400 1 -05}.. {-971035200 -18000 0 -05}.. {-955306800 -14400 1 -05}.. {-939585600 -18000 0 -05}.. {512712000 -18000 0 -05}.. {544248000 -18000 0 -05}.. {638942400 -18000 0 -05}.. {765172800 -18000 0 -05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9726
                                                            Entropy (8bit):3.8515163794355916
                                                            Encrypted:false
                                                            SSDEEP:192:/uX68CWSgG0U9bFzN6IkWq/WHQt/RY4yP:/uX68CWSgGVbGBt/M
                                                            MD5:4D4F198238E4E76753411896239041C3
                                                            SHA1:AD41D199DF0B794B5AB7F165C8A141787FAAC9A9
                                                            SHA-256:DA3F7572F04E6AE78B8F044761E6F48D37EE259A9C1FE15A67072CC64A299FDB
                                                            SHA-512:BA39D174B73B1D4B09E8AC07291BED0B9658A4330AE50881080F0E37C35BD8A6F55C49F1D649ED1F19CE47002435D8724048759DFC813BF9C2E9B06B581486FF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Los_Angeles) {.. {-9223372036854775808 -28378 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-687967140 -25200 1 PDT}.. {-662655600 -28800 0 PST}.. {-620838000 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589388400 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557938800 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526489200 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):228
                                                            Entropy (8bit):4.911677030377383
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y71PiKp4o2HAIgp1PiKp4BvN/290hp4901PiKp44v:MByMYPyApPydt290P490Pyi
                                                            MD5:ACE87B25FE5604C83127A9F148A34C8C
                                                            SHA1:25C8D85B4740C53F40421D0DADCA95225EAB7829
                                                            SHA-256:F85C1253F4C1D3E85757D3DEA4FD3C61F1AA7BE6BAAE8CB8579278412905ACB2
                                                            SHA-512:AC0662B19F336474B146E06778E1FB43B941ABC8FD51BDB31B2640C94CCDFBE7659960EF4FD18329AFA7AD11316FC08D3CF33BB27931EA70AA7218667A8D0737
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Kentucky/Louisville)]} {.. LoadTimeZoneFile America/Kentucky/Louisville..}..set TZData(:America/Louisville) $TZData(:America/Kentucky/Louisville)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):207
                                                            Entropy (8bit):4.900350318979456
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290h48h490ppv:MByMYbpwt290/490b
                                                            MD5:83CE86174ADB5F276AABD26FE132BB55
                                                            SHA1:925E3F4A5DB1A2C33B3A537C8DBC9CFE309FA340
                                                            SHA-256:1E786229B84CE86DB6316B24C85F7CF4CFE66011F973053AD0E108BFCC9A9DE2
                                                            SHA-512:BA2AC5571D772B577735BC8E43FF8023228BC61A974DCCE0EAE20EC9B11FC757E56CABDAE00933A99834108114E598B7EC149BB017EB80BE18301A655F341A36
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Lower_Princes) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1539
                                                            Entropy (8bit):3.7453889877550512
                                                            Encrypted:false
                                                            SSDEEP:48:5QChlvEw6kSSx5H4a8tf3fkuoLdNYVZDNR8nd:OIlvEwJSSxdF8tfMuoLdNYVZJR8nd
                                                            MD5:EB0EDF4E075E3CF9F8EDF2B689C2FE54
                                                            SHA1:9713D7E8AA0E7164824657D00DE6C49483D2BD19
                                                            SHA-256:F65C5957D434A87324AAD35991E7666E426A20C40432540D9A3CB1EEE9141761
                                                            SHA-512:0A0D1E4E0BD7D854E8F139E6F7A9BBC66422B73F7A6C2E1F1B6D2CA400B24B3D220AB519B6AEAA743443E9A4B748709CDF2C276BF52C5382669B12734A469125
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Maceio) {.. {-9223372036854775808 -8572 0 LMT}.. {-1767217028 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):611
                                                            Entropy (8bit):4.303621439025158
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290znTjmdHOYCvprv5EU/dLAyW+/uF+kX8/uF+RZ//dAWcP/QAWcx/uF+rbE:5GnPeOdvhxD1pLS+S8S+RVqzo4xS+3SJ
                                                            MD5:FB09D1F064C30F9E223FA119A8875098
                                                            SHA1:C66173FEB21761AEA649301D77FBB77ACF3A6FB1
                                                            SHA-256:F0F0CCE8DE92D848A62B56EF48E01D763B80153C077230C435D464CF1733BA38
                                                            SHA-512:BC3D841FF48FD0DE7C9ABF5DAE3A42C876BD4D7FBD6684B4513EC7ECC92D938A7133BCC873AD46E453DD1863E843E5C7DD14FFDB41B593E90BEB5CD8F7E66202
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Managua) {.. {-9223372036854775808 -20708 0 LMT}.. {-2524500892 -20712 0 MMT}.. {-1121105688 -21600 0 CST}.. {105084000 -18000 0 EST}.. {161758800 -21600 0 CST}.. {290584800 -18000 1 CDT}.. {299134800 -21600 0 CST}.. {322034400 -18000 1 CDT}.. {330584400 -21600 0 CST}.. {694260000 -18000 0 EST}.. {717310800 -21600 0 CST}.. {725868000 -18000 0 EST}.. {852094800 -21600 0 CST}.. {1113112800 -18000 1 CDT}.. {1128229200 -21600 0 CST}.. {1146384000 -18000 1 CDT}.. {1159682400 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1166
                                                            Entropy (8bit):3.7842934576858482
                                                            Encrypted:false
                                                            SSDEEP:24:5GnqeKwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQz:5mSeSFESoSQSrSsCSeSPS1cSQSQlSsSQ
                                                            MD5:E42719A9B0165490BB9E0E899EFB3643
                                                            SHA1:2991D7EC31F47E32D2C8DB89A0F87D814122DD1B
                                                            SHA-256:DC54E6D4FE14458B0462FA0E15B960FD4290930ADC0D13453BF49B436ED8C143
                                                            SHA-512:F75024E27A2D679A667EA70EC948F983C7B823FDA5962DD88697D61147A6C2B1499E58BA8B01170653C4D025900491AE8E21925500DE39EACBAF883F7E62D874
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Manaus) {.. {-9223372036854775808 -14404 0 LMT}.. {-1767211196 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.900738604616686
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zzJ/90ppv:MByMYbpwt290zzN90b
                                                            MD5:8C60DE8E522FE5D51EACD643FD8EA132
                                                            SHA1:2E09A71DF340ECA6F7AEBD978070D56A627049EC
                                                            SHA-256:5C26D7CE93F91CC4F5ED87E9388B1B180EF9D84681044FD23CC01A628A1284CA
                                                            SHA-512:D2D522D041AFA638542F6FF00F5F40325E3F117C5035BA71F676B4956B054542C67A753055D17E2E2EEA925F13EACC0969D01EC18E40D274D8EA408F92777EA2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Marigot) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):251
                                                            Entropy (8bit):4.849143012086458
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/290zlEDm2OHfueoHv9dMIqR5lRfT/VVFUFkmR/lAov:MB86290zimdHfnCv9dMIqR5lVb/uFkmD
                                                            MD5:CFE10EE56115D3A5F44E047B3661D8ED
                                                            SHA1:03F598CFC9AEDE2F588339B439B2361F2EBDE34F
                                                            SHA-256:D411FB42798E93B106275EC0E054F8F3C4E9FB49431C656448739C7F20C46EDE
                                                            SHA-512:25D6760FDF2F1B0DD91A41D29BDB7048FAE27A03F7B9D9C955ECF4C32E8402836D007B39FE62B93E7BEA017681A0C8AFC1C4CAFD823B0A6C41EDAF09DDF3435D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Martinique) {.. {-9223372036854775808 -14660 0 LMT}.. {-2524506940 -14660 0 FFMT}.. {-1851537340 -14400 0 AST}.. {323841600 -10800 1 ADT}.. {338958000 -14400 0 AST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6745
                                                            Entropy (8bit):3.8432520851585372
                                                            Encrypted:false
                                                            SSDEEP:96:aD5NA604qSScBgN+4ctDzIVQ/c/3hNxTh:aDbA604qSBgI7DBch
                                                            MD5:FC4A24AE95BA6E36285F09AB2FCEE56F
                                                            SHA1:54ED1CD69247064B5EC775E907790D19E93A4626
                                                            SHA-256:59C658CEA1BF5392A8F16295A09A74230EFB52EF7BF783E493E9A9C1799036F2
                                                            SHA-512:2E8E65C487090DC8EE90F8575360A00E74C134CE34E83D4296E2CC32B773F9F0151F4049BFD1BEEAFE7B441E8684AF9FB50287E42FBD5182E4051D1FC39932E3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Matamoros) {.. {-9223372036854775808 -23400 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2067
                                                            Entropy (8bit):3.990817847620547
                                                            Encrypted:false
                                                            SSDEEP:24:5GtXed9WUQwuz/V/NF01YmM/parZ375+XiB+:5sNUIdFS1YrpaV5+yB+
                                                            MD5:43467194416FCF6F0D67AD2456D78646
                                                            SHA1:1FDF02EF7354D9DB71F545D32AE52D018E99D801
                                                            SHA-256:8140084EA9D6A478C34A114D9E216DC05450ECBE4809B2CDA194B40452E2AA0F
                                                            SHA-512:EB5CD3E95779391F096EE9A7B16920C6C9E8A90F38C7A3CBE2B0E123D088A127C5BBE21F5883DCDAD4FBB2410ED052EDE3D4F1E260483D97FEBB7BA7022874C1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mazatlan) {.. {-9223372036854775808 -25540 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -2520
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):219
                                                            Entropy (8bit):4.812188311941308
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MeHAIgp/MSvYovN/290zpH+90/MX:MByMY/M/p/MSA6t290zpe90/MX
                                                            MD5:2A3BFEEFBB684FB3B420A6B53B588BDC
                                                            SHA1:CC5C0BB90D847CCBB45688A8DA460AD575D64617
                                                            SHA-256:D6B308A1619F2DE450DACBFEF0E11B237DF7375A80C90899DD02B827688CB4B8
                                                            SHA-512:4A35C80D3454E039383FFEB06DC84933B3201BE2487C42A448AF3DA5ABAEEB9882263C011CDD3194E121EC1C31FC80120BF7829F280A79996E376CFA828EE215
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Mendoza)]} {.. LoadTimeZoneFile America/Argentina/Mendoza..}..set TZData(:America/Mendoza) $TZData(:America/Argentina/Mendoza)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8410
                                                            Entropy (8bit):3.8311875423131534
                                                            Encrypted:false
                                                            SSDEEP:96:6quShLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:6lSUqtfA604qSBgI7DBch
                                                            MD5:C74D31382279219F805D2B138C58FBF7
                                                            SHA1:06E2FED0A3BDF62F3D390A4054B6A2D7C1863DD3
                                                            SHA-256:B0863F8B66F0848020651B69E7997307D62209259AE653FDC1A0FAFC8E793068
                                                            SHA-512:7B42CBDC119651E2B2EE8B8F934801D3147A8B72EE060A0D0EA1C0C12CA9ABD03F1A102A85BF8E7424B45620151CE107D16A9173F4AA7597EDB3109840C1B2AE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Menominee) {.. {-9223372036854775808 -21027 0 LMT}.. {-2659759773 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-116438400 -18000 1 CDT}.. {-100112400 -21600 0 CST}.. {-21484800 -18000 0 EST}.. {104914800 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -2160
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1877
                                                            Entropy (8bit):3.9636871490767147
                                                            Encrypted:false
                                                            SSDEEP:48:5bu36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5Lj:1qehpYtj
                                                            MD5:34909341A29FF048D83B707D12A728A5
                                                            SHA1:A4D4EC31681DB5F9DA899E20C6789D10827E6D86
                                                            SHA-256:ADE65ADDEEA027D1BE70DC7C12513B61FDF36289021E66982D527C7FEE2A2D19
                                                            SHA-512:57EED40425680CE2C05D961D3F21EE2E0D204E1FD6D3DB5F1EF7AC349AA269F9397D4E2121BD13BC3DE34205564FBE009CEEB5ADE4052EA742CBA15A91F5822B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Merida) {.. {-9223372036854775808 -21508 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {407653200 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6705
                                                            Entropy (8bit):3.985641709481311
                                                            Encrypted:false
                                                            SSDEEP:96:4DCG0haiaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:42G0IiaJCUbPI+D/iMpCIBSuk
                                                            MD5:4999FE49C1640402CB432BC1EB667479
                                                            SHA1:2ED0044927A66856090793ED6E5FF634617C8C40
                                                            SHA-256:2574831391092AD44D7B2806EEF30D59CE3BAE872111917DD39EC51EFDD62E5F
                                                            SHA-512:39DE1D24037F3FFA3101BBAA885939074E596479F68013CDA9CE53A061EA704F63FB55C15B68B66B0E29E3F07ADC0BDC2D78A2D289277E75D2EF95F54988DB74
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Metlakatla) {.. {-9223372036854775808 54822 0 LMT}.. {-3225223727 -31578 0 LMT}.. {-2188955622 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {30
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2261
                                                            Entropy (8bit):3.9546083289866267
                                                            Encrypted:false
                                                            SSDEEP:48:5CBUBUI+n36fELf5On9uhcinzPPoUlWQnH7eelN5Lh9LY5Lj:EB7qehpYtj
                                                            MD5:7A67EA7FF5AC0E9B088298007A9370F4
                                                            SHA1:531583F67E0C6ABA95B5A664A555BF40BF743CE8
                                                            SHA-256:E83DB749E6AA87FD56829C2810D0F93A4194E3EE2CB0BDC12114B1EF55E92E96
                                                            SHA-512:2C9035B415E36A769782FCFA15D79E5FEACA232439D1442407C8CD8C144EE9991030D9D58D2AD54CF6C0840BF78C81921B82BECBC74ABBD0DAC627F77772F52F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mexico_City) {.. {-9223372036854775808 -23796 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-975261600 -18000 1 CDT}.. {-963169200 -21600 0 CST}.. {-917114400 -18000 1 CDT}.. {-907354800 -21600 0 CST}.. {-821901600 -18000 1 CWT}.. {-810068400 -21600 0 CST}.. {-627501600 -18000 1 CDT}.. {-612990000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001836800 -21600 0 CST}.. {1014184800 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {10357020
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7080
                                                            Entropy (8bit):3.5382250054538535
                                                            Encrypted:false
                                                            SSDEEP:192:KUViR+iORv7bw1aW5AnMyxH5e+fHbxMfOp6D7bF8qMmqyiqV1mjZe7JhlgXY7FWN:Y2l5qJZS
                                                            MD5:42921A574FC60D8489DCD493240FDF0D
                                                            SHA1:B45B09D6FD7ECA8DF6D3D3F9B136D88DDDAE8E44
                                                            SHA-256:BF086CC54807E13D0D7AC5294C429A4C16BB9562D1861B55FE758CA843400277
                                                            SHA-512:2E53EB257A5097C4B2995458369267007CBBBC70E69A26FBCB8E8F925ACF800C389489ABABC095D16E4EF088E0C33D9596EDBE2B2798783EFCE62CAF82CA9F70
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Miquelon) {.. {-9223372036854775808 -13480 0 LMT}.. {-1847650520 -14400 0 AST}.. {326001600 -10800 0 -03}.. {536468400 -10800 0 -02}.. {544597200 -7200 1 -02}.. {562132800 -10800 0 -02}.. {576046800 -7200 1 -02}.. {594187200 -10800 0 -02}.. {607496400 -7200 1 -02}.. {625636800 -10800 0 -02}.. {638946000 -7200 1 -02}.. {657086400 -10800 0 -02}.. {671000400 -7200 1 -02}.. {688536000 -10800 0 -02}.. {702450000 -7200 1 -02}.. {719985600 -10800 0 -02}.. {733899600 -7200 1 -02}.. {752040000 -10800 0 -02}.. {765349200 -7200 1 -02}.. {783489600 -10800 0 -02}.. {796798800 -7200 1 -02}.. {814939200 -10800 0 -02}.. {828853200 -7200 1 -02}.. {846388800 -10800 0 -02}.. {860302800 -7200 1 -02}.. {877838400 -10800 0 -02}.. {891752400 -7200 1 -02}.. {909288000 -10800 0 -02}.. {923202000 -7200 1 -02}.. {941342400 -10800 0 -02}.. {954651600 -7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10507
                                                            Entropy (8bit):3.8204583916930557
                                                            Encrypted:false
                                                            SSDEEP:192:X9+FPHyXFRsivcQYM+T7Z/xVQzxmtBWIXrObx29x8sLxcGMe++wzlrfFjxKvnpNM:gF6L0d0F2TzNc/1cYUH+CC
                                                            MD5:80B88F57B837CD2478815796618A6AC6
                                                            SHA1:CC2BE0213E9F0D3B307A8311D7A1013582E8A338
                                                            SHA-256:D977D045DE5CDAEB41189B91963E03EF845CA4B45E496649B4CB541EE1B5DD22
                                                            SHA-512:9410CBD706CAABFFF88DFF75235597D844B45A061EBD796F6708D7CEAB680273571A17935B7CCFC7C466ABF293C286D0886F47880E692F74C4E8BFB41729C73C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Moncton) {.. {-9223372036854775808 -15548 0 LMT}.. {-2715882052 -18000 0 EST}.. {-2131642800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1167595200 -14400 0 AST}.. {-1153681200 -10800 1 ADT}.. {-1145822400 -14400 0 AST}.. {-1122231600 -10800 1 ADT}.. {-1114372800 -14400 0 AST}.. {-1090782000 -10800 1 ADT}.. {-1082923200 -14400 0 AST}.. {-1059332400 -10800 1 ADT}.. {-1051473600 -14400 0 AST}.. {-1027882800 -10800 1 ADT}.. {-1020024000 -14400 0 AST}.. {-996433200 -10800 1 ADT}.. {-988574400 -14400 0 AST}.. {-965674800 -10800 1 ADT}.. {-955396800 -14400 0 AST}.. {-934743600 -10800 1 ADT}.. {-923947200 -14400 0 AST}.. {-904503600 -10800 1 ADT}.. {-891892800 -14400 0 AST}.. {-883598400 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1940
                                                            Entropy (8bit):3.9628147491173964
                                                            Encrypted:false
                                                            SSDEEP:48:5JZKy36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5Lj:XwDqehpYtj
                                                            MD5:4AE2B33D9DACE0E582FA456B361C50B7
                                                            SHA1:5D62287F072F3687EF130BB1A9DD97BB2ABCF91C
                                                            SHA-256:F5A66A403BF40BE7EAB188F3CEC8D7DB700F60084F7B856AB87E0AA4A0F2C0B6
                                                            SHA-512:39BE803FD47709A1120FC8E09DB9B294DE41F69C7DD86AAB03AD8D0878B160B21D82B16398125559B792DAE99D5D917AE466C536001FEC1E618B68ACA9A80322
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Monterrey) {.. {-9223372036854775808 -24076 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2936
                                                            Entropy (8bit):3.6410670126139046
                                                            Encrypted:false
                                                            SSDEEP:48:5JgQkS4SaEcSyS0sZSUS2kSVSXSulSASX5kAXJMsCXrUari3akaWCa3M+lafpI6L:X5kH4c9GT0E01jm5keJMRXrUEi3akaWO
                                                            MD5:D78DEBC7C0B15B31635DDC34C49248BC
                                                            SHA1:DB2FF76DB3A79BE52E2DFD4C7B8B6592946772F9
                                                            SHA-256:214F97A3BCB2378CCE23D280EA6A3B691604F82E383628F666BE585BB8494932
                                                            SHA-512:E5FCD0B54F61910E70B1D0EE9911C5B4AFF850F16B651A01D69A63A97880913B0BAB99B0D864C4E613594734FA72CCA0E9607B1ADB6E75957C790990114FD0A4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Montevideo) {.. {-9223372036854775808 -13491 0 LMT}.. {-1942690509 -13491 0 MMT}.. {-1567455309 -14400 0 -04}.. {-1459627200 -10800 0 -0330}.. {-1443819600 -12600 0 -0330}.. {-1428006600 -10800 1 -0330}.. {-1412283600 -12600 0 -0330}.. {-1396470600 -10800 1 -0330}.. {-1380747600 -12600 0 -0330}.. {-1141590600 -10800 1 -0330}.. {-1128286800 -12600 0 -0330}.. {-1110141000 -10800 1 -0330}.. {-1096837200 -12600 0 -0330}.. {-1078691400 -10800 1 -0330}.. {-1065387600 -12600 0 -0330}.. {-1047241800 -10800 1 -0330}.. {-1033938000 -12600 0 -0330}.. {-1015187400 -10800 1 -0330}.. {-1002488400 -12600 0 -0330}.. {-983737800 -10800 1 -0330}.. {-971038800 -12600 0 -0330}.. {-954707400 -10800 1 -0330}.. {-938984400 -12600 0 -0330}.. {-920838600 -10800 1 -0330}.. {-907534800 -12600 0 -0330}.. {-896819400 -10800 1 -0330}.. {-853621200 -9000 0 -03}.. {-84
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.748877320903638
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEzQ21h4IAcH:SlSWB9vsM3y7RQtHAIgpRQPN/290zQgp
                                                            MD5:9130CD86BD6417DB877BF9D8F3080CE1
                                                            SHA1:76C37982C37FE54ED539AC14B5A513817E42937C
                                                            SHA-256:97F48948EF5108FE1F42D548EA47C88D4B51BF1896EE92634C7ED55555B06DBD
                                                            SHA-512:EE036350AF95414392BD93DFF528F67D9A93EB192A30056ECBC3D2396AB4B2938B3C096C3EC2BC739294D4C4B7261C427B0AAEB9559F5381CB7F375892781820
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Montreal) $TZData(:America/Toronto)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.878534808314885
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zQ1HK90ppv:MByMYbpwt290zQ490b
                                                            MD5:CB5988A2508285B42C2BD487B8F9D6E1
                                                            SHA1:EAD740A566245B682CE5E284D389DFAE66DF05D9
                                                            SHA-256:6C3EE46983A3DAA91C9ADF4B18D6B4B80F1505B0057569B66D5B465D4C09B9C1
                                                            SHA-512:48796213A67F0E3BC56B54CE4D8BE098E74BA5808C9A1082D9381CB729ADFA2ACB9CE9E39A3244B3901405761C97AEE28D44C3BF7239ECC71175C62E152029C4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Montserrat) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.785765433607229
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEwEzEeIAcGu:SlSWB9vsM3y7RQtHAIgpRQPN/290xzEf
                                                            MD5:F7DAD684104D917E0F29F6951EA627AC
                                                            SHA1:E57B5CA730D90C5865CF32FEC4872F71E033D21C
                                                            SHA-256:A889810B8BB42CD206D8F8961164AD03CCFBB1924D583075489F78AFA10EAF67
                                                            SHA-512:8284F2A357A32B2F5A211904F65E3B5C37B77C9BF38C85DFA0A95A73457F3076EC12F09BC767B4D0B8FC86BF69D01A17A7BF685BAB72F3E519A397D050DA0C3B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Nassau) $TZData(:America/Toronto)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11373
                                                            Entropy (8bit):3.8110553140357086
                                                            Encrypted:false
                                                            SSDEEP:96:HeohzORhK1a8phYvNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:+uORhK1a8phYloSItON0HY2iUmUFLqU
                                                            MD5:385C3BDD3E41E5E75CEF0658322B5CDE
                                                            SHA1:0334C21C8316ED2EE16FC98B1E8867D5E0916C00
                                                            SHA-256:7BA7DA179AA7DF26AC25E7ACCD9BD83784174445285A0D9CCBD7D6A9AA34F4BC
                                                            SHA-512:764B680FB8414B5AC8FB110247C19B1004A4453DD2BAC94BF3CFD80281FF3679A5B1D212238509165E022269503ED14A54B0EF73AF7014344752E6A627657D1F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/New_York) {.. {-9223372036854775808 -17762 0 LMT}.. {-2717650800 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-1577905200 -18000 0 EST}.. {-1570381200 -14400 1 EDT}.. {-1551636000 -18000 0 EST}.. {-1536512400 -14400 1 EDT}.. {-1523210400 -18000 0 EST}.. {-1504458000 -14400 1 EDT}.. {-1491760800 -18000 0 EST}.. {-1473008400 -14400 1 EDT}.. {-1459706400 -18000 0 EST}.. {-1441558800 -14400 1 EDT}.. {-1428256800 -18000 0 EST}.. {-1410109200 -14400 1 EDT}.. {-1396807200 -18000 0 EST}.. {-1378659600 -14400 1 EDT}.. {-1365357600 -18000 0 EST}.. {-1347210000 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-123895440
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.799414617322291
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEwMueh4IAcH:SlSWB9vsM3y7RQtHAIgpRQPN/2905u+p
                                                            MD5:B01CC44E5139066F87ADFF16728B98BF
                                                            SHA1:4464E187AFF336C9137094308C270BB822974DF1
                                                            SHA-256:55C37BF1A579A22A790ADE6585CE95BEC02DA356E84D2EF7832C422A4484FF9D
                                                            SHA-512:A45166FFE444982593CBAC3E683D25D9EDB070DB6CD059A83D1C52099F409FFBFE6EA68D255AD000AF142BF8C8D100271531852263677184597877B7BF318847
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Nipigon) $TZData(:America/Toronto)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8680
                                                            Entropy (8bit):3.965662913874442
                                                            Encrypted:false
                                                            SSDEEP:96:OrBvOs5vzC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:OrBvOsM9DiaJCUbPI+D/iMpCIBSuk
                                                            MD5:9A5F536932FED5A93E2C3DEB81960CD1
                                                            SHA1:8E78396D280DD3A9564CEFC7FB722437F3C4D003
                                                            SHA-256:8E971C9560CCE548B46626D072E62AB0F4C9682BF6A6ABFB4D0E8D63745402FE
                                                            SHA-512:60CFDBCE87F9CD7F27E071D66B97E60F62E56F413DC867BC809490B30D00045D0757710D6B5724148E2A28BD1E45FB662391820E6350D998002BF67B16776645
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nome) {.. {-9223372036854775808 46702 0 LMT}.. {-3225223727 -39698 0 LMT}.. {-2188947502 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1397
                                                            Entropy (8bit):3.78056049136398
                                                            Encrypted:false
                                                            SSDEEP:24:5TenykFxCFbF3YCFE2FBCFDFr9CFaFPBCFoF2CFTFKCFDuF1CF2F1CFWFhCFGF3a:5quY9EmFYBosNZNW/bWsBzgCccq7JYN9
                                                            MD5:B4F4530FCE4BF5690042A2DA40413D56
                                                            SHA1:52D5F2102485F5B326C888A287ED83CA18833BBC
                                                            SHA-256:9011C76295E6B17CC1973876B497BEE21B9E6562FB25DF66140F811A1FFA9765
                                                            SHA-512:08CAF75226D190D9FF0AA62AD84B13F1BF9047338A690847DF5B448BDB731A877F3E186298AFD704F4F4E133FF3F3128B098F9D90AE9A8E726AE52F84A7DA2E3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Noronha) {.. {-9223372036854775808 -7780 0 LMT}.. {-1767217820 -7200 0 -02}.. {-1206961200 -3600 1 -02}.. {-1191366000 -7200 0 -02}.. {-1175378400 -3600 1 -02}.. {-1159830000 -7200 0 -02}.. {-633823200 -3600 1 -02}.. {-622072800 -7200 0 -02}.. {-602287200 -3600 1 -02}.. {-591836400 -7200 0 -02}.. {-570751200 -3600 1 -02}.. {-560214000 -7200 0 -02}.. {-539128800 -3600 1 -02}.. {-531356400 -7200 0 -02}.. {-191368800 -3600 1 -02}.. {-184201200 -7200 0 -02}.. {-155167200 -3600 1 -02}.. {-150073200 -7200 0 -02}.. {-128901600 -3600 1 -02}.. {-121129200 -7200 0 -02}.. {-99957600 -3600 1 -02}.. {-89593200 -7200 0 -02}.. {-68421600 -3600 1 -02}.. {-57970800 -7200 0 -02}.. {499744800 -3600 1 -02}.. {511232400 -7200 0 -02}.. {530589600 -3600 1 -02}.. {540262800 -7200 0 -02}.. {562125600 -3600 1 -02}.. {571194000 -7200 0 -02}.. {592970400 -
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8557
                                                            Entropy (8bit):3.8810445182855253
                                                            Encrypted:false
                                                            SSDEEP:96:WEktwmGaLV911sF9A604qSScBgN+4ctDzIVQ/c/3hNxTh:WBwDPPA604qSBgI7DBch
                                                            MD5:10AF9E9461DD03DA4F0AF0595EB36E6C
                                                            SHA1:57AC9BDE3AC665E49D9D2463A4BFA38C053A4A54
                                                            SHA-256:D0D8B108453265B60F525A4EC04DE9555087CD6AC5DDBA980B3A96CF0FCD68D1
                                                            SHA-512:B6DC7D2709A19B911E086C988DB8346F42DBF7601D9E51E3093C6AF897570E43E5F1C101FE88BC5251F3DCC3B532DB22FFE8A12A4D0151BC52AF3E6DDEA7D23A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Beulah) {.. {-9223372036854775808 -24427 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8557
                                                            Entropy (8bit):3.867423227197841
                                                            Encrypted:false
                                                            SSDEEP:96:ZEktwmGaLV9tZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:ZBwD6fA604qSBgI7DBch
                                                            MD5:33C03AD65753D7ADB45FC4899B504D1A
                                                            SHA1:ED719BB67A64DB49901BA38A945A6BA998646B8D
                                                            SHA-256:ABC2B6C97D9E9FBA37AC582ADBA2CE996890D090060E083405D75CDAED9EABE0
                                                            SHA-512:69592E8A370C8A5173827500CDDF8190AB44EA87CD7E0C416055CB7958B13A737801EA6B0FFE6032CB3F14F05001BF9DA83E4AEB20F385019B2985ECE7ACB40E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Center) {.. {-9223372036854775808 -24312 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8560
                                                            Entropy (8bit):3.879452555978431
                                                            Encrypted:false
                                                            SSDEEP:96:GEktwmGaLV9nlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:GBwD2fA604qSBgI7DBch
                                                            MD5:3D3DC12209293086FD843738A4FE87FB
                                                            SHA1:8103DFA18B5F3F36AF0B53FA350E0F2D300E6289
                                                            SHA-256:8803FF7C81C933B57178B9D3C502FB4268D9AA594A3C638A7F17AF60B12D300D
                                                            SHA-512:39BB939780A71B817F82D2B7F56815D33926D150525161051A9950E5A98BA9184670AFC884A1C69D56EADBD6198E3082975448EFBA5FE8A336DB071E6BAB8EF2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/New_Salem) {.. {-9223372036854775808 -24339 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -2160
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7352
                                                            Entropy (8bit):3.563055036198918
                                                            Encrypted:false
                                                            SSDEEP:192:0ixKXpbzvZ+FxAqe12voJ0euJFNgIHc/QEeF5Z1V8tCSfifK3facf+RQKW+FgL07:0L13/ML5t7P
                                                            MD5:70177C30ABA03AC9589E05674E54C782
                                                            SHA1:5D2D7F26663AC9CC45B9AB00BCBC950CEF6F5201
                                                            SHA-256:2F1F88823E80642137AC807059D11527FF873729CB9CB058B471612906BCD510
                                                            SHA-512:8E9A97188F2DA401B25155A94BF1D96797C58843E88A24D3AB4EC750801470284141FE4A6B51D0196568EBA63CEAF98D83F38C4DA19510E86EF43EF686CF5E4F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nuuk) {.. {-9223372036854775808 -12416 0 LMT}.. {-1686083584 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -7200 1 -0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6874
                                                            Entropy (8bit):3.876618891121635
                                                            Encrypted:false
                                                            SSDEEP:96:Se1c7Lv/PlrSScBgN+4ctDzIVQ/c/3hNxTh:oLv/PlrSBgI7DBch
                                                            MD5:95520E69610949A1FC42FD5FC44FE934
                                                            SHA1:38FCB8AA9C4CDC8687537B61F3B0350C67035414
                                                            SHA-256:94E803FCD69256C8228DC399F6A57A380F872426BF17E2D4D900C23D5E287810
                                                            SHA-512:11D6F604AA44CA6232B2D695D2D6A58F07F8357CE4095DE8C0F705770B632FC6BEE3F7227F398F29579BDA1C1129121F60D0A045F05DFEF042BC14B50D6D3C5A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Ojinaga) {.. {-9223372036854775808 -25060 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 1 MDT}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -21
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.970379147398626
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGEu5YfMXGm2OHGf8xYoHv5BidhZvFsc1HRX1va0v:SlSWB9eg/290ZDm2OHDxYoHv5GhZd93p
                                                            MD5:AA408A43079EC8933DE271BE3DA2B502
                                                            SHA1:421A867DB3FD4779C5F759D0B657D8EB5FB2218B
                                                            SHA-256:990213DDE00ADCEB74C8D1ECAF81B9C77963E4AB1F35767F7349236FC8E917DF
                                                            SHA-512:1FB740527555A8E128E05709D05720A249BCBA4B6434D00226C07426E6283AA48973F75268F36E6044F0F0650E012781C8E5519B7EA916C625BBF018B29E9961
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Panama) {.. {-9223372036854775808 -19088 0 LMT}.. {-2524502512 -19176 0 CMT}.. {-1946918424 -18000 0 EST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.9032016816709225
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73oHAIgp3FAN/290QX/4903V:MByMY3Jp3FAt290QX/4903V
                                                            MD5:86E07D2675D8D9D40684EC5AF45C3D88
                                                            SHA1:EA4DBBDBAC1AFFDE8BE46447359C4E6AED682D03
                                                            SHA-256:650A845BD9CEC7270438CBEA1A19D281B890019242AD782A60AF167BD1A0650D
                                                            SHA-512:E61060B18C20EC57E4DECFC464A2BB122A2C7A8C76A0B6F7BB36AE71B46E3DA072ECD2442C3149297E25B81121C7C7C10B017C131D33590BD321E16BE391BF66
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Iqaluit)]} {.. LoadTimeZoneFile America/Iqaluit..}..set TZData(:America/Pangnirtung) $TZData(:America/Iqaluit)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):253
                                                            Entropy (8bit):4.784405839512086
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/290olofDm2OHekeoHXFIV/1Vw/9vVOzFZg/VVFAKV:MB86290oloLmdHeVCXqV/k/9v4zW/OW
                                                            MD5:BFCE7E2618D6935031D6941AD6DDD8E3
                                                            SHA1:1953CD224FB2363B10372C0476760F3FB020CB00
                                                            SHA-256:B3EE44B3526BEDFC25B806371D3C465FDBD6CC647F30BF093750651E4A0C1BE4
                                                            SHA-512:31262DF034E084DA4CDB57B99178594C29129F61F3535E5D8245B8BB4AB6BF314307B0F5E58B74C349684CD761C9CDE44EB10407FB135BA6427D3D1E9DA99B40
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Paramaribo) {.. {-9223372036854775808 -13240 0 LMT}.. {-1861906760 -13252 0 PMT}.. {-1104524348 -13236 0 PMT}.. {-765317964 -12600 0 -0330}.. {465449400 -10800 0 -03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):496
                                                            Entropy (8bit):4.444598497301421
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290OXmdH514YCvb8o1W4S9xRvhhHRVxORBYUNv:5tekdvYP1x52yq
                                                            MD5:062ECA57C0B795780240CD7AFE70BDA0
                                                            SHA1:89D71A11DD8D4E000F7FADBDDC77C4C1DC1195F7
                                                            SHA-256:DFA0EC91804B789A1A7E1B1977710435D2589A5B54C1579C8E1F5BF96D2FD007
                                                            SHA-512:7D123AA872E0B8286A26E338AE0F8E0D7A6F0F2EA8B1EBEC6DBB59477C812985CB246AD397D0901A58FDB7FF14171CF60169DC15C538B95C58BD2D46106A7A4D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Phoenix) {.. {-9223372036854775808 -26898 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-820519140 -25200 0 MST}.. {-796841940 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-56221200 -25200 0 MST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6613
                                                            Entropy (8bit):3.8549788442269395
                                                            Encrypted:false
                                                            SSDEEP:48:5Ux+E2p3T6ZqrNSMEBPMcywh4NF5zCC7IOTWa1HW1241UWK9BDL+3XC4BMrS2LxP:KOfS0HY2iU7KKdFL6Aa2K4gSLf8e
                                                            MD5:A720323DF122C70C1530788DB24700BA
                                                            SHA1:20674BD7D84CC686ABBB5D6B36B520A5E9C813ED
                                                            SHA-256:A89C580899AD2FF8DF45A783BB90D501DC32C28B92931CA18ABD13453E76244B
                                                            SHA-512:02B71E537B9FDAF1B68E381F0007CCBBA53EB70719ED38F51B56C5BFA64C7E3D9797053C9DE3A920E5CAFA09BBC062FCED62B5D6B9213AFA8286B95DEDAB0532
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Port-au-Prince) {.. {-9223372036854775808 -17360 0 LMT}.. {-2524504240 -17340 0 PPMT}.. {-1670483460 -18000 0 EST}.. {421218000 -14400 1 EDT}.. {436334400 -18000 0 EST}.. {452062800 -14400 1 EDT}.. {467784000 -18000 0 EST}.. {483512400 -14400 1 EDT}.. {499233600 -18000 0 EST}.. {514962000 -14400 1 EDT}.. {530683200 -18000 0 EST}.. {546411600 -14400 1 EDT}.. {562132800 -18000 0 EST}.. {576050400 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607500000 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638949600 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671004000 -14400 1 EDT}.. {688543200 -18000 0 EST}.. {702453600 -14400 1 EDT}.. {719992800 -18000 0 EST}.. {733903200 -14400 1 EDT}.. {752047200 -18000 0 EST}.. {765352800 -14400 1 EDT}.. {783496800 -18000 0 EST}.. {796802400 -14400 1 EDT}.. {814946400 -18000 0 EST}.. {828856800 -14400 1 EDT}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):207
                                                            Entropy (8bit):4.919510214047913
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290e7490ppv:MByMYbpwt290190b
                                                            MD5:4AB394CB233B101627136EB5E070CF9B
                                                            SHA1:F00600CD2DB10FE157C3696F665B9759EEA85F99
                                                            SHA-256:A4952380C89A6903FFE5BF8707B94B1BB72568FFD03DB04BF4D98E38AC82EEB7
                                                            SHA-512:58F4AD08FA10F1884FA641C4EA778C0FC013EABBD68DF5DE04D5B301227396260C3D669DB33DD6A6B33F1550C24BBD7777D756DF0D61CEEAF5EC6541EDFA296C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Port_of_Spain) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.866417687745155
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/290msh490th4:MByMYdIp7t290v490I
                                                            MD5:6B570E79FA2AA7D6CB1E56A11EE0A37C
                                                            SHA1:396A2C9BBE4F264DD5A4F2E44D3E63C57F52186B
                                                            SHA-256:52921EEA2A1925DF06CEA4638ED4128FAAA8FBA40ED4E0741650B419E5152DCB
                                                            SHA-512:FA75A179664BED02A0F5BC1B7C3DD5F3E986544A151634BA4C4401476F5999714C89E240D9AF805484D1BEC04A1A562157FAEECA1603C4FF8CFFB424B9DEB560
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:America/Porto_Acre) $TZData(:America/Rio_Branco)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1051
                                                            Entropy (8bit):3.851275104153641
                                                            Encrypted:false
                                                            SSDEEP:24:5Xe4QJnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/8:5kSeSFESoSQSrSsCSeSPS1cSQSQlSsSX
                                                            MD5:03046BA6F8344C32AD7A22748DC871AB
                                                            SHA1:AB9ED078D80AE99EF6DE4BF34AC45359B82D1284
                                                            SHA-256:E6E6F6753E7D443052A64D4DB07B8D443CE13A573946E7D0A19CDD4BBA4A2F04
                                                            SHA-512:620953BB4C8CF203262EC0C1F807543D24B9894C3B531AE57F7CEF630452CC9AC7CA41D43A6D8891F9CF17594E9EE34CF501F8508E7C0669A8E5EF9C70B6EAA3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Porto_Velho) {.. {-9223372036854775808 -15336 0 LMT}.. {-1767210264 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {5712012
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):283
                                                            Entropy (8bit):4.781646667761219
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/290piDm2OH9VoHvMlFoeVVF70ZVVFUFkzk/lLJpR/lAov:MB862908mdHvCvMlGe/J0Z/uFkzk/lL1
                                                            MD5:E2E2E0D6677FFF2E37BBFC3522F2A9AA
                                                            SHA1:4C1C93E14FBC00B8B1E78B8D9631599164305EB1
                                                            SHA-256:2981248A9F14EBFC8791EC5453170376CBD549557E495EA0E331CC18556C958E
                                                            SHA-512:F056B03EB9945823F5284C840E06E298DD2DE854F1555CD16D0BB19D962B73EF34A05683E6369B0D89CB7C3F7D082C312CCA6F8C6A0BB53F5C75FE4A863FCD95
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Puerto_Rico) {.. {-9223372036854775808 -15865 0 LMT}.. {-2233035335 -14400 0 AST}.. {-873057600 -10800 0 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3729
                                                            Entropy (8bit):3.6253057710886956
                                                            Encrypted:false
                                                            SSDEEP:96:2RPW7xUQjzoMUBI0nuUoDKlHslPlgiot7JC/Xk8NWse4r4g5xCEmSdLkUsZOn+ZW:247xUQjzoMUBI0nuUoDK6lPlgiot7JCV
                                                            MD5:D4ECD2A380E55A10FB97AB1D29C619F3
                                                            SHA1:AAAFF44590F08623BE6F61EA6EFF6488C99A73BF
                                                            SHA-256:4E626BD8B9182E56ADA1E9276585E945957431EA9BEA949CE071305E4E3C70A2
                                                            SHA-512:677EE7093A53B48DE526C5877DB7128E8746831FE0DC44A38EB84050757E6017C9471EEF9AFCCEEEB5794D1608E486840804C01BD6276EA53F3C7823B05ED62B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Punta_Arenas) {.. {-9223372036854775808 -17020 0 LMT}.. {-2524504580 -16965 0 SMT}.. {-1892661435 -18000 0 -05}.. {-1688410800 -16965 0 SMT}.. {-1619205435 -14400 0 -04}.. {-1593806400 -16965 0 SMT}.. {-1335986235 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-736632000 -14400 1 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}.. {37767600 -14400 0 -04}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):196
                                                            Entropy (8bit):4.926514352074701
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7pYHAIgppuRN/290ly90pl:MByMY/pcRt290w90X
                                                            MD5:552FBD2FBAD42F79C7993124D9CCC54B
                                                            SHA1:9029B7CCE8A5AD0F14C05FFBCDA4CA225DEC1708
                                                            SHA-256:FEC74A3FCBD9B99FDFF24B54223DA187958697CBE756A54592F6171C69F1403F
                                                            SHA-512:96315C32C1D0DEF804A560022DA12B3C63200A680F2A37D1B03E1C9EA413842EB6051E1C2315AE4E7C374280AD0E59832F834A8D6D66E259EF62735A77917ECE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Winnipeg)]} {.. LoadTimeZoneFile America/Winnipeg..}..set TZData(:America/Rainy_River) $TZData(:America/Winnipeg)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8029
                                                            Entropy (8bit):3.8280748194159004
                                                            Encrypted:false
                                                            SSDEEP:96:fkLi8h4ZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:f3qOfA604qSBgI7DBch
                                                            MD5:397E26B4DD207F18A08463C63313908C
                                                            SHA1:AE5894CD53A1F6A4671E63F427E190071ABED13D
                                                            SHA-256:AC78DB0895B016F81C09676F32B69BF38CA216283E7D2F5E594E41DF9BCB5530
                                                            SHA-512:8EC8BC32E1F5C790040C40219E478F7768B8ECE253ADB28DBEB1061FE159F2552852A70FFC29337F614C3CD9E64D8BA5E2AFF7462E8007099E3DA60EFC37B246
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rankin_Inlet) {.. {-9223372036854775808 0 0 -00}.. {-410227200 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {136368000 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {167817600 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1420
                                                            Entropy (8bit):3.78262494063765
                                                            Encrypted:false
                                                            SSDEEP:24:5aLexyGcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaI1kR8nd:5eTChlvEw6kSSx5H4a8tf3fkuoYVZDm+
                                                            MD5:4D12651CEE804EB9F29567CB37F12031
                                                            SHA1:54B2613475B8BDB1DBCCA53A4895DA021F66BDC0
                                                            SHA-256:A36AD4614FC9A2A433712B555156EDE03980B88EB91D8DC7E8B10451D6D7F7D3
                                                            SHA-512:E6690F6B6DF613C8B7289A2DB71FBC9B87B997707A6C3B4B45BDE8F347082AE8C69F212BAACE50F3C04E325ABE0976AF1F61107BDF8A15D5B88F11FAE11A9D00
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Recife) {.. {-9223372036854775808 -8376 0 LMT}.. {-1767217224 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1781
                                                            Entropy (8bit):4.034282439637634
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290hjmdHfCv24Q1NAvHaE+YB+Q4kRcMxIeRUVX/SEQd1rRR9xRv0+Ro/wPjp:5EjeavTGOtAVvSRBpx0yq1epwD+yz+
                                                            MD5:14B29B4391B643E5707096ADCC33C57E
                                                            SHA1:B3F875ABB79C634C74307B7CB7B276B13AEE11D1
                                                            SHA-256:50105E788288CF4C680B29BBDCDE94D8713A5361B38C6C469FD97CF05503FF7D
                                                            SHA-512:D92A51547DF2C1AB6E6CDEFF34C07B755D3F6BB5E7DD1907693E7658EDE4D2BADC5DEFDB658ADD0F8D8F14B3B87CEA17BC00DAC364C5CB7ACBF8778C245276A9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Regina) {.. {-9223372036854775808 -25116 0 LMT}.. {-2030202084 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1251651600 -21600 1 MDT}.. {-1238349600 -25200 0 MST}.. {-1220202000 -21600 1 MDT}.. {-1206900000 -25200 0 MST}.. {-1188752400 -21600 1 MDT}.. {-1175450400 -25200 0 MST}.. {-1156698000 -21600 1 MDT}.. {-1144000800 -25200 0 MST}.. {-1125248400 -21600 1 MDT}.. {-1111946400 -25200 0 MST}.. {-1032714000 -21600 1 MDT}.. {-1016992800 -25200 0 MST}.. {-1001264400 -21600 1 MDT}.. {-986148000 -25200 0 MST}.. {-969814800 -21600 1 MDT}.. {-954093600 -25200 0 MST}.. {-937760400 -21600 1 MDT}.. {-922039200 -25200 0 MST}.. {-906310800 -21600 1 MDT}.. {-890589600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-748450800 -21600 1 MDT}.. {-732729600 -25200 0 MST
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8025
                                                            Entropy (8bit):3.824511748400596
                                                            Encrypted:false
                                                            SSDEEP:96:ykLi8h4Z80NA604qSScBgN+4ctDzIVQ/c/3hNxTh:y3qOzA604qSBgI7DBch
                                                            MD5:61326BB0D4D85BEF7F5849DFC86D19CD
                                                            SHA1:6AC04482473EE17DC94E9B3AF6F1AA75EBB7A82E
                                                            SHA-256:38C8868ACD122C3C60224EE384DFC15BC37D774C68D8463C58762F208FA2FEC9
                                                            SHA-512:563D3A888F41A0A28EFA458F9195D5FE3C53FE9163119E2941E7E8D4D354D3B2E4B1231AFCA07A21EFDB24365677BDA4B27E5CFC9BFC3BC800D204B22450EBED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Resolute) {.. {-9223372036854775808 0 0 -00}.. {-704937600 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {136368000 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {167817600 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1112
                                                            Entropy (8bit):3.8413073465060457
                                                            Encrypted:false
                                                            SSDEEP:24:5Ybe/k5Yss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6Gs:505YsMw57XJh4CxUF/A6GTrtSUDwr
                                                            MD5:7E23FDE0E158E8ED2E7536EDE70D2588
                                                            SHA1:319052BE076DC79F130E807D68B11CCAA0636340
                                                            SHA-256:28082D20872B61D6098D31D1C40F12464A946A933CD9AF74475C5AF384210890
                                                            SHA-512:BE078ED12F05AB5CEE5D77212EB76A01A1BC52EEAA17E3B91D93B88D75E5281B6AF164E712A9AB0F57A21B3CDB20F6FCCADB73CAC4745B5D2E665D18F9F06B55
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rio_Branco) {.. {-9223372036854775808 -16272 0 LMT}.. {-1767209328 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {57120480
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):219
                                                            Entropy (8bit):4.801485647578614
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/290rI5290/M7:MByMY/M7p/M16t290r190/M7
                                                            MD5:90830F3B1F91FE48AC2944C7C92A3F6E
                                                            SHA1:777377AE4959DDD2B472EB6041A23A5B93D64BB6
                                                            SHA-256:0117D33D4F326AA536162D36A02439FBD5F2EB3B4F540B5BA91ED7747DDAC180
                                                            SHA-512:20A371E4550E402AFEB83EF19EFFF6B3C0D7A68DCAA06AD894D04DB63B7096560E701C45B455B23A98BB20FE3B590F920219152415CA506AEDA427BB1381B826
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Rosario) $TZData(:America/Argentina/Cordoba)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):194
                                                            Entropy (8bit):4.869058214823402
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7ekHAIgpeON/290tX2U490eBn:MByMYMpJt290c90m
                                                            MD5:F4E62378AA05771D348AA6DA516CD386
                                                            SHA1:07FCA813693F7944CBCBB128F2F2FE32929D37A2
                                                            SHA-256:3B4C2F3A5B9CD22A73F05187C032723D07BB53C9946D04D35E1BA1CB90CA0A62
                                                            SHA-512:E9F6CEB824D656CA25A72BF8EB4347A22E1A8E40410F01E0C2EDE19ACAF32D76540399796B3EBC7781C8B5D48C1A6B2C856CA06158AE37D95C95CF0567DFA2E5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Santa_Isabel) $TZData(:America/Tijuana)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1079
                                                            Entropy (8bit):3.8200568741699223
                                                            Encrypted:false
                                                            SSDEEP:24:5zeUdunSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/h:52SeSFESoSQSrSsCSeSPS1cSQSQlSsSU
                                                            MD5:7F2658032008F2C1308F121C2EBF2479
                                                            SHA1:B6F24E818B4424C0DEF818C103D1DA5359958932
                                                            SHA-256:4A397BD937DE1D7E6A941D18001B34D4CD195AEFD08951C30C7EE8E48656AA0E
                                                            SHA-512:F78853AA75F58A85555DD79E08A7487E5161854650DBF480189790D855738FEDCBDA936870067DE40FE000861008A9E9AAF61DF02B6B30B96038C61B5E1F1C1D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santarem) {.. {-9223372036854775808 -13128 0 LMT}.. {-1767212472 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8871
                                                            Entropy (8bit):3.5351636359890537
                                                            Encrypted:false
                                                            SSDEEP:192:2Xv/lxUQjzoMUBI0nuUoDK6lPlgiot7JC/k8NWse4r4g5xCEmMQUs8nCxvisEbzu:2fD9TzDC9g32+E
                                                            MD5:81FC6AFF68B1CF2EA57ED13A42B35BE1
                                                            SHA1:5889E502FBDCBCDFE9E7053625FFFBAD61FFE256
                                                            SHA-256:77CED11337F43241D57C10BA752C7104A7AF8727992E7B90A3C5D62AA15E81C7
                                                            SHA-512:7756CBAF76966F3D45883B725B791A8DD60E8329F6FE19C12029C6FEBC90D7322765A0A8BA26FC586443A902B372D0C0189426A8F99B2B535BB8F1EE74796B44
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santiago) {.. {-9223372036854775808 -16965 0 LMT}.. {-2524504635 -16965 0 SMT}.. {-1892661435 -18000 0 -05}.. {-1688410800 -16965 0 SMT}.. {-1619205435 -14400 0 -04}.. {-1593806400 -16965 0 SMT}.. {-1335986235 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-740520000 -10800 1 -03}.. {-736635600 -14400 1 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):616
                                                            Entropy (8bit):4.330655351784895
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290/StmdHhvCvuCY/h/uFkS/5MVvMrW//MVvMrpx/m0XVvMr4UB/47VvMr/d:5+seQvuCY5/u/REfk+xxdbUBQpu652GO
                                                            MD5:FAD0621010889164ADC4472003C9391F
                                                            SHA1:C4EE0B8D6925338D17D5745DE9D45FA3C628DFC5
                                                            SHA-256:2217E72B11A90F2D679C175DE3CC0F2FED4C280C9FF9707CFFAF118BF9A06A4B
                                                            SHA-512:90E8E5A109CD72458C7796CF0324F63E543CCD63D13A09A3DD28EDC8B2793C964C18E79FDF0C5067C5A481B7FB03E8413139C32F59DA07E9D7893378ABBBD2B3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santo_Domingo) {.. {-9223372036854775808 -16776 0 LMT}.. {-2524504824 -16800 0 SDMT}.. {-1159773600 -18000 0 EST}.. {-100119600 -14400 1 EDT}.. {-89668800 -18000 0 EST}.. {-5770800 -16200 1 -0430}.. {4422600 -18000 0 EST}.. {25678800 -16200 1 -0430}.. {33193800 -18000 0 EST}.. {57733200 -16200 1 -0430}.. {64816200 -18000 0 EST}.. {89182800 -16200 1 -0430}.. {96438600 -18000 0 EST}.. {120632400 -16200 1 -0430}.. {127974600 -18000 0 EST}.. {152082000 -14400 0 AST}.. {975823200 -14400 0 AST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2900
                                                            Entropy (8bit):3.6548008349990755
                                                            Encrypted:false
                                                            SSDEEP:48:5uFChlvEwR9xSSx5H4a8tf3fku+da2XUd23t8VZDG8+w/ghBPWTRz908a9zRgwun:cFIlvEwZSSxdF8tfMu+da2kdCt8VZy8n
                                                            MD5:F6B732A862659EB131C2E6FEC00E9734
                                                            SHA1:49517DF63BC5B6FEC875CE9477BBF84F4072FA31
                                                            SHA-256:0E7BA1C5A3FA3DABDAA226BFE1E8D797A3835EA554828881AB5E365EDA09B92E
                                                            SHA-512:670A5B604B5EA0F5FA15083BC1EA115B7EFD449F9EAC4518E109493591893DD3627AFC6628E0EDD1953E932E2A7AD9B5A379526548677158EC445366E4ED7166
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sao_Paulo) {.. {-9223372036854775808 -11188 0 LMT}.. {-1767214412 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-195429600 -7200 1 -02}.. {-189381600 -7200 0 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7143
                                                            Entropy (8bit):3.5885930582268815
                                                            Encrypted:false
                                                            SSDEEP:192:9OgtbdF7TI7nYUYXg9W/OAcv7vuShytWi0PnvLrqPoKR2XszXckXtoAQKW+FgL07:PJi3/ML5t7P
                                                            MD5:059960925B7DA716564823D787E0B738
                                                            SHA1:9AEBDB8FA3A2179F6B3B4C7FE66FB6D9C4FFAD74
                                                            SHA-256:699AA4926F63CD8DB41B71E7692CCB67920638CA4911437FF9922147558BCF68
                                                            SHA-512:5BE3F35271879692961EC834B79D0AEF94F34F1398BDE75BD226C758EC55D740229E9F433CEBD0494B3DA8ADA0357455D30B1BE6A6EDD0743F5E23CB718E3BAD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Scoresbysund) {.. {-9223372036854775808 -5272 0 LMT}.. {-1686090728 -7200 0 -02}.. {323841600 -3600 0 -01}.. {338961600 -7200 0 -02}.. {354679200 0 0 +00}.. {370400400 -3600 0 -01}.. {386125200 0 1 +00}.. {401850000 -3600 0 -01}.. {417574800 0 1 +00}.. {433299600 -3600 0 -01}.. {449024400 0 1 +00}.. {465354000 -3600 0 -01}.. {481078800 0 1 +00}.. {496803600 -3600 0 -01}.. {512528400 0 1 +00}.. {528253200 -3600 0 -01}.. {543978000 0 1 +00}.. {559702800 -3600 0 -01}.. {575427600 0 1 +00}.. {591152400 -3600 0 -01}.. {606877200 0 1 +00}.. {622602000 -3600 0 -01}.. {638326800 0 1 +00}.. {654656400 -3600 0 -01}.. {670381200 0 1 +00}.. {686106000 -3600 0 -01}.. {701830800 0 1 +00}.. {717555600 -3600 0 -01}.. {733280400 0 1 +00}.. {749005200 -3600 0 -01}.. {764730000 0 1 +00}.. {780454800 -3600 0 -01}.. {796179600 0 1 +00}.. {8
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.888573146674231
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/2IAcGEtOFBx+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/290tO09Z
                                                            MD5:2FF74846ADF32AA3A9418376775B7F25
                                                            SHA1:130D7548DFFEBCE74969962E335B40299D7C5C54
                                                            SHA-256:BF4FAB3AE72CC7FA4F9E34CF0551A85C54A084CD826DF5D9CC684DE6188E84DB
                                                            SHA-512:9E52C017E595EEF1C68C8A1943416A9109D7DB4C32D25F83D05213C4200869A50E2E726894E39ECA364C558BB7F5566F6150CEA5D3CB14D1DEAE28C3D8C810E0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:America/Shiprock) $TZData(:America/Denver)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8651
                                                            Entropy (8bit):3.959337076866423
                                                            Encrypted:false
                                                            SSDEEP:96:IGCG0hPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:I5G0A9DiaJCUbPI+D/iMpCIBSuk
                                                            MD5:7CCB6902749079A0496F1E2E2137448E
                                                            SHA1:3D0ED7BF1C26659F6794E26AE3869F8AB925B6DF
                                                            SHA-256:ABB08435CAE80119068A85984BFFE9C1596F4FB90F07CC01124C907E5162C189
                                                            SHA-512:0B5B2DCECC70F357DB6D590AB63E600C572EA6B3F430565EFEB29777B1901AAC55CACC7495C668F739201076B180402141BC1B2ED2357E9B4DFBABF3B122AB44
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sitka) {.. {-9223372036854775808 53927 0 LMT}.. {-3225223727 -32473 0 LMT}.. {-2188954727 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {3099492
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):207
                                                            Entropy (8bit):4.932842207797733
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290txP90ppv:MByMYbpwt2907P90b
                                                            MD5:CBFA61DBF6F7459CF8D517402B29998E
                                                            SHA1:A562B29C9470DBD25480966B0462433124BA4164
                                                            SHA-256:353CDBD46BA8C7472A93E9E800A69105801F6784B22EC50A59294CDC3BE40E18
                                                            SHA-512:00B333EAA2C32EDDA8F06457AD0E10013A0147B20F504F4F1096656F731A7C1896D5ABD83E7EDBD5D4E7DA587EE9BFA796539EB1E9F4056D75D1FDF203251150
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Barthelemy) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11289
                                                            Entropy (8bit):3.8713946894934614
                                                            Encrypted:false
                                                            SSDEEP:192:PmxVjd1cO8f7/EjUhSicN6zvfwb+8YbTE0M0J:PmrcOI7/EjiskY01J
                                                            MD5:8F068899DA75663128320633E1881333
                                                            SHA1:E9161B45D7B11A2DD6E9679AC080E84EC51561E3
                                                            SHA-256:E2917204B0C843C32051BB371CF6D0AD272C02720B9C0D913AC072C8ABE1EC64
                                                            SHA-512:2200E9B9D816157330ADAEA7383635876E5A37329B1AF9613D38BCFBE8143835837A25132A94E44A61DB8058ED98B1A33F295EA64BC1F4CE30966D52BB0B673D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/St_Johns) {.. {-9223372036854775808 -12652 0 LMT}.. {-2713897748 -12652 0 NST}.. {-1664130548 -9052 1 NDT}.. {-1650137348 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1598650148 -9052 1 NDT}.. {-1590100148 -12652 0 NST}.. {-1567286948 -9052 1 NDT}.. {-1551565748 -12652 0 NST}.. {-1535837348 -9052 1 NDT}.. {-1520116148 -12652 0 NST}.. {-1503782948 -9052 1 NDT}.. {-1488666548 -12652 0 NST}.. {-1472333348 -9052 1 NDT}.. {-1457216948 -12652 0 NST}.. {-1440883748 -9052 1 NDT}.. {-1425767348 -12652 0 NST}.. {-1409434148 -9052 1 NDT}.. {-1394317748 -12652 0 NST}.. {-1377984548 -9052 1 NDT}.. {-1362263348 -12652 0 NST}.. {-1346534948 -9052 1 NDT}.. {-1330813748 -12652 0 NST}.. {-1314480548 -9052 1 NDT}.. {-1299364148 -12652 0 NST}.. {-1283030948 -9052 1 ND
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):202
                                                            Entropy (8bit):4.907031043022691
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tMp490ppv:MByMYbpwt290g490b
                                                            MD5:D521F2D9B28C5374FC3BD540C6B6F40D
                                                            SHA1:39A3D86CB71F742F33B02F50B316638815B3CD4E
                                                            SHA-256:EDB9457A7C64E47062BDC6458FD3BCFCD6C37820F1A2BC89DFE99ED77355011F
                                                            SHA-512:05C1BE92550A962904ED3BB7DECCAC16FCB54D258F24F2AEDF755FCC44E4FEF5F86AB663945809F5D7AFA64178E807BBDAE77048270ED516DFF2C7720A746D52
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Kitts) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):202
                                                            Entropy (8bit):4.9037013606484905
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tY90ppv:MByMYbpwt290a90b
                                                            MD5:9392E5A7BD198B0308F9271E4C7E59B2
                                                            SHA1:A902440920A0318BC930957C74804A9A51EF7818
                                                            SHA-256:6727A509BB937CB3446D41B57826DE70C7028E96F088AB5B7F803BEAA18279E8
                                                            SHA-512:6DA1EAC390E72905DF1A14D82362B499D20FAD6D85F3DF116AE01E566D5D19C6D16E56DA72C458BB6143345EF45F35A53B245488C641D80BFBA200B16A59719E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Lucia) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):203
                                                            Entropy (8bit):4.919272465019375
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tXIMFJ490ppv:MByMYbpwt290tJ490b
                                                            MD5:49D0C8DAFCA053C9967EDCC4C0A484B1
                                                            SHA1:7B4999D4B9AD93306BD411DF2946D741EC597770
                                                            SHA-256:974AEED3D79124B50265C83D84F23CBE4F0328D00C75F42DD3ABC5D4C0A78DE1
                                                            SHA-512:378E3657B26C5A039FF82ECCAC7797FF45CBC6479596629B3048164EE4E035F4ECFC557AA9EAF6848E78999B4FF8C63E53C7163BDF6F626ED6111004490D6F80
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Thomas) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.909053768717241
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tzb+Q90ppv:MByMYbpwt290xyQ90b
                                                            MD5:6CFB23E7164605CDE380FB7C4D88DF11
                                                            SHA1:CC513B29AD7B59E600DBCBC97927EB632558F657
                                                            SHA-256:6B19404D295964EF66F47802836BB728FCE8E6481115797C0B5F200C354D7C8A
                                                            SHA-512:728987D0925B6E12E8A220920BEDF94180880E78F3F08F6AC740E6304B22D446846068CEA499F61E7032ADB2E700CE31954921D478C9A8B6CB599E05A6292EA3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Vincent) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):874
                                                            Entropy (8bit):4.253846650171654
                                                            Encrypted:false
                                                            SSDEEP:12:MB86290hEbmdHLCvYX4Q19xRv0+RmwPj+uLkQOzL3+ORL4FXgenM7RSslKA1PyKp:5zeOvT4xuyqoYaAxt7l
                                                            MD5:C91F801CC5E9F78B966D1DF2259C38A8
                                                            SHA1:D29C970CBFC74684D46AAAD543B73B520775632C
                                                            SHA-256:939B25C9412B9E25D73F552E87826999FC8C929770E66491D1E4530046D3E758
                                                            SHA-512:093378E61DE9310F9C48170CBB0FDBD3C79E184DA1489F759B20BCE410006A9D5A793C82E79A46E0AFF0DAA47D9DBAFD605959E491BA9ED4E55D26F293642D32
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Swift_Current) {.. {-9223372036854775808 -25880 0 LMT}.. {-2030201320 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-747241200 -21600 0 MDT}.. {-732729600 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {-684342000 -21600 1 MDT}.. {-671040000 -25200 0 MST}.. {-652892400 -21600 1 MDT}.. {-639590400 -25200 0 MST}.. {-631126800 -25200 0 MST}.. {-400086000 -21600 1 MDT}.. {-384364800 -25200 0 MST}.. {-337186800 -21600 1 MDT}.. {-321465600 -25200 0 MST}.. {-305737200 -21600 1 MDT}.. {-292435200 -25200 0 MST}.. {-273682800 -21600 1 MDT}.. {-260985600 -25200 0 MST}.. {73472400 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):341
                                                            Entropy (8bit):4.638828647226646
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2903fDm2OHskeoHxbV1ULhgdrV/uF+IcmJ3/uF+ivi9/uF+SNv:MB862903LmdHsVCn1ULSB/uF+QV/uF+q
                                                            MD5:4C4034ABAB9E4804CCB23E51694044C9
                                                            SHA1:7DB24CE83AB2C07E6F6784D27C4E3AC0F149D080
                                                            SHA-256:1F0503579B0DDDBAF88814A278127D9CD7019EDD3C35F4CBFC0EF11C0EDAFE5B
                                                            SHA-512:0BC366CD3AB2E1388D11770DC8DEC1FC94C48FDC846ABB6C487828BF9FF15CD9A1C15B33E08F6E48B7F4A6F2AD1617FF12B359784CA4C32256D72422E6825105
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tegucigalpa) {.. {-9223372036854775808 -20932 0 LMT}.. {-1538503868 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}.. {1146981600 -18000 1 CDT}.. {1154926800 -21600 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6890
                                                            Entropy (8bit):3.8331465442823704
                                                            Encrypted:false
                                                            SSDEEP:192:mJInJuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/Bm6BTd69xK7KjhVbHyR3h1gOZM:miFCC
                                                            MD5:D93B62D5F7EEBC28AC047BED2307CAE8
                                                            SHA1:8B3E02240A01B5AA42D30E86005E880916432227
                                                            SHA-256:7FB0CBB101D3B6FBB6B9DAD5446BBF9E6AEC65EC38472739E604F68F6AA9AB7B
                                                            SHA-512:3648106F4DF84CFD94AAD4E9430F8D3BBCB38A9196DE9A59246DFBBC170FADBF106DD1FD08FE2E4F7319BFFB1C2607E4F5D563C222CED8267483D1A0C388CCE5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Thule) {.. {-9223372036854775808 -16508 0 LMT}.. {-1686079492 -14400 0 AST}.. {670399200 -10800 1 ADT}.. {686120400 -14400 0 AST}.. {701848800 -10800 1 ADT}.. {717570000 -14400 0 AST}.. {733903200 -10800 1 ADT}.. {752043600 -14400 0 AST}.. {765352800 -10800 1 ADT}.. {783493200 -14400 0 AST}.. {796802400 -10800 1 ADT}.. {814942800 -14400 0 AST}.. {828856800 -10800 1 ADT}.. {846392400 -14400 0 AST}.. {860306400 -10800 1 ADT}.. {877842000 -14400 0 AST}.. {891756000 -10800 1 ADT}.. {909291600 -14400 0 AST}.. {923205600 -10800 1 ADT}.. {941346000 -14400 0 AST}.. {954655200 -10800 1 ADT}.. {972795600 -14400 0 AST}.. {986104800 -10800 1 ADT}.. {1004245200 -14400 0 AST}.. {1018159200 -10800 1 ADT}.. {1035694800 -14400 0 AST}.. {1049608800 -10800 1 ADT}.. {1067144400 -14400 0 AST}.. {1081058400 -10800 1 ADT}.. {1099198800 -14400 0 AST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.838326820531248
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7RQtHAIgpRQPN/2903MA90RQk:MByMYzp4t2903MA90D
                                                            MD5:D68B69B05D8743977BA4815B8AFE8E92
                                                            SHA1:364796989B6DD0110F1D85A8844419EB49772EC0
                                                            SHA-256:845101F85A6DAF9DEB58A075473F9E541A0B68461677779B1461DE59E3FA3D18
                                                            SHA-512:DEAA60DDF1521C269D7D386A7FCC40C8FAFB00EEA6764E6B23F4C65B8F6F596B3D5D2D3F6F7B1C22016C530B8789839F8052FDE1C2794C9F9C700C46DC8A3AEE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Thunder_Bay) $TZData(:America/Toronto)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8755
                                                            Entropy (8bit):3.8521303835918115
                                                            Encrypted:false
                                                            SSDEEP:96:CuS6mjvZk53mtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:26jFOzN6IkWq/WHQt/RY4yP
                                                            MD5:2F9983FE6248F3BF18ADE00192F4B458
                                                            SHA1:73F7302C914E442FC50DD4BFF3C57FD310E6455C
                                                            SHA-256:D7C5CB477A591931FF03C794C84EDB2319760C0B70047B325382F211E28648E3
                                                            SHA-512:B1F66008F2B62D4E1B59ED1A78A9E4F5D06BE074EB3B2466BDE3C9ED98DE96AD03FACDB8EDA6EE8F8EE890860DE6011F2BB364DE8C1276B31F37C9C525F4EC3F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tijuana) {.. {-9223372036854775808 -28084 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1451667600 -28800 0 PST}.. {-1343062800 -25200 0 MST}.. {-1234803600 -28800 0 PST}.. {-1222963200 -25200 1 PDT}.. {-1207242000 -28800 0 PST}.. {-873820800 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-761677200 -28800 0 PST}.. {-686073600 -25200 1 PDT}.. {-661539600 -28800 0 PST}.. {-504892800 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}.. {-355330800 -28800 0 PST}.. {-337186800 -25200 1 PDT}.. {-323881200 -28800 0 PST}.. {-305737200 -25200 1 PDT}.. {-292431600 -28800 0 PST}.. {-283968000 -28800 0 PST}.. {189331200 -28800 0 PST}.. {19
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11248
                                                            Entropy (8bit):3.8074559535773345
                                                            Encrypted:false
                                                            SSDEEP:192:lBqTMRnK1a8phYTXEItON0HY2iUmUFLqU:lBqTMRnK1aWhYTPtgod
                                                            MD5:8907D214D511F1D3D95C79D4AC6CA687
                                                            SHA1:7B43858C6519424615D8E6E2E6F0049D69E18E2F
                                                            SHA-256:05C99D02D1F30E578CC3F1B0C1A30432953C8D7469BF23CEDA82E4450446C9F2
                                                            SHA-512:6DDAF81D1065A293B87201C79BC0FBFE912B1EC11C6A6D74DC8515CCA90F00E7CC0ABDD0DDC9E8DA3539E1036674D0AEE58386ADE3F0C8E3BA00F553C3F65B54
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Toronto) {.. {-9223372036854775808 -19052 0 LMT}.. {-2366736148 -18000 0 EST}.. {-1632070800 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1609441200 -18000 0 EST}.. {-1601753400 -14400 1 EDT}.. {-1583697600 -18000 0 EST}.. {-1567357200 -14400 1 EDT}.. {-1554667200 -18000 0 EST}.. {-1534698000 -14400 1 EDT}.. {-1524074400 -18000 0 EST}.. {-1503248400 -14400 1 EDT}.. {-1492365600 -18000 0 EST}.. {-1471798800 -14400 1 EDT}.. {-1460916000 -18000 0 EST}.. {-1440954000 -14400 1 EDT}.. {-1428861600 -18000 0 EST}.. {-1409504400 -14400 1 EDT}.. {-1397412000 -18000 0 EST}.. {-1378054800 -14400 1 EDT}.. {-1365962400 -18000 0 EST}.. {-1346605200 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-1238954400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.864308662322047
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RRKl290ppv:MByMYbpwt290V90b
                                                            MD5:21D152A2359A4EFDE6DCC304F16096F3
                                                            SHA1:961B3CFB351615604981114A115D396D1F2006A2
                                                            SHA-256:46A236EC38F3A122D414208328A462B2A937392ECC6C55F673FB7A402F118D96
                                                            SHA-512:04A2AD6DDC2E7B0D3F95DA1C731FF553F8CBC0DD6BDFC36FB2EDCE755612103E3B4EA6F3AB7FE63CA60976538EFABF40827539DFC35B7E83129BD48471FE514B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Tortola) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9815
                                                            Entropy (8bit):3.8481935495337356
                                                            Encrypted:false
                                                            SSDEEP:192:sOR864CjSAG5a9bFzN6IkWq/WHQt/RY4yP:sO664CjSAGYbGBt/M
                                                            MD5:9423BC81647BC4C37888860CE0518BBB
                                                            SHA1:37E6E6554576D1DD36C3494EAF0BD169003D870D
                                                            SHA-256:00B5FB8F37DFF43925C501AEAB039F39F058E002572C4203286317046CC1D700
                                                            SHA-512:1830CA2B62B7CA6EEB5A924D2148925DF7DD87A7B93B21F4F023E4678EF42DC20BFF57F702923E10F4382FE6757323D21414D094E99FEEB43316DE4A7E5A909E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Vancouver) {.. {-9223372036854775808 -29548 0 LMT}.. {-2713880852 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-747237600 -25200 1 PDT}.. {-733935600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-4
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):200
                                                            Entropy (8bit):4.914983069791254
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RXgr490ppv:MByMYbpwt290xg090b
                                                            MD5:9F7DA15BE387B8F7DEC5DFFE069F3505
                                                            SHA1:D298B963B0048E9ECA3BC7B85248506AB1388479
                                                            SHA-256:561D9D04B0CE0F96A9C351C7D5C30AA1D5A42A3D70066CD9AF0DA6CBC5388DBE
                                                            SHA-512:606C2A918633C74BD2954D39B00EFA2CD9DA852BC7034F129A04258A65DC74942FA0826E9BC6E4433926E7F1375612554B04845077E434D0CD3BD15832DC6B95
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Virgin) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3033
                                                            Entropy (8bit):3.9639668937226795
                                                            Encrypted:false
                                                            SSDEEP:24:5CeFvmpn4nRfngnjSX8N8wIwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZgn:5BmC2apj/AOZFCARCeQbvb5wxMN6Ix
                                                            MD5:D4414DB00736994A19AD0FEACC77AE71
                                                            SHA1:A4B97A44BEA1FF0A76F21A21B4D63DFEDC093DC2
                                                            SHA-256:247049F795FDFDF7A9B3957EF6B1482540092AEC49147B7479E61551B6A31F47
                                                            SHA-512:A026D9F2AC297037266462B582162BE4B3715A3A2CF4E13B210149F498026DCE63809F71A803C6B33DDD44B18B6E5520E9D9F84635D8A786FBFB325227FDFE60
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Whitehorse) {.. {-9223372036854775808 -32412 0 LMT}.. {-2188997988 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-157734000 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {-121273200 -28800 0 PST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -288
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9695
                                                            Entropy (8bit):3.8209220355628766
                                                            Encrypted:false
                                                            SSDEEP:96:pOEhc8/rvNZONqXXyIjNA604qSScBgN+4ctDzIVQ/c/3hNxTh:pY8DvbO+A604qSBgI7DBch
                                                            MD5:E8DB00D2B99B308018F4F5E48AC47C3A
                                                            SHA1:8841467CB264DC9F87FABAADBE90EE2C8DACC80F
                                                            SHA-256:F3FC5F6D93D1D9EB0F3DED33873F33C47F841797D96439966F8E0A5A189941FA
                                                            SHA-512:5D684B07332ED53F9F8CB71FFF3B6D0F848426A5E4D9E7DA84E49E358C666F1C3BB9CF21352D939B35B558FC691839E24BC84656317F73C768B474AF5AC480EB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Winnipeg) {.. {-9223372036854775808 -23316 0 LMT}.. {-2602258284 -21600 0 CST}.. {-1694368800 -18000 1 CDT}.. {-1681671600 -21600 0 CST}.. {-1632067200 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1029686400 -18000 1 CDT}.. {-1018198800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-746035200 -18000 1 CDT}.. {-732733200 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620755200 -18000 1 CDT}.. {-607626000 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8683
                                                            Entropy (8bit):3.957710943557426
                                                            Encrypted:false
                                                            SSDEEP:96:po1acs6yyyxC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:p4acsW9DiaJCUbPI+D/iMpCIBSuk
                                                            MD5:18EC35FCEC15CE9304818E22222411EF
                                                            SHA1:F4A04B3E2B5F55C9582F578C3142E706C4EB6BD6
                                                            SHA-256:79B44F245D86A4EC299D1A9A2EDB2AB92D50AB5A7C1C03759D283AC4070F9005
                                                            SHA-512:40AC47AC278DF22C7ECFF568456E7C3767B38701B9A2E2639C2201DC53CDD794CF7521BCB773A8AF2A8D4A034D3BBD35BF9788FB5B4E4D51A7A139B3B3353479
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Yakutat) {.. {-9223372036854775808 52865 0 LMT}.. {-3225223727 -33535 0 LMT}.. {-2188953665 -32400 0 YST}.. {-883580400 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-757350000 -32400 0 YST}.. {-31503600 -32400 0 YST}.. {-21474000 -28800 1 YDT}.. {-5752800 -32400 0 YST}.. {9975600 -28800 1 YDT}.. {25696800 -32400 0 YST}.. {41425200 -28800 1 YDT}.. {57751200 -32400 0 YST}.. {73479600 -28800 1 YDT}.. {89200800 -32400 0 YST}.. {104929200 -28800 1 YDT}.. {120650400 -32400 0 YST}.. {126702000 -28800 1 YDT}.. {152100000 -32400 0 YST}.. {162385200 -28800 1 YDT}.. {183549600 -32400 0 YST}.. {199278000 -28800 1 YDT}.. {215604000 -32400 0 YST}.. {230727600 -28800 1 YDT}.. {247053600 -32400 0 YST}.. {262782000 -28800 1 YDT}.. {278503200 -32400 0 YST}.. {294231600 -28800 1 YDT}.. {30995
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):196
                                                            Entropy (8bit):4.860140868038404
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y77G2HAIgp7bN/290nCJ/h4907Wv:MByMY7GXp7bt290nw4907Wv
                                                            MD5:7F1D0FFA4000B0C28EF0E4FF2E2BCE80
                                                            SHA1:8FC906A8E370F103EC6737F613F037F8D67561D5
                                                            SHA-256:B95DB5099C5C96966056E292F0C8BA590A5D1A2417CC939CB7AC39A097B99B28
                                                            SHA-512:BA99FFFDB1CDE6DBE63027F494A6070487F75BD074B1768C10BD2DEC8805B3EB8A224164D1CE86A0BE583E4E6C453BAE8E40C8C1224248C83634423B79ECF7E9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Edmonton)]} {.. LoadTimeZoneFile America/Edmonton..}..set TZData(:America/Yellowknife) $TZData(:America/Edmonton)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):628
                                                            Entropy (8bit):4.077288238381896
                                                            Encrypted:false
                                                            SSDEEP:12:MB862LcUmdHE5QMFi+KdTVPZIwX8ks3mAY1+:5oUeEodZxIU8ksWAYs
                                                            MD5:57BCAE9521644BB14F858D3A6083F973
                                                            SHA1:87DE492C432373015588743EDEC3F109BAA9F824
                                                            SHA-256:76B4CAA9BACB90ADD9F1778CD266E30C4EE28BC5EE566AA674C6E1A97BD8BA5E
                                                            SHA-512:0B69F3D7E926CE086E63E659289EAD0C8BB693BB3AC49D60D585EF056BAE0158BE398172DFB322B8236BB73083D6766551369599DEB37B2BD42532835C72656B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Casey) {.. {-9223372036854775808 0 0 -00}.. {-31536000 28800 0 +08}.. {1255802400 39600 0 +11}.. {1267714800 28800 0 +08}.. {1319738400 39600 0 +11}.. {1329843600 28800 0 +08}.. {1477065600 39600 0 +11}.. {1520701200 28800 0 +08}.. {1538856000 39600 0 +11}.. {1552752000 28800 0 +08}.. {1570129200 39600 0 +11}.. {1583596800 28800 0 +08}.. {1601740860 39600 0 +11}.. {1615640400 28800 0 +08}.. {1633190460 39600 0 +11}.. {1647090000 28800 0 +08}.. {1664640060 39600 0 +11}.. {1678291200 28800 0 +08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):324
                                                            Entropy (8bit):4.360007144607037
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2L0mDm2OHEfwz0/MVSYyF/KZ7VoX/MVSYyF/VpVQVF9RXhNXSMVSYy6:MB862LVmdHEIjsF/KZOksF/Vp6v9RRFl
                                                            MD5:97AA556F7EF06786B76316133794F4E9
                                                            SHA1:B3CDA284DE80987B954E2CC9BFA3ED33462CDD4F
                                                            SHA-256:2F36D2E13D7E251322B7A7B30F39645393525CEB49A2B5C26F27797F2AAF4D7F
                                                            SHA-512:14C6F17252C2AC89D86FE00BD8A8934D627C85478B0AB08AB6237988922D18616B00878498FFFC0E1978308BC6D775E2DC3ADCEF827AB0A06B214BE4DDABAB52
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Davis) {.. {-9223372036854775808 0 0 -00}.. {-409190400 25200 0 +07}.. {-163062000 0 0 -00}.. {-28857600 25200 0 +07}.. {1255806000 18000 0 +05}.. {1268251200 25200 0 +07}.. {1319742000 18000 0 +05}.. {1329854400 25200 0 +07}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):214
                                                            Entropy (8bit):4.938579775653117
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/2L0/3Zp5/4pv:MByMdNXiU5t2Lkwv
                                                            MD5:CC22302B9FAE52E36A2A35C0361E774B
                                                            SHA1:45CFD95A5821C4C4FDF2E1519F08029FF0BE664B
                                                            SHA-256:96F2AB9A9FFCD10598FDF105F68460CC4B4EBC1F18054D1BC8E39DF6AD24D1AC
                                                            SHA-512:FC9084D7B16EAA985681762F2658D32C77EE186D8D3C7225093CC5CB4A6AEB74A3D0A41A904EB6C8AEF7DB110A89497BAFAF811BBC26103F96E5E1D4D4E1002A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Antarctica/DumontDUrville) $TZData(:Pacific/Port_Moresby)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8447
                                                            Entropy (8bit):3.850137279218428
                                                            Encrypted:false
                                                            SSDEEP:96:s1qigkx6WsYyS391QiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:s1q05h1QiAmcOM6e0pj
                                                            MD5:81C612A1544910544173687C416841C6
                                                            SHA1:4A707B403F0B9556A3D3D50B08BE0F56660F3F0B
                                                            SHA-256:C4EA7F1C0B5A0FAE653419F1C6D058BDDD745A3CDBA11900005C157DF23DDC01
                                                            SHA-512:122E2DC3D8D61CCDB83E03C9487DD29AABE7AB3F71FE4F6315209AF0BBCFD01FBDC3A1E3F6D910FB0D690378DF852170A9819D8C1EF96BE6BC8C0811BFB453A9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Macquarie) {.. {-9223372036854775808 0 0 -00}.. {-2214259200 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1669892400 39600 0 AEDT}.. {-1665388800 36000 0 AEST}.. {-1601719200 0 0 -00}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {28932480
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.7511104559982
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEzyeyFNMXGm2OHvavFeVU/VPKVVFSTVF9svUX0VQr:SlSWB9eg/2L0zyfXDm2OHEVy/Ur9s/Vg
                                                            MD5:7A2AD9BD8F8DEE5C600CABF2D5E9D07B
                                                            SHA1:CF5D230A29946B7FA3ECD8EB99F1EF1BF0FA5B50
                                                            SHA-256:ACA533B8BC82296373EDEC82F6E0AA45A34D817C7C18FF5E8E94B81C0BD30259
                                                            SHA-512:95F8FA68735E88AB15C403191928FA4AA5D1628453BE64B87EE7E8DF9F35FB5DA74A3CED5F5289A13D84A8A12BBB86734E578059CA8B6405399CFF5E33C9384C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Mawson) {.. {-9223372036854775808 0 0 -00}.. {-501206400 21600 0 +06}.. {1255809600 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):195
                                                            Entropy (8bit):4.880387042335617
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0z6/fy:MByMdTiYt2LrK
                                                            MD5:88EE32AE5C538AEBFDE2D1D944ED5B2B
                                                            SHA1:55E7234E6FFF298182A6C8889A9F506CDCE7C959
                                                            SHA-256:E9D99293C5B275D8E0D7B066084177EDF670D5B52B81E87608BAB02025F33155
                                                            SHA-512:45A3EA146CA719BA6F22E99EAA57AC1DED1C762E19BDFBA176E5FEAC36EC58586F771572DD16ACE09E660F97DEB91A701BA1B1F1AEF3BD8688F3451C0772420A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/McMurdo) $TZData(:Pacific/Auckland)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2613
                                                            Entropy (8bit):3.6082359166067905
                                                            Encrypted:false
                                                            SSDEEP:48:5fzJS6S4wRSenSOaf7HSKSkSqS7STslSmSMSCSxygSiXS/SrS+S9SfShS7SoSlSL:jdeRtnxaf7HlPlgiot7JC/Xk8NWse4rf
                                                            MD5:BDFA5908E735F866FEC16F6B481AD385
                                                            SHA1:524AEE21BB97D923A8812A5722AF2FEA43B4D971
                                                            SHA-256:1637381A20E9D5C6A530F110BDB08D9515E675C9206F000407D8511074948E61
                                                            SHA-512:3D65C7941BA15A698264848F9B6F43ED5B63D4CF86D495334E8E1DC381D63435E9424BBBC389229693D20044FDB8425A7CC805AB5EA055F59D3E0DD4C7AC2A28
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Palmer) {.. {-9223372036854775808 0 0 -00}.. {-157766400 -14400 0 -04}.. {-152654400 -14400 0 -04}.. {-132955200 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-101419200 -10800 1 -04}.. {-86821200 -14400 0 -04}.. {-71092800 -10800 1 -04}.. {-54766800 -14400 0 -04}.. {-39038400 -10800 1 -04}.. {-23317200 -14400 0 -04}.. {-7588800 -10800 0 -03}.. {128142000 -7200 1 -03}.. {136605600 -10800 0 -03}.. {389070000 -14400 0 -04}.. {403070400 -10800 1 -04}.. {416372400 -14400 0 -04}.. {434520000 -10800 1 -04}.. {447822000 -14400 0 -04}.. {466574400 -10800 1 -04}.. {479271600 -14400 0 -04}.. {498024000 -10800 1 -04}.. {510721200 -14400 0 -04}.. {529473600 -10800 1 -04}.. {545194800 -14400 0 -04}.. {560923200 -10800 1 -04}.. {574225200 -14400 0 -04}.. {592372800 -10800 1 -04}.. {605674800 -14400 0 -04}.. {624427200 -10800 1 -04}.. {63712
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):151
                                                            Entropy (8bit):4.829975802206526
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEsKRsMXGm2OHvavFN/H3VVFVGAvFv:SlSWB9eg/2L0rRsDm2OHEN/VVFAKV
                                                            MD5:C330982049AA053DA62B926627D2F2FA
                                                            SHA1:050CE68265F1A183F0173C825AC59EAE8B6AB9EB
                                                            SHA-256:943F10D8E836773F0B7ACD13ED8422C0B27813C7BBE0B09B57697D1D70D21ECE
                                                            SHA-512:DE9953D0E505D6B110C0CC4E756B5B0311646C9CA4703A33B92147D36CFB4C288D73851E6766CE1432F41AB51B5D0A1D58680BDB4E28F067E1D36F670B4A192E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Rothera) {.. {-9223372036854775808 0 0 -00}.. {218246400 -10800 0 -03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):198
                                                            Entropy (8bit):4.906125935761354
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0tlo+ply:MByMdTiYt2LMq+p8
                                                            MD5:8095A3749DBDE05377836D74A4EEFE33
                                                            SHA1:6987CA972B63AE26A65654961588D51D3EF2166C
                                                            SHA-256:88057832175BB642B23FC99F788A2F78A24005CF1F84A7B1B5E8C84FB8F4D4C1
                                                            SHA-512:9066104C9C16D2AB88523D651C74CE268468E093A497D128D0D12A986BD62DBC1388A56ED1737C2AFACF04185CF06FD0EE66797A3390B2F0E1EB08A4D92AAFAD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/South_Pole) $TZData(:Pacific/Auckland)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.871844665431957
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2L0GRHEtWlFBQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2L0tQB
                                                            MD5:CA52057130DCF506D11A7CC069F4FBA3
                                                            SHA1:2C38B7E7872BB41C3569DFCB539C3EC3AAE24FDD
                                                            SHA-256:2488805DE4FEA42305689F679F1AE2D80B1E934E657FEA329AD39A82DAC63022
                                                            SHA-512:B19D409870939C8F0834C6C028239E010EE5128DFA6E97D4903BECA229B04FE530EA376B936767D9BFE21709720C1791289D8E3622B17C18F2680B0670794A02
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Antarctica/Syowa) $TZData(:Asia/Riyadh)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5370
                                                            Entropy (8bit):3.5134546899897146
                                                            Encrypted:false
                                                            SSDEEP:96:YveRdmbxnKIJqU9XThVIsopb8BcrFgoZVlzeEG+PtJ:UeRdmNnKIIajfopb3FVVJ
                                                            MD5:442F495C36B31CA5D7A9BEFF12105AEF
                                                            SHA1:B3F6CA5B4A5756F9B2C09A27198F7A651CC6032D
                                                            SHA-256:6FD5AB8B7B308CDCEA4B747A81D8675988AE218813C91714FC4CA97919CEBEA5
                                                            SHA-512:C6EAECC26D67D218615EBB5602639DAB62A2578BD9683553D765DC1AC5580627D29B6F911388F5F1BFC284278EA4EBECE94630D3C6B95FF9EF93D3D61A3C2028
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Troll) {.. {-9223372036854775808 0 0 -00}.. {1108166400 0 0 +00}.. {1111885200 7200 1 +02}.. {1130634000 0 0 +00}.. {1143334800 7200 1 +02}.. {1162083600 0 0 +00}.. {1174784400 7200 1 +02}.. {1193533200 0 0 +00}.. {1206838800 7200 1 +02}.. {1224982800 0 0 +00}.. {1238288400 7200 1 +02}.. {1256432400 0 0 +00}.. {1269738000 7200 1 +02}.. {1288486800 0 0 +00}.. {1301187600 7200 1 +02}.. {1319936400 0 0 +00}.. {1332637200 7200 1 +02}.. {1351386000 0 0 +00}.. {1364691600 7200 1 +02}.. {1382835600 0 0 +00}.. {1396141200 7200 1 +02}.. {1414285200 0 0 +00}.. {1427590800 7200 1 +02}.. {1445734800 0 0 +00}.. {1459040400 7200 1 +02}.. {1477789200 0 0 +00}.. {1490490000 7200 1 +02}.. {1509238800 0 0 +00}.. {1521939600 7200 1 +02}.. {1540688400 0 0 +00}.. {1553994000 7200 1 +02}.. {1572138000 0 0 +00}.. {1585443600 7200 1 +02}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):234
                                                            Entropy (8bit):4.519920980071167
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2L0XcMFPDm2OHEsVFXC/MVSYyF/3jaRzMVSYyF/yFZ/VQVV:MB862LEcEbmdHEsVFZsF/OR4sF/Cx6r
                                                            MD5:4266896558FEF8B0D95D887C8521C381
                                                            SHA1:104E3B69CD5EC870C419F3DC92F6060CF548B4B0
                                                            SHA-256:08D7BA1193B13481DE933A5BA747F1129B66DCDE7867E5F9EB6E5BA72F1143EF
                                                            SHA-512:A4AD3B1D7D23774B6313E945CCB30EA1EF252414BD5E4CB7DCA292FE665FE08403F59B677644DA2BE58AEA41C56A4279336B516B62974F33AC17E702328FDD8C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Vostok) {.. {-9223372036854775808 0 0 -00}.. {-380073600 25200 0 +07}.. {760035600 0 0 -00}.. {783648000 25200 0 +07}.. {1702839600 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.947168975083595
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/y+YF3vXHAIgoq8yFRRL/2XbeLo4cA4FH/h8QahV:SlSWB9vsM3ymhVoPHAIgoh6N/2XbUyAH
                                                            MD5:A4F076D7D716467B78EA382FA222CB38
                                                            SHA1:21D7FBA308ADC652F541A0336929B862F7B1BD0B
                                                            SHA-256:25462B656D240DA6B01C1A630FAC04B25DD65C799B659BE1C8BD3AB62610966F
                                                            SHA-512:1B6BD455E533D5BDC7F3506561A9CA804B1F9CA5CC0665AAB0FC083106AB32FF149DD5FFF62EF7BABAD87E3274F264446D492FB8BE160C9C7F281C7060BF1F61
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Berlin)]} {.. LoadTimeZoneFile Europe/Berlin..}..set TZData(:Arctic/Longyearbyen) $TZData(:Europe/Berlin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):171
                                                            Entropy (8bit):4.829666491766117
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFK4h4WFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKs46
                                                            MD5:60D7F3194F19179E0CF0F561F9C40EE6
                                                            SHA1:B079EC49485CFBFFB7A5BE6149319B75684258E9
                                                            SHA-256:8FCDDB246932BAED880B70C0CA867057E7989AEA55EDDC174430E1055CD1058D
                                                            SHA-512:0BDC86B1D473D4875C6F7C092F955D0999E6C1F2EF83CFC7726A3C5BFEB0F5CB8E00B1F0CBC1F91F806EC635C472927504DF681A32DAC55EF372DA16FEA9EF40
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Aden) $TZData(:Asia/Riyadh)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1667
                                                            Entropy (8bit):3.727394465632045
                                                            Encrypted:false
                                                            SSDEEP:24:5qehddmvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10SvPFu+a+CK/Eu3CWuD0VobJ:5YvdJqxiF0rvK50Sv9fGS8r
                                                            MD5:E6DE3AE4C3662697E2BA887090E559D4
                                                            SHA1:2EF20F4001BE922598A6EB889A2F6B51DA148B32
                                                            SHA-256:DF50667B065C9E7C37C384D65ACA67D8FD171095187EEE83D0CC470540A291C0
                                                            SHA-512:707CF114E1A95328A4C78F7EBD7567566F8BE6E2114D9014339A2CC1D299359BBFDF5FF47C9644D8D7AE283C818204EE363A1F728ABCB24716F9EA98A8E86922
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Almaty) {.. {-9223372036854775808 18468 0 LMT}.. {-1441170468 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {695768400 21600 0 +06}.. {701812800 25200 1 +06}.. {717537600 21600 0 +06}.. {733262400 25200 1 +06}.. {748987200 21600 0 +06}.. {764712
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2682
                                                            Entropy (8bit):3.7873260611521915
                                                            Encrypted:false
                                                            SSDEEP:48:5MUNHl0Nhb9bGA9jSb0PWtsjOuH7Ay2n3yy7QYoTZg703q4oPuJ9/YXjpdaOP9kA:Fz0T52akyId7+xOXdkwqeIFcR
                                                            MD5:7E70BD44FBF5BF70E3C5246D3A83A49B
                                                            SHA1:10A28B0A3189DF347CF9853C024E9467CAC56DBA
                                                            SHA-256:B70AABECACD3F62AF506DF395AB44F47F2CA091522B04EC87AC1407172DD1BFA
                                                            SHA-512:766565F837EB777749B2C8AAE6C73A2274A772CEF12E7C2E30A89809FEF1E9ED6B067DF044A4676AA4BE76A64A904692C3887336BF01BA4D5D9A5020FB792938
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Amman) {.. {-9223372036854775808 8624 0 LMT}.. {-1230776624 7200 0 EET}.. {108165600 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {215643600 7200 0 EET}.. {231285600 10800 1 EEST}.. {244501200 7200 0 EET}.. {262735200 10800 1 EEST}.. {275950800 7200 0 EET}.. {481154400 10800 1 EEST}.. {496962000 7200 0 EET}.. {512949600 10800 1 EEST}.. {528670800 7200 0 EET}.. {544399200 10800 1 EEST}.. {560120400 7200 0 EET}.. {575848800 10800 1 EEST}.. {592174800 7200 0 EET}.. {610581600 10800 1 EEST}.. {623624400 7200 0 EET}.. {641167200 10800 1 EEST}.. {655074000 7200 0 EET}.. {671839200 10800 1 EEST}.. {685918800 7200 0 EET}.. {702856800 10800 1 EEST}.. {717973200 7200 0 EET}.. {733701600 10800 1 EEST}.. {749422800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2086
                                                            Entropy (8bit):3.7698340044911616
                                                            Encrypted:false
                                                            SSDEEP:24:5DeEdVrEOeFt7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5ZejsFLrcZwvJt2F+doTr9Q3G80
                                                            MD5:6EFC35043BDCA4AB61D72E931DB954E6
                                                            SHA1:F0B4E76C154DC773073E41AA8E94030E972A986A
                                                            SHA-256:D9DF64FDA4638F7604624B0F68A885D5ABADB1DE12AF1AF5581C2AF7DD971562
                                                            SHA-512:16AE582B113D6960C73B64620A8AF20F9D436AA4B3EC8E881617AED3389EB4357931882103F162F19EE8202953A7E6FB4FDD6D7760FB7621F4DB9D229AD13F17
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Anadyr) {.. {-9223372036854775808 42596 0 LMT}.. {-1441194596 43200 0 +12}.. {-1247572800 46800 0 +14}.. {354884400 50400 1 +14}.. {370692000 46800 0 +13}.. {386420400 43200 0 +13}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1665
                                                            Entropy (8bit):3.7149890651919644
                                                            Encrypted:false
                                                            SSDEEP:48:5uvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIkhYwr:sFBNKs6b03zB0WJEuDa7sFZiKWaN6TiF
                                                            MD5:A72FB1FE01C93BD7E0A8136635C72639
                                                            SHA1:2383CF839F50784D4BF8B7EDDB324C80E2DDD0DC
                                                            SHA-256:96B510AF9B8C6BC1DFA84E9ED5E072F3FD484EEB66BBEBC7B6826ED859ED9027
                                                            SHA-512:061FECE3C750C0229638DD8AF38FB3E8E48E59E0DE1B13BCFE46483A7A170B71B9BCB0D6F110B6B2EF68510FA940F9066F14CBD59829E222D6644D3657CE1893
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtau) {.. {-9223372036854775808 12064 0 LMT}.. {-1441164064 14400 0 +04}.. {-1247544000 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {7647156
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1666
                                                            Entropy (8bit):3.721746335201775
                                                            Encrypted:false
                                                            SSDEEP:48:5FUvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQR:PwaBNKs6b03zB0WJEuDa7sFZiKWaN6Tt
                                                            MD5:E278B985BD2515DBCAED8CB741BE9208
                                                            SHA1:BC9F5E72C430661D7ED1AF04571CE5D0F73DD18D
                                                            SHA-256:991638FA2AB2A2F7A091A23D78D99306EE73A740F1A03FBAC448EDCAB55A0E38
                                                            SHA-512:9951DB729B837647CC4B3D2E605525DCCBAFFD39D76460331BF62235DCAE5E4470CDA578F940B1739AABFEC55D293FF60D79AE0EFDFE1EB64E84571881FDEA6A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtobe) {.. {-9223372036854775808 13720 0 LMT}.. {-1441165720 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):878
                                                            Entropy (8bit):3.937249024843323
                                                            Encrypted:false
                                                            SSDEEP:24:5ggeRMdIQvNcDvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKTob3CGcr:5gbkvNSvNhQQvmRKqv0fvzQIovWdvEGD
                                                            MD5:259179C7A1CA04F9F3A373B6C8FCB8C5
                                                            SHA1:D042DF8EFD8EC1473B45B1131BD5EB714F1B2C17
                                                            SHA-256:13745BFA25E6E2D8D0FABAE42CB7C37CF9F974CFB343D4FE84E4E2D64A25926B
                                                            SHA-512:703BEAD5A1E5B3816D98057A08A87C2139F418787F38561FE35175B84E2005365727F85D1B949CC5DF464B207A7D01BB65FB1A632E73DDA523E843B82D76FBBD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ashgabat) {.. {-9223372036854775808 14012 0 LMT}.. {-1441166012 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +05}.. {370720800 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.801820439218014
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8xEYM4DyXHAIgN/ZEYovFvWARL/2WFKUNSH+WFKYEQ:SlSWB9vsM3yR+HAIgH8VWAN/2wKUNSeq
                                                            MD5:5193EF7ADB646798801245BC50C8DDA6
                                                            SHA1:83ED851CBC60EFB330A8FC119E1BED5B4C0BA630
                                                            SHA-256:2C752F641B98E3C05B14AE31330D1F198DAA4A7E354BA9670C7754926BFB891A
                                                            SHA-512:E940E1BE67A9AC895F3D060B1CB34797A429147A9DC2AC0F1162D37D86661EF217EDABA720F0AE3796186FE801229210AC785BB4511CBBE5A41791D236101D8C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ashgabat)]} {.. LoadTimeZoneFile Asia/Ashgabat..}..set TZData(:Asia/Ashkhabad) $TZData(:Asia/Ashgabat)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1666
                                                            Entropy (8bit):3.7265766742957402
                                                            Encrypted:false
                                                            SSDEEP:48:55TvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQJ:XrFBNKs6b03zB0WJEuDa7sFZiKWaN6Tl
                                                            MD5:0236793F90ABC6F68718DDBB44AF5E2F
                                                            SHA1:A5EFAEEF9B9159E748A3FED231F8A978E400482E
                                                            SHA-256:4B7B118E6AE72D41740CF0CB2BD8E970700758DCBC0DD6F298199D841DF8408E
                                                            SHA-512:851C7A9C110790454312BB9C5B5D3C426365EEF4673191B9ABB2E4A32301894C5FB1ADCBE2A4C67BEE416AD63FB8BED85F94EF9BF42473DA4BFFA7824935A1D5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Atyrau) {.. {-9223372036854775808 12464 0 LMT}.. {-1441164464 10800 0 +03}.. {-1247540400 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764715
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1702
                                                            Entropy (8bit):3.7261419515679393
                                                            Encrypted:false
                                                            SSDEEP:24:5/eVvyGiHD6UC4UrUomFMmUZcjbUKNFcUEUvUOpU8MYUWCUlbf/U9bUiUUybUQUF:5m8G9mFdnNF1FfsTuvQXHCe
                                                            MD5:690013310A46BD1AE250A5E019353809
                                                            SHA1:0DF434C7EEB707DC071007FAB112F4DEB37E936F
                                                            SHA-256:D20B75D2604C3B742C1629C5EE02CFF6783E472249982B272B68F2A6DE9BDC38
                                                            SHA-512:FF8C33E55E4F006C38D3FD37A1AD3E1200718CA374ECBEAE8255C7635912F0BB23A59A600BF7130D5660A24C515F726E8440D0D908E560CB59F74059638E6AA2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baghdad) {.. {-9223372036854775808 10660 0 LMT}.. {-2524532260 10656 0 BMT}.. {-1641005856 10800 0 +03}.. {389048400 14400 0 +03}.. {402264000 10800 0 +03}.. {417906000 14400 1 +03}.. {433800000 10800 0 +03}.. {449614800 14400 1 +03}.. {465422400 10800 0 +03}.. {481150800 14400 1 +03}.. {496792800 10800 0 +03}.. {512517600 14400 1 +03}.. {528242400 10800 0 +03}.. {543967200 14400 1 +03}.. {559692000 10800 0 +03}.. {575416800 14400 1 +03}.. {591141600 10800 0 +03}.. {606866400 14400 1 +03}.. {622591200 10800 0 +03}.. {638316000 14400 1 +03}.. {654645600 10800 0 +03}.. {670464000 14400 1 +03}.. {686275200 10800 0 +03}.. {702086400 14400 1 +03}.. {717897600 10800 0 +03}.. {733622400 14400 1 +03}.. {749433600 10800 0 +03}.. {765158400 14400 1 +03}.. {780969600 10800 0 +03}.. {796694400 14400 1 +03}.. {812505600 10800 0 +03}.. {82831
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):171
                                                            Entropy (8bit):4.784355129067593
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8hkXHAIgNvZORL/2WFKENUKMFB/4WFKKB:SlSWB9vsM3yBkHAIgPON/2wKENUr/4wT
                                                            MD5:1B5E0D449DAEF469D586A853CB3073AD
                                                            SHA1:FD735B0472B31644E787767B82B737CC39EC4175
                                                            SHA-256:3D437037FBF2BBDF969C8E71967080947F24860D431B39F5D8F23151316ABCD5
                                                            SHA-512:2A2DC33D4258A5E1AE59172883F3B11723798ED35CF5AF1B8BA81A8807DC6F8222C8044D82B152EF6AF43E7350FEB2625D4406C6C7DD309CE65810EA3D3286B6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Qatar)]} {.. LoadTimeZoneFile Asia/Qatar..}..set TZData(:Asia/Bahrain) $TZData(:Asia/Qatar)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2149
                                                            Entropy (8bit):3.6155622322573713
                                                            Encrypted:false
                                                            SSDEEP:24:5/eFdqlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUTIEjvZJ+76:5RsUf8mFpNWFny1ZGMte3aivUKo
                                                            MD5:294DFC98F67AC00A188EC3D3B87C501C
                                                            SHA1:93C434CD9AA170E35AD676C88EE09986A94EC02A
                                                            SHA-256:873E8F08B87610D0DAFE239D32345248A4595C6B13D1DA83EC214D78E88FA12C
                                                            SHA-512:5346082CCA733724C0D2C36B768467E59BA9ED6452B6CF1BA923AF4F0D2BC05C67DB49E804CA81DAD449D30D0835026D708D9AB632D02FDA1EA1A0BF717111DE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baku) {.. {-9223372036854775808 11964 0 LMT}.. {-1441163964 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 14400 0 +04}.. {820440000 14400 0 +04}.. {828234000 18000 1 +05}.. {846378000 14400 0 +04}.. {852062400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.911309754748998
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKELYOiMXGm2OHB+keoHvZKmrROpDovFFsQ+8EXVeVSYe:SlSWB9eg/2wKELeDm2OHxeoHvZ3FO1og
                                                            MD5:9AC4947AC29C797055B7EBFA4F6AC710
                                                            SHA1:E7758A9A8BFA255F6B2D27F5366D9FE2A26DDF6C
                                                            SHA-256:6E72BA908F250FD45D554A12E3E7B3BD2F1C02A6C2431F806FD2A054F843AA90
                                                            SHA-512:F9D0F0CB7D3726C2AB3B5049429172D9DD4BA21353F6F98570CBA4EE969F7D97BD973CB165AECFF930AFFA8633E8052624D44EE7FB91763681ED3F78A61F4F98
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bangkok) {.. {-9223372036854775808 24124 0 LMT}.. {-2840164924 24124 0 BMT}.. {-1570084924 25200 0 +07}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2117
                                                            Entropy (8bit):3.7025684250364725
                                                            Encrypted:false
                                                            SSDEEP:24:5VeTtXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEnsr:5n40yVRB7VfXucdKmtTTDOV
                                                            MD5:6CC13B6910412A3A3D16CA36ADF00352
                                                            SHA1:061CF4A8FEA8C139F50F96E6B6506B50ED3DD792
                                                            SHA-256:992F93A7975F8CD4E94D96B3BA1ECFB3585E52A53F4442A15993402D3F955F66
                                                            SHA-512:4E9750B1C3C0BA4F7922BCBC76276A3E74031D78A98E21DC59F66D6EA8E1B70865BBEB50A6B77EB0423421A18428B97B47412053CE15213128CEED669F4DD6E8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Barnaul) {.. {-9223372036854775808 20100 0 LMT}.. {-1579844100 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {76470
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8024
                                                            Entropy (8bit):3.7230911686481774
                                                            Encrypted:false
                                                            SSDEEP:96:4nBKPP8LFH0TDkywaZb1QSCK5VUjiO1PoBQpo7778CZicJZS80EGcLt4Mok1MgJl:4M38LCRZb+sAiO1PoBQpo1ikjD
                                                            MD5:1D99E2BBB01B1669403CFBAF7E03F733
                                                            SHA1:DBDD58C7FD195FC602C4541D6F416CC96094C121
                                                            SHA-256:17AF14646D562AFE17DCCFD1D2FBA95C122F3E0263906A36EB48BFF04ACF233E
                                                            SHA-512:98524E8DCD17C090058F17BDA1200D9801EB1B14EB5CEB8C31149A4A402A53BA4923A2AFF457E0A72DAA601D88095247806F945F704000F874FCBF73631DD135
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Beirut) {.. {-9223372036854775808 8520 0 LMT}.. {-2840149320 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1473645600 10800 1 EEST}.. {-1460948400 7200 0 EET}.. {-399866400 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336794400 10800 1 EEST}.. {-323578800 7200 0 EET}.. {-305172000 10800 1 EEST}.. {-291956400 7200 0 EET}.. {-273636000 10800 1 EEST}.. {-260420400 7200 0 EET}.. {78012000 10800 1 EEST}.. {86734800 7200 0 EET}.. {105055200 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {212965200 7200 0 EET}.. {231285600 10800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1669
                                                            Entropy (8bit):3.7443715330695735
                                                            Encrypted:false
                                                            SSDEEP:48:5qvdJqxiF0rvK5XvV4vUzvCjvT7voPvkPvJUbvn0vYpv99v3uvuWvKJhv3T:Ad1mzK5/VkULCbTjoHkHJUDnQYV9p3mO
                                                            MD5:1EE8FF3DF0D931A140ADBB021EB3BFEB
                                                            SHA1:F1F15EF70C4E9F456849AF89CAC97AD747D9E192
                                                            SHA-256:1D5E9A8F6A04273AF741F648EF10718B004A60D7884FE432DDF85A8F558BEA98
                                                            SHA-512:155539A5CF21A34FBFACBF1652D934BF32255F4E505E60B3B4D8B5F2F7FAE552E6CB4824D8608A9C56370F58E48702335995BBD16B7A296A86A72A615FBC8ABC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bishkek) {.. {-9223372036854775808 17904 0 LMT}.. {-1441169904 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {683586000 18000 0 +05}.. {703018800 21600 1 +05}.. {717530400 18000 0 +05}.. {734468400 21600 1 +05}.. {748980000 18000 0 +05}.. {765918000 21600 1 +05}.. {78042
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.949517569857329
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8kLP/vXHAIgN16L1RL/2WFKXeAMM7QWFKPLPyn:SlSWB9vsM3yELPHAIg+L1N/2wK0oQwKW
                                                            MD5:716D842F23974137C5E07A1A65CEFC5D
                                                            SHA1:C7248C9DBD6AE5AF33BD4B3602D17737EBE023A0
                                                            SHA-256:F3110E9DD514E3654A9DE777E22B2D2391692927954B4B7E42ED54AB665C3CF5
                                                            SHA-512:4EC012EAABE60728D9447EEDF4BA7B16CA82786AA39EE79B2F9B32F227F9816FCE42F173153261F9AF88A12209752E84EBD7170C54D126C2DBB1ED3A8D069668
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kuching)]} {.. LoadTimeZoneFile Asia/Kuching..}..set TZData(:Asia/Brunei) $TZData(:Asia/Kuching)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.774027471796823
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq864DyXHAIgN1QvRL/2WFKh0s+WFKvovn:SlSWB9vsM3ya4DSHAIgcvN/2wKN+wKvy
                                                            MD5:8BB098AB77CB0469B1FA0E0B64C4A9E7
                                                            SHA1:88C73626985071DD0923E1CAB343ACCD854A7297
                                                            SHA-256:1BAEF7850111D2C33B2A766A8AE804534ABA1711BF80A4087A89656DDD8469D5
                                                            SHA-512:82216A7F787AF20A4C97C7AA754CD6BE979FEF24137CF9A8B18EECA5E8FBCF12834DD8A6FC9CD2357D807F1629806745B46B11DC0472E0284E18DCCC983897DE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kolkata)]} {.. LoadTimeZoneFile Asia/Kolkata..}..set TZData(:Asia/Calcutta) $TZData(:Asia/Kolkata)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2086
                                                            Entropy (8bit):3.6981807774781017
                                                            Encrypted:false
                                                            SSDEEP:48:5Bpr1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2M:95PhtjLiII2ZFlgd
                                                            MD5:69E03A5CEB689E19B60168C0F7EBAE8E
                                                            SHA1:95C6396EB753753B4FE4AE1B98D76332523E72A4
                                                            SHA-256:10B6F435B05D887176A4D90CA5AC957F327F62F36F15D6F6E4F81844662429B9
                                                            SHA-512:DFA72EDC54A11F0840ADBEE7F5AD8EA472AA52A1F196292F1341CD92A68FB2EC0A5BC7DE6C8E83C975420DB4B76CECD4393370FDB2C09F86EC11A50E540F6F02
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Chita) {.. {-9223372036854775808 27232 0 LMT}.. {-1579419232 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647012
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1619
                                                            Entropy (8bit):3.775783980828041
                                                            Encrypted:false
                                                            SSDEEP:48:5th5fSW2sp4Qh2rRSQnGw7GywvWbC25XrMYWG4AIQTUhp9pkTGdXguHaena44XY5:rh5kpmWG29QFUmD
                                                            MD5:540A7304A62ABB8D7F84454ABD6E2556
                                                            SHA1:52C37529929218A668D7A4AD6FD1B5FE0A727E16
                                                            SHA-256:94B2C14EF45C695EF6B19D94722E1BCBB629A595F2866DBA80F00A66721040B5
                                                            SHA-512:3B535D109DB369E301D6B412F21EC990976B997826F22B2E16ECEEEB048D60F064C7CA1A616393DC2F1B491BAC0548DC0965B9EA149A95280FFDBCAD6726EF0F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Choibalsan) {.. {-9223372036854775808 27480 0 LMT}.. {-2032933080 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 36000 0 +09}.. {433778400 32400 0 +09}.. {449593200 36000 1 +09}.. {465314400 32400 0 +09}.. {481042800 36000 1 +09}.. {496764000 32400 0 +09}.. {512492400 36000 1 +09}.. {528213600 32400 0 +09}.. {543942000 36000 1 +09}.. {559663200 32400 0 +09}.. {575391600 36000 1 +09}.. {591112800 32400 0 +09}.. {606841200 36000 1 +09}.. {622562400 32400 0 +09}.. {638290800 36000 1 +09}.. {654616800 32400 0 +09}.. {670345200 36000 1 +09}.. {686066400 32400 0 +09}.. {701794800 36000 1 +09}.. {717516000 32400 0 +09}.. {733244400 36000 1 +09}.. {748965600 32400 0 +09}.. {764694000 36000 1 +09}.. {780415200 32400 0 +09}.. {796143600 36000 1 +09}.. {811864800 32400 0 +09}.. {828198000 36000 1 +09}.. {843919200 32400 0 +09}.. {8596
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.865222436335267
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKh2V7/4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKho4wKU
                                                            MD5:C5DC40C6325391F7247251ADB2C07F78
                                                            SHA1:3DDB1BF94532FB1F1271095B9C8CAA779BC545EF
                                                            SHA-256:A87382DC5F3C3141547A65E3746AF1DAF94B51468B96DA6CEF30E95754C97D37
                                                            SHA-512:062FF8D5E5392E5372B0405EDF3C7CF997AC33F95EBFFAA9CC9AB82BBE27B60C80255FCCEE9E6F5E02CBFCB163F99984BB2103217FFD1F80BDEC5C684BF2F61A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chongqing) $TZData(:Asia/Shanghai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.889115378893491
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFK7LeL9J4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wK7LUT4wj
                                                            MD5:C3676771EB813B346F58A7B574D0D7B5
                                                            SHA1:A473EF621309E019F29F3DEF95C38593775B8404
                                                            SHA-256:D6D2B4A761C547F1F853AE901AC71AB49FBE825037079C4E0C89DC940AE4A822
                                                            SHA-512:21C3A5D499E6E0427FBF585CA8CC5D99D193C586483AB107C4D8E9F9DC8412021E8E019A314757DAFE1225D2635F6D48E9C54A511709863F22A02449FA201E02
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chungking) $TZData(:Asia/Shanghai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):369
                                                            Entropy (8bit):4.465596050904646
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKr+iDm2OHgoHvZv9tdvjSWV/FSQipPUrKkTD/k5QqRVVFSQOR/UIp:MB862zZmdHgCvZvJvj1Nj+Phkv/YtvjA
                                                            MD5:9541BB43E79AB0C6E8163945B5BFB1BF
                                                            SHA1:C4994420DB8313DECDE19B4B9F6C5DB0126A95A7
                                                            SHA-256:E5B5E6D607A15DA65CB00C92C35A63EAF25F547E64CB34BB419CB8CFC2714B1B
                                                            SHA-512:46F623B3F7CF8A50F97DD812521398EB9100C9CDFB967C18EF1BD112306AAEB3C9CB224424E48611CB8CC21D1DC3D820DD83032D12BC9DF19301CF07786FA664
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Colombo) {.. {-9223372036854775808 19164 0 LMT}.. {-2840159964 19172 0 MMT}.. {-2019705572 19800 0 +0530}.. {-883287000 21600 1 +06}.. {-862639200 23400 1 +0630}.. {-764051400 19800 0 +0530}.. {832962600 23400 0 +0630}.. {846266400 21600 0 +06}.. {1145039400 19800 0 +0530}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):169
                                                            Entropy (8bit):4.786111096226559
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ntyXHAIgN6KyFvRL/2WFK1S2WFKwBn:SlSWB9vsM3yHtSHAIgMKON/2wKM2wKwB
                                                            MD5:BA575D37459540907A644438071277F8
                                                            SHA1:14CF10D6AABBAF7BAE42B3B9641D8469C206567F
                                                            SHA-256:B3AD560F66EA330E54A147017E6E6AB64452A5255D097B962D540836D7B19EE7
                                                            SHA-512:9CA386EF4D812B00C2E63558B81B273F92BBCA98AF304C9FD6FC166210FC4E2F92B769E1D6FB96B670650DC76EFFAD2FC6E39AE12C24B47EAED4E50A2AFAC2D7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dhaka)]} {.. LoadTimeZoneFile Asia/Dhaka..}..set TZData(:Asia/Dacca) $TZData(:Asia/Dhaka)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3692
                                                            Entropy (8bit):3.7832279883701254
                                                            Encrypted:false
                                                            SSDEEP:48:59xu6+RYla5W87rtYV08a7bd+dYV004X7JkX3Q0dzPeP2ua/XAog7jP/xZsNaTvT:8YI5WpVAdVGlkBOLh8X0CkBheIFlR
                                                            MD5:1D6B2CC38669C0F7378D9A576F10C477
                                                            SHA1:09A31E6295D9FC39219DFA4FC598B46F55C41180
                                                            SHA-256:7E577F0F9DA459BA1A325BE95C1FA0DB2C6ECFC1D64CDB73F3ADB09588293BA7
                                                            SHA-512:A0BBD5CE7883C275BF9752C75BA0C9AF0181046D94D27EFC96EC8823C374BADCB69B2B11D2C4497295E5BC25D5790634C69C6E7185F406F2107A8E16044E670F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Damascus) {.. {-9223372036854775808 8712 0 LMT}.. {-1577931912 7200 0 EET}.. {-1568592000 10800 1 EEST}.. {-1554080400 7200 0 EET}.. {-1537142400 10800 1 EEST}.. {-1522630800 7200 0 EET}.. {-1505692800 10800 1 EEST}.. {-1491181200 7200 0 EET}.. {-1474243200 10800 1 EEST}.. {-1459126800 7200 0 EET}.. {-242265600 10800 1 EEST}.. {-228877200 7200 0 EET}.. {-210556800 10800 1 EEST}.. {-197427600 7200 0 EET}.. {-178934400 10800 1 EEST}.. {-165718800 7200 0 EET}.. {-147398400 10800 1 EEST}.. {-134269200 7200 0 EET}.. {-116467200 10800 1 EEST}.. {-102646800 7200 0 EET}.. {-84326400 10800 1 EEST}.. {-71110800 7200 0 EET}.. {-52704000 10800 1 EEST}.. {-39488400 7200 0 EET}.. {-21168000 10800 1 EEST}.. {-7952400 7200 0 EET}.. {10368000 10800 1 EEST}.. {23583600 7200 0 EET}.. {41904000 10800 1 EEST}.. {55119600 7200 0 EET}.. {73526400 10800 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):364
                                                            Entropy (8bit):4.412125512631861
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKwiDm2OHEmVFnoHv9vX+Yl7UIFckVVFSQiL/FG/UIvy/Ur9i/Ur97:MB862Y2mdHzdCv9P+Y9vvjeQlP9/9VkK
                                                            MD5:B5496A038AC230B9D75AA22BB2BE6BDD
                                                            SHA1:ACFD9C78F803F344272E8E188C41ED969EBADA16
                                                            SHA-256:BFC4562055CC4355E79F9EFAA580A4C6A658285916159A5D390A0CDA96A97E98
                                                            SHA-512:AB05D0176DADC1ED03CC526C372B9827A5FA03459E4F4B4365C6CE4B6FBDA043514A9D3FE2DA747159C5A1BC0E07727E6578A101E42B4DB120AF9624368C5FEA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dhaka) {.. {-9223372036854775808 21700 0 LMT}.. {-2524543300 21200 0 HMT}.. {-891582800 23400 0 +0630}.. {-872058600 19800 0 +0530}.. {-862637400 23400 0 +0630}.. {-576138600 21600 0 +06}.. {1230746400 21600 0 +06}.. {1245430800 25200 1 +06}.. {1262278800 21600 0 +06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):235
                                                            Entropy (8bit):4.597480383845617
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKCXeSDm2OHnBGeoH1mpvyvScHTU71avScr:MB862qXbmdHnBvC1SyHHq8Hr
                                                            MD5:316DDF860FA234621698EB473E558DB7
                                                            SHA1:35BF955F764555945CF8B314B8E881DAD6CF557B
                                                            SHA-256:8BC2E0D77AC35B6D63E11B820AC45EC23A4195ED773680C600C772FDF4B953F8
                                                            SHA-512:D1A8D5F1DAAB7827BDCBC14506AF8681FD1ED94C6101CC4A3C8CC2A76EA7D3649038069158C539A2007A1B0734FBD87DE120415E07A3F08F44417100C95459F5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dili) {.. {-9223372036854775808 30140 0 LMT}.. {-1830414140 28800 0 +08}.. {-879152400 32400 0 +09}.. {199897200 28800 0 +08}.. {969120000 32400 0 +09}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):148
                                                            Entropy (8bit):4.97292023820863
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKQUMXGm2OHvkdoHsQK23NVsRYovV:SlSWB9eg/2wKQUDm2OHvsoHxVNSN
                                                            MD5:861BA4A0A71E6C3F71B90074275FD57C
                                                            SHA1:BC6FC5233340BB19AE4BD0BA563875479AC0A2B9
                                                            SHA-256:3DB174F1568BC23BF467A3DC7BAF8A2A2952B70653D4DE54F4DB391EC50B6925
                                                            SHA-512:B187735E0783F299253D9F93E002AEFF131FCCA50FB3E04CF0545B334B051D5ED978108A47C6957B608F5F93ED4CC3D69751FE0F40413719EE1C0440CD49AC76
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dubai) {.. {-9223372036854775808 13272 0 LMT}.. {-1577936472 14400 0 +04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):820
                                                            Entropy (8bit):3.969189280047274
                                                            Encrypted:false
                                                            SSDEEP:24:5we3dJvOt81FCuLqecDngO6jPvTpYy5T4TiFGDr:5BvdJqxiF0uGr
                                                            MD5:9ABD0ECB5F3E738F49CDD1F81C9FF1A4
                                                            SHA1:46B68C7BBD1BE9791B00128A5129AA3668435C93
                                                            SHA-256:550DB44595F59D0F151BE4AF70D6FECE20580AB687EF45DE2A0A75FB2515AC80
                                                            SHA-512:67E2B0EF216D509C4B6DD367519E0A733E54A7CA767D5F7960715E8056E61B7B633C7516D568544F55C9277E90412C1443B822C6EED3341C01F1BD9AA9476FA1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dushanbe) {.. {-9223372036854775808 16512 0 LMT}.. {-1441168512 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 21600 1 +06}.. {684363600 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7597
                                                            Entropy (8bit):3.7170041442081203
                                                            Encrypted:false
                                                            SSDEEP:96:G3pv/7V6Aj8aZaNlK0UpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:G3v/AaaivBeRF+W35Syrwl9h5j
                                                            MD5:F8E4BA3E260452AE13CF234E60149A62
                                                            SHA1:8DDB08E2FDEEF6539EE0C0038B166908BFED16CD
                                                            SHA-256:8CFE85C48FC22033411432F8B75EE4C097A5D84897698CB1AFD5AB51C47FF5A3
                                                            SHA-512:487177411FB7E9F83AB9AAD84B685322B13A85784D4F90BB9C30F57BFAA6A9298E5C4F36C97444DE1117E51F85A62DC639D08B405460D071C2B29C898553E9A3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Famagusta) {.. {-9223372036854775808 8148 0 LMT}.. {-1518920148 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {622587
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10227
                                                            Entropy (8bit):3.7368714063968778
                                                            Encrypted:false
                                                            SSDEEP:192:NyyIgGbJv3dPAD7c1FoMNvW0W6AY900g+jCI:NyypGbJv3JKU3WzY9WI
                                                            MD5:DA7A30DF3A661B1E33F2F9D572D69153
                                                            SHA1:8F0A4EFA955A079F2070C3D6AC498BF4996A4C33
                                                            SHA-256:94768CDCCEC68E1123EBDFDE55A1B6F0244C221AF8B437E969DC7EC2CD327900
                                                            SHA-512:D8C0AE1BE8E808E30D79857725CBFE3553FDD2646C8399DABBC7136385EE2E3ADBB57119B14850BAA6EB5C3BE4D52EF1EB51E14814FBB459B20B831505567514
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Gaza) {.. {-9223372036854775808 8272 0 LMT}.. {-2185409872 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-16580
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.86422571961583
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKwHp4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKi4wKU
                                                            MD5:1BCCB3578FADE993EE8B2C11EAC06CD8
                                                            SHA1:CAEAB714E014CD5040C44E4603708B97BC0B03D4
                                                            SHA-256:12811A7944B892E3D1C0B4B09057CC1899F28081B3CD47FFD248BA49BA308AF0
                                                            SHA-512:1D791DC0E8F45359366DF33C2C337688D2E0E972A90F038733B840D28585505AEF542DDBAD014C9EA8C252048A588CD017DD67A84545A81EDB7C17E3B2E65092
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Harbin) $TZData(:Asia/Shanghai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10202
                                                            Entropy (8bit):3.739018846523374
                                                            Encrypted:false
                                                            SSDEEP:192:fiIgGbJv3dPADPc1FoMNvW0W6AY900g+jCI:fipGbJv3JKA3WzY9WI
                                                            MD5:48079249A3FB2F8A75BD3246A973D3DA
                                                            SHA1:6616D524EAD7A398F05FC9D099284A0C62AD1511
                                                            SHA-256:337DC81F78EE2114248A554D67D7329EAE22B127D3BB3DF10B4E8ECE311547FD
                                                            SHA-512:DA5A0EBF2BFE43D3B6D96613E8BA3718933F5808B07AF0587813DF20602678E6C9C4270B652023B5DA0B563A2C24F77C39C8A488A8456D2E0BAF8704D5D3B391
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hebron) {.. {-9223372036854775808 8423 0 LMT}.. {-2185410023 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):395
                                                            Entropy (8bit):4.435709983335578
                                                            Encrypted:false
                                                            SSDEEP:12:MB862RLmdHneCvhYC5sF/p+zHHviViksF/dMUY3sF/RQ9EsV:5de3vhd5sFR+znv2vsFlM/3sFVsV
                                                            MD5:9415271D45F180A88E961F2015B4779D
                                                            SHA1:2016DC7F72D7A24712B5147D6759124F8D46BE00
                                                            SHA-256:4E42C1819E92F391C8B7C186CF273A6E7CD2CAD037C094BC5F065072DF687ABF
                                                            SHA-512:3ADFF85E3E985BF13940F03851FE8E96017CE8C828F08BF687E49C383B3011EC059A22D489BA625997A25DA7BD4DC883F1C900B1A7B977353A23E3C75598962C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ho_Chi_Minh) {.. {-9223372036854775808 25590 0 LMT}.. {-2004073590 25590 0 PLMT}.. {-1851577590 25200 0 +07}.. {-852105600 28800 0 +08}.. {-782643600 32400 0 +09}.. {-767869200 25200 0 +07}.. {-718095600 28800 0 +08}.. {-457772400 25200 0 +07}.. {-315648000 28800 0 +08}.. {171820800 25200 0 +07}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2226
                                                            Entropy (8bit):4.0055033036300145
                                                            Encrypted:false
                                                            SSDEEP:48:5Ze9l9Pm4yoHtTYJJIX1Zcp6GS0j1SPQpP6gPE8fTZIPNYQGm75st/nQdwi9:DyaoTcwQt6EsQTng
                                                            MD5:26BCBBA28AE34FE3CF7D17EF4C6B69C8
                                                            SHA1:5324DEA8E7965C66650E7B4769EFA1297B508486
                                                            SHA-256:EE9A6997BC1AAD4A8FA95DB312774C3F37FBB895549230C30FC66C02CC170EB6
                                                            SHA-512:54594CD18838B4A8947EBB5BDE2415727CC127CF79AEC98FC0F5D5A32F68EEAF4E079853239DE9F753CE90F18EFD55AE51FC43D64E313666CEA0EF8AC93BF065
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hong_Kong) {.. {-9223372036854775808 27402 0 LMT}.. {-2056690800 28800 0 HKT}.. {-900910800 32400 1 HKST}.. {-891579600 30600 1 HKWT}.. {-884248200 32400 0 JST}.. {-761209200 28800 0 HKT}.. {-747907200 32400 1 HKST}.. {-728541000 28800 0 HKT}.. {-717049800 32400 1 HKST}.. {-697091400 28800 0 HKT}.. {-683785800 32400 1 HKST}.. {-668061000 28800 0 HKT}.. {-654755400 32400 1 HKST}.. {-636611400 28800 0 HKT}.. {-623305800 32400 1 HKST}.. {-605161800 28800 0 HKT}.. {-591856200 32400 1 HKST}.. {-573712200 28800 0 HKT}.. {-559801800 32400 1 HKST}.. {-541657800 28800 0 HKT}.. {-528352200 32400 1 HKST}.. {-510211800 28800 0 HKT}.. {-498112200 32400 1 HKST}.. {-478762200 28800 0 HKT}.. {-466662600 32400 1 HKST}.. {-446707800 28800 0 HKT}.. {-435213000 32400 1 HKST}.. {-415258200 28800 0 HKT}.. {-403158600 32400 1 HKST}.. {-383808600 28800 0 HKT
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1583
                                                            Entropy (8bit):3.7521760184466206
                                                            Encrypted:false
                                                            SSDEEP:24:5x3LecCvgsFFFKOksF8FpsF71FQnsFNFxhsFlF6sFaFasFZFisF8GF5sFKLFAZsZ:5FqKVx8Cq9f/y2L
                                                            MD5:A77140A0D8C2D3E2993E4BA7CADFB4C6
                                                            SHA1:AE3586264A86D42F578D4B0F7A30C9BE6047EAB1
                                                            SHA-256:CA88A45E954A9854C680B399E69E4858BF5E861FABFADC19D62D97B734B25415
                                                            SHA-512:05EA9D903EEC755F799B7C2399ED933245A5AE3A594648FE37AF1CE7699AE499B4ED159F428D91259D80BC9AF5117F2DA055A506AED94E5281C38B7AFF69C6FE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hovd) {.. {-9223372036854775808 21996 0 LMT}.. {-2032927596 21600 0 +06}.. {252439200 25200 0 +07}.. {417978000 28800 1 +07}.. {433785600 25200 0 +07}.. {449600400 28800 1 +07}.. {465321600 25200 0 +07}.. {481050000 28800 1 +07}.. {496771200 25200 0 +07}.. {512499600 28800 1 +07}.. {528220800 25200 0 +07}.. {543949200 28800 1 +07}.. {559670400 25200 0 +07}.. {575398800 28800 1 +07}.. {591120000 25200 0 +07}.. {606848400 28800 1 +07}.. {622569600 25200 0 +07}.. {638298000 28800 1 +07}.. {654624000 25200 0 +07}.. {670352400 28800 1 +07}.. {686073600 25200 0 +07}.. {701802000 28800 1 +07}.. {717523200 25200 0 +07}.. {733251600 28800 1 +07}.. {748972800 25200 0 +07}.. {764701200 28800 1 +07}.. {780422400 25200 0 +07}.. {796150800 28800 1 +07}.. {811872000 25200 0 +07}.. {828205200 28800 1 +07}.. {843926400 25200 0 +07}.. {859654800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2089
                                                            Entropy (8bit):3.7296034934492694
                                                            Encrypted:false
                                                            SSDEEP:48:5PZy4DdOKStci4KjXoYjoSvfQJWE00dtT43kgiTskNrrBizhzRBqY3M:Py2/svfraBGfgP
                                                            MD5:C9F7AC464970567E5C38CB01ED2297AE
                                                            SHA1:453718BACCAE3FACD761AF22CA5875185478ADDD
                                                            SHA-256:61BAAAD6315FFBDAED6F266880165B06ECCAF72F660B7FB01C8B654F3952D68E
                                                            SHA-512:72044EFAE262CC12974F2DE2AAF06AC4C31BE73071ACD53DDC6B8D8BFC6FBDF937EC03DC881901F730659BDE662FBCFC76C57B2C086DAA97F160530464FBA7C6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Irkutsk) {.. {-9223372036854775808 25025 0 LMT}.. {-2840165825 25025 0 IMT}.. {-1575874625 25200 0 +07}.. {-1247554800 28800 0 +09}.. {354902400 32400 1 +09}.. {370710000 28800 0 +08}.. {386438400 32400 1 +09}.. {402246000 28800 0 +08}.. {417974400 32400 1 +09}.. {433782000 28800 0 +08}.. {449596800 32400 1 +09}.. {465328800 28800 0 +08}.. {481053600 32400 1 +09}.. {496778400 28800 0 +08}.. {512503200 32400 1 +09}.. {528228000 28800 0 +08}.. {543952800 32400 1 +09}.. {559677600 28800 0 +08}.. {575402400 32400 1 +09}.. {591127200 28800 0 +08}.. {606852000 32400 1 +09}.. {622576800 28800 0 +08}.. {638301600 32400 1 +09}.. {654631200 28800 0 +08}.. {670356000 25200 0 +08}.. {670359600 28800 1 +08}.. {686084400 25200 0 +07}.. {695761200 28800 0 +09}.. {701805600 32400 1 +09}.. {717530400 28800 0 +08}.. {733255200 32400 1 +09}.. {748
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.9013773460609
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/2WFK4HB/8QaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/2wK4HJa
                                                            MD5:8A92C690BE27A69D122BFF51479B7B56
                                                            SHA1:52DB64587A347F34153A51788BDE8C349D966575
                                                            SHA-256:1F77C4BD27574E1D2066885DEF01806A02D3E444424A219A8EC5C114F89665E5
                                                            SHA-512:FEDF57C4862B6792A789F339EB1027EC8A8472B01B7D1D0814C419850B9AC03A7B454FDB04D8BECE166E9A8BCAA58B0B461007A6C824B30B1080991A1DB49CCA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Asia/Istanbul) $TZData(:Europe/Istanbul)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):370
                                                            Entropy (8bit):4.4733192761103515
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKcrJfDm2OHATJeoHMaSYov/YSZkc5q/MVSSFFWSyvScH+dMVSSFL+:MB862EJLmdHjCEdOc5aMxaSyHHaMxF6P
                                                            MD5:C689A1AA9FFE535AEB3AD3D7EDE55172
                                                            SHA1:0520FC9A4619FB555A79C5DF2AE82422BF2C5EDA
                                                            SHA-256:2F39D9F93761B85C254F458317A7DE2B4184BE9459F2193A85C08662E801269A
                                                            SHA-512:C1034FB2FCFEF201C5362AF21B048B6637A824C5C93D75854CF3807892C772CD4376533E58BFF8D8726F531F43CB231365B8012EBD3C1BECED865D3CD2D6673D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jakarta) {.. {-9223372036854775808 25632 0 LMT}.. {-3231299232 25632 0 BMT}.. {-1451719200 26400 0 +0720}.. {-1172906400 27000 0 +0730}.. {-876641400 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 25200 0 WIB}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):213
                                                            Entropy (8bit):4.834345288972067
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKcaDm2OHG4YoH1kcfvScHVowkVcr2CV4zvhyov:MB862PmdHNYC6cfHHVop2NVkoov
                                                            MD5:2CB3A13FCC48F8C4457E001FC309918B
                                                            SHA1:83174176815CB93D216B5BC532C120EC8AC433CF
                                                            SHA-256:761C1E80FEBF46D6D6215CEBF211F121974156D9BCE2FB4258C1074C6ED2CE22
                                                            SHA-512:65009020AB9FEC2F8158A4851A78B71127F9B262DDD1472583942E19B7C086304F54BC8DAE5A40BD1448BCAEDA0FDBACCD19400E10FFA0357E324535F9036EF0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jayapura) {.. {-9223372036854775808 33768 0 LMT}.. {-1172913768 32400 0 +09}.. {-799491600 34200 0 +0930}.. {-189423000 32400 0 WIT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8135
                                                            Entropy (8bit):3.770028446231146
                                                            Encrypted:false
                                                            SSDEEP:96:GKfnxFAEX/nPVl8diAg9oEhH20AHz7LzdWhYbBJPXuVhKaM76Rmg4DLeEcNptv5C:7ffBvPAzF0AHzPzdD1+XBRF0
                                                            MD5:884227D48C92BA6C519BFE571D4F1037
                                                            SHA1:21F8977816C2B439686A50D353B836A6D132A946
                                                            SHA-256:0BDC2C693134199C2ECD374CC01468813DB29DF47422C706A3EA2BE5ECCA177A
                                                            SHA-512:8A09F1FE11DAD203501A16FE6A2CAEC969FE3553B456B8BD1997E55B3EE430B2BB4B54F7D87C5E99931FD96E7C769CAA618C777EBD23FBD1E1A0F57409422914
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jerusalem) {.. {-9223372036854775808 8454 0 LMT}.. {-2840149254 8440 0 JMT}.. {-1641003640 7200 0 IST}.. {-933638400 10800 1 IDT}.. {-923097600 7200 0 IST}.. {-919036800 10800 1 IDT}.. {-857347200 7200 0 IST}.. {-844300800 10800 1 IDT}.. {-825811200 7200 0 IST}.. {-812678400 10800 1 IDT}.. {-794188800 7200 0 IST}.. {-779846400 10800 1 IDT}.. {-762652800 7200 0 IST}.. {-748310400 10800 1 IDT}.. {-731116800 7200 0 IST}.. {-681955200 14400 1 IDDT}.. {-673228800 10800 1 IDT}.. {-667958400 7200 0 IST}.. {-652320000 10800 1 IDT}.. {-636422400 7200 0 IST}.. {-622080000 10800 1 IDT}.. {-608947200 7200 0 IST}.. {-591840000 10800 1 IDT}.. {-572486400 7200 0 IST}.. {-558576000 10800 1 IDT}.. {-542851200 7200 0 IST}.. {-527731200 10800 1 IDT}.. {-514425600 7200 0 IST}.. {-490838400 10800 1 IDT}.. {-482976000 7200 0 IST}.. {-459388800 10800 1 I
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.8546989169864085
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKTtNMXGm2OHodFxsYoHvgVHURRNVsRYovFFFkdj/cXHF:SlSWB9eg/2wKTPDm2OHoH+YoHvgVHURA
                                                            MD5:9BD9B21661C235C0794078EC98978D3B
                                                            SHA1:3D854780F49D0E5F5A190DC9367C7406127C5E4D
                                                            SHA-256:A59C95C038F2E945D685D96FA9B859CE82A643A1B7F56EB36B2C809DE91CD4BA
                                                            SHA-512:A76E99CF03DA8897F0A210A98DB79E4CD60070F2BE363D0D0960D9882919F9B49978FA55BB2500F1648ADD4080730CAD85BAFF61D885A9EAD394AC04C850F6BA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kabul) {.. {-9223372036854775808 16608 0 LMT}.. {-2524538208 14400 0 +04}.. {-788932800 16200 0 +0430}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2060
                                                            Entropy (8bit):3.788131608921229
                                                            Encrypted:false
                                                            SSDEEP:24:5+SeWI/2kkWk7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5i/2ZsFLrcZwvJt2F+doTr9Q3G80
                                                            MD5:390F39934F095F89358B73D056D90264
                                                            SHA1:6B57CE5346B50ED88BFBB6BC57F834FB3F564905
                                                            SHA-256:6E0278E389072437BC07A5032CD58E9E5B1B2BDB20918632C422EFA97BC43ABF
                                                            SHA-512:6C54D94E95D73030F2FFCF8D130494CBD79FB1CEB9B59ADE0743C10F02557C3DD59CC6274B262A7E29C2D4C35DDA4B6A9A0398C661F5BD40F3B92181192B9577
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kamchatka) {.. {-9223372036854775808 38076 0 LMT}.. {-1487759676 39600 0 +11}.. {-1247569200 43200 0 +13}.. {354888000 46800 1 +13}.. {370695600 43200 0 +12}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965600 43200 0 +12}.. {764
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):457
                                                            Entropy (8bit):4.396286144160272
                                                            Encrypted:false
                                                            SSDEEP:12:MB862dmdH35Cy6DvjeQXvjKEn6vNEhFc0bkTfb2iWToN1:5de3IjjeQ/jKE6vNNa8
                                                            MD5:DF604BCD42A3C1E6BABD0E4FF5764CA3
                                                            SHA1:984111F3A75EE7D8760AA2B839010545AF8EE359
                                                            SHA-256:4E7F7ACAE8B4018A835328744F680C8054771805BB0BB07678A09737963C090D
                                                            SHA-512:690AC3FC7CA3C66AA70F17E38C6B43FFACAB3F86040C3BA94FBFF80AC8C1AECF8192E503282109DABF3228F8DC73C732F1041C80455B8B26BDB25C4C32FA286A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Karachi) {.. {-9223372036854775808 16092 0 LMT}.. {-1988166492 19800 0 +0530}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 +0530}.. {-576135000 18000 0 +05}.. {38775600 18000 0 PKT}.. {1018119600 21600 1 PKST}.. {1033840800 18000 0 PKT}.. {1212260400 21600 1 PKST}.. {1225476000 18000 0 PKT}.. {1239735600 21600 1 PKST}.. {1257012000 18000 0 PKT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):174
                                                            Entropy (8bit):4.967143524972358
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8s4YkyXHAIgNrYOARL/2WFKu3e2WFKjov:SlSWB9vsM3yMGSHAIgvAN/2wKulwKjy
                                                            MD5:259662F35AA09A891C2DDF8FCFECD6F0
                                                            SHA1:DBB3A363A34C33F0B6B0D677E43C2985E2BAF976
                                                            SHA-256:7B2251F0A41CBADF45D69F24604834167B14D8D33B510E635719AB404CABBCE2
                                                            SHA-512:CD7E514555D58985C774535556B66542EFC5FB7CD5891F42FE21B591612CB7EBD4B41E96593E26E9283BA1B01EF3BE0FDFAE871F5EF6ADF2286AF1E479DCB44B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Urumqi)]} {.. LoadTimeZoneFile Asia/Urumqi..}..set TZData(:Asia/Kashgar) $TZData(:Asia/Urumqi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.896398105471451
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKXIi7hvXMXGm2OHF+VT5oHsQKwMTXvv6Q6zRk8P4VvW/:SlSWB9eg/2wKYghfDm2OH0T5oHxNMzv8
                                                            MD5:7AC6429D2A08372C71C61B4521246FEC
                                                            SHA1:6E50F5AD1018398491453D751F8B717B618EF46E
                                                            SHA-256:F0A0816E62036637F75081CBF17A1E6B8FBC2D86AEC3CD2E234BBBDD6EC9F109
                                                            SHA-512:A5389A318896ABCAFE419262F6B8CA86C917788F1E2AFBC8CB1C074A52870E7A92C9F6F7D79DDE4AB0D267D870D3CCD69B3FC5FD57520352EFE36C583B493FB9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kathmandu) {.. {-9223372036854775808 20476 0 LMT}.. {-1577943676 19800 0 +0530}.. {504901800 20700 0 +0545}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.8363583658476745
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8yIi7V5XHAIgN1AIilvWARL/2WFKSiZ1/2WFKXIi7y:SlSWB9vsM3y7gVJHAIg5QOAN/2wKSg15
                                                            MD5:4CCC96293A33113D9ADC4130DCD19CBA
                                                            SHA1:7BAB4B8DD6BB415A2FC86D9AB36BE2A893C03153
                                                            SHA-256:9ACC9586B6F8B53BFE8B242283A434A9A9633D60559EBFDEE263B4C8915D50CA
                                                            SHA-512:644E1777E01C15A728E30526F131462FCE50476A8FEDA9B99F41D95013BB8833A79437E75AA2025E2FD2E253B9AD40709DEF77E1F0C73DAAE7A9CF886A175A03
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kathmandu)]} {.. LoadTimeZoneFile Asia/Kathmandu..}..set TZData(:Asia/Katmandu) $TZData(:Asia/Kathmandu)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2119
                                                            Entropy (8bit):3.707911838150672
                                                            Encrypted:false
                                                            SSDEEP:48:5No6r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFYkRDhUBAc6l:r5PhtjLiII2JBC6c6l
                                                            MD5:D7B394A9662D60D01781005FE73CC9E8
                                                            SHA1:50B5EBD02596DC45D1F69358C5B69DD3058905FC
                                                            SHA-256:33203D7FB7F3D1F848640ECE0642A2305E1863B4D47413075E2E7E40BD7418E7
                                                            SHA-512:055EBA420F2F6049E803796ACCA263264B9E585E5312A86B8DF7B409C5F1CB1810F3AEDACD66CCF4605E55198947D263C240486C2A4D453D23C89802F0C66BBA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Khandyga) {.. {-9223372036854775808 32533 0 LMT}.. {-1579424533 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):336
                                                            Entropy (8bit):4.614218930153471
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKvhfDm2OHEX3gYoHrXdUvvYbQLpUFdvjSVVFJLNsR/QFckVVFJLLW:MB8623tmdHNYCDWXYbQtUTvjAJBs50vs
                                                            MD5:248F1B5A26455000C936CE8BC02C1A0B
                                                            SHA1:0C3F8CD4E038B113E5238AC52652809B6CA27999
                                                            SHA-256:6D464564ED2EFC9DADA1586D4FC99FE333726D2BE15A00E30C2391F588896463
                                                            SHA-512:AF36B0B3D410305ED504726C87265ACCAF5577A9B5DD7E7DAF135420E356C651287873197431B65B5317B4BA2009274288E4F101AC1274045A8D99E2414AB132
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kolkata) {.. {-9223372036854775808 21208 0 LMT}.. {-3645237208 21200 0 HMT}.. {-3155694800 19270 0 MMT}.. {-2019705670 19800 0 IST}.. {-891581400 23400 1 +0630}.. {-872058600 19800 0 IST}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 IST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2062
                                                            Entropy (8bit):3.7086418466382605
                                                            Encrypted:false
                                                            SSDEEP:24:5Ote2CoXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEw:5B40yVRB7VfXucydm46I/CTxwh
                                                            MD5:A59F7FFD0C3EBAD47EC5F2B89EBBD9FA
                                                            SHA1:ACB94E28E0CF7C6606086267CEA1F63A3E755F56
                                                            SHA-256:53B8D5E7FB1BD67FECE66A933D9BDBB773F14A8C04D316A2A1B00EC6DBC151DD
                                                            SHA-512:7B3886B9D0A793CCEEDB2B190523922CFEBE5C82A5201C9EFA30CA4C7F63FB75C998CC7E1BD48D5D489F16E36FC0C22BD954CB7D321B3C09B36B60629C4C9F7E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Krasnoyarsk) {.. {-9223372036854775808 22286 0 LMT}.. {-1577513486 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.956557779400841
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq801c3vXHAIgNtK1tyHRL/2WFK1NFWFKf1z:SlSWB9vsM3yUgHAIgWv6N/2wK1NFwKf9
                                                            MD5:E70767DA85A7E1FA9395FF0B16CFE5CE
                                                            SHA1:3F78034F166CFC80B54E56AF289C7700A7E4AA5C
                                                            SHA-256:056D352DDCFEC155375430FFF3C8743ED5C9B51B866A099E97E12CC381071F50
                                                            SHA-512:FEDC854FB043AA79F132827F98F8983E480727FAA039CF2FB5B82611E724312A4F3F006EE58707F12B0AA90F5872E17F76E2A040CFB3A90D017C5CF92E52DA0A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Singapore)]} {.. LoadTimeZoneFile Asia/Singapore..}..set TZData(:Asia/Kuala_Lumpur) $TZData(:Asia/Singapore)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):669
                                                            Entropy (8bit):4.074079100812583
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKPLBDm2OHXoH3UTdMVSSFVM5qGeCiKaFzsBRcerUNwGvULhMXeiCs:MB862HL1mdHXC3UBMxJJo9rphTXUzHHF
                                                            MD5:489E706324960E86B6E174D913C72E02
                                                            SHA1:C7D77482C0D41F3426FC269B3B6C0575EF0E8C7E
                                                            SHA-256:6E35E560675B0B5322474900D4EC8326C504788C1F82E533B09785DEEFF092DF
                                                            SHA-512:5CEFD44656C041E59A16481E042EA914E7C003BDE6ADF5F49B57052E91F4F732A91A244BD8BC09EF5DC2640D3210DEE53882717C5C4CBD85CCE44A93B028E9C3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kuching) {.. {-9223372036854775808 26480 0 LMT}.. {-1383463280 27000 0 +0730}.. {-1167636600 28800 0 +08}.. {-1082448000 30000 1 +08}.. {-1074586800 28800 0 +08}.. {-1050825600 30000 1 +08}.. {-1042964400 28800 0 +08}.. {-1019289600 30000 1 +08}.. {-1011428400 28800 0 +08}.. {-987753600 30000 1 +08}.. {-979892400 28800 0 +08}.. {-956217600 30000 1 +08}.. {-948356400 28800 0 +08}.. {-924595200 30000 1 +08}.. {-916734000 28800 0 +08}.. {-893059200 30000 1 +08}.. {-885198000 28800 0 +08}.. {-879667200 32400 0 +09}.. {-767005200 28800 0 +08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):173
                                                            Entropy (8bit):4.877362838821003
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFKdQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKdQ6
                                                            MD5:EA1DB4B80CC74CBA024B9BF3734B31F2
                                                            SHA1:D8131C093BCA3B378BEC606CFEB56A40CB4E246F
                                                            SHA-256:8E0C60A9AA64FB8602EDC35311F7436B04853970A21C1F6C871494A09AAD5787
                                                            SHA-512:3B57C9CCC16AA4FE71D275D5EC6A7BC1838841023EE4408158362A7E13E7F1B345F7D95006BC8D2FC270158864E286A1A9364C792F679D5803BD82148399C199
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Kuwait) $TZData(:Asia/Riyadh)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):169
                                                            Entropy (8bit):4.781739054385376
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8PWXHAIgNz+NOARL/2WFKf+WFKkvn:SlSWB9vsM3yOHAIg1AN/2wKGwKmn
                                                            MD5:55DAE27AEAA74FE822338C20B6CDFF68
                                                            SHA1:F00EB827DC29EB2063B3A0EDBC39856637C55F33
                                                            SHA-256:4308D741C83B263C7C9FB8EC692A7B7B502135E407B265B12EA7EF92523455C0
                                                            SHA-512:398EE6015C58BDBBEAB49B74833B938FD84DE1AC6D3B8D095CE772ECA980D9E93F4EBFFFFCEAE7F91E287C8CE4F94B1A078D8E1460C352B7C2018F99915838FF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Macau)]} {.. LoadTimeZoneFile Asia/Macau..}..set TZData(:Asia/Macao) $TZData(:Asia/Macau)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2217
                                                            Entropy (8bit):3.9638741177777868
                                                            Encrypted:false
                                                            SSDEEP:24:5ReCX8Iv3nhPHCvzncCHg9PHjZzH+0HDHN1aHhHNaezHBjHeHsH65H18HDH983lY:5d8u3hfCTcaOrh6qn151Wf3Bogp+nlC
                                                            MD5:B184E7403CB7168607D2C9E158F86A3B
                                                            SHA1:48B003B8F822BE979FBCB08CBDBFFC617BCF99DB
                                                            SHA-256:FBCB92CECB1CB0BC284ADC30D70C5F57B3AFC992136A0D898ABC64490BB700FB
                                                            SHA-512:D8C5C67CAEB7C670B7BD1DACC1203C4DEE4DDB16A780F502C4440997CFCFF869E86842EF87C2CD0E0B942941C02A6BC3BDAB7CEAD78B026B68F4A031173400C8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Macau) {.. {-9223372036854775808 27250 0 LMT}.. {-2056692850 28800 0 CST}.. {-884509200 32400 0 +09}.. {-873280800 36000 1 +09}.. {-855918000 32400 0 +09}.. {-841744800 36000 1 +09}.. {-828529200 32400 0 +10}.. {-765363600 28800 0 CT}.. {-747046800 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716461200 32400 1 CDT}.. {-697021200 28800 0 CST}.. {-683715600 32400 1 CDT}.. {-667990800 28800 0 CST}.. {-654771600 32400 1 CDT}.. {-636627600 28800 0 CST}.. {-623322000 32400 1 CDT}.. {-605178000 28800 0 CST}.. {-591872400 32400 1 CDT}.. {-573642000 28800 0 CST}.. {-559818000 32400 1 CDT}.. {-541674000 28800 0 CST}.. {-528368400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-498128400 32400 1 CDT}.. {-478774800 28800 0 CST}.. {-466678800 32400 1 CDT}.. {-446720400 28800 0 CST}.. {-435229200 32400 1 CDT}.. {-415258200 28800 0 CST}.. {-403158600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2088
                                                            Entropy (8bit):3.7643610103361134
                                                            Encrypted:false
                                                            SSDEEP:24:5he9dbbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKx/y:5wv+0j6lua2Gg/3gO8UoOZU2Wc/pKo
                                                            MD5:F62A89F441C9C17EB99F64223C815651
                                                            SHA1:408C38A79E056FF9B03D0DA85114DC015CB66938
                                                            SHA-256:0C6EEEB7975A95C2B0678D137E6A735238D244A37FA11078050051511DE499FE
                                                            SHA-512:55DC72546BDC26450D5318E9D2819E32A91C27D06A7AF5432BD50F8722C69984BBAA8599055A824D2935D919F0C0AA357687DD9B47F49F213EEE21AF7458FE17
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Magadan) {.. {-9223372036854775808 36192 0 LMT}.. {-1441188192 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):243
                                                            Entropy (8bit):4.737440985553183
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wK5XDm2OHUVoHxYQTLQTvj1kc3gEpHkH8vScHr0:MB862hTmdHsCLTI6cQe7HHA
                                                            MD5:9116C0B70AB33EC49F933EAE0238FD4B
                                                            SHA1:BA390E8FBEAF5EA6E861AFC5A51CD4DF0B422461
                                                            SHA-256:30D8AB00E32ECE51442C0310E650D89D6989E0809600EE334CB10C506D84BF9D
                                                            SHA-512:499E60E8CBDA72226BCB4E241020E62B6F88E7D3E4329D260A6536EF87C02D7D61FD1BECC47D4FF308B4EB5D3E7FFBE2EC1C96FE2DEDC09DD1D973421C5FFE1E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Makassar) {.. {-9223372036854775808 28656 0 LMT}.. {-1577951856 28656 0 MMT}.. {-1172908656 28800 0 +08}.. {-880272000 32400 0 +09}.. {-766054800 28800 0 WITA}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):421
                                                            Entropy (8bit):4.48495488773916
                                                            Encrypted:false
                                                            SSDEEP:12:MB862GjmdHnCTZBCvEo6AwoucQzy4orjAbomAtoNv:5GjeCVwvB6AduXzylHAMmAa9
                                                            MD5:0FBF0ED252638DF31826C33EB3FFBFE2
                                                            SHA1:3496E4A5251A9BDF3AA4368297140780B6DBF66D
                                                            SHA-256:070D61A0E39643A700ABA89A8A4BE5733BA456958966098405E11ECDFA854D76
                                                            SHA-512:2A40E14964B357809E596DF88D8C4141ED78664BACA0A7724A7CA837EF427DC2B07C48D9DBE5787FAB0015673F5BDE002223D489334C5B91B74EEC5507A14B78
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Manila) {.. {-9223372036854775808 -57360 0 LMT}.. {-3944621040 29040 0 LMT}.. {-2229321840 28800 0 PST}.. {-1046678400 32400 1 PDT}.. {-1038733200 28800 0 PST}.. {-873273600 32400 0 JST}.. {-794221200 28800 0 PST}.. {-496224000 32400 1 PDT}.. {-489315600 28800 0 PST}.. {259344000 32400 1 PDT}.. {275151600 28800 0 PST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):170
                                                            Entropy (8bit):4.805992552335358
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8DeXHAIgN6S7ARL/2WFKvE+H+WFKQ3n:SlSWB9vsM3yj+HAIgMS7AN/2wKLewKQ3
                                                            MD5:8AEB5C3E81069F884A370714E8013F1F
                                                            SHA1:4E3DD4A84627E75E84726C0CBA72CA6801280C2B
                                                            SHA-256:011B7DE1C9F7EC241B224BC864D8AE66ACB433FBC8AD939E4DBEB12BE6390243
                                                            SHA-512:50B1DE2615AE9B4781505DC709F9D07F6221D4E6D7B61D7BDA682377EAD9807F47FF0E933B79823D0DFD9F3647A82CFC28FB41FBB2226ED1D08B76F86FEB45DC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dubai)]} {.. LoadTimeZoneFile Asia/Dubai..}..set TZData(:Asia/Muscat) $TZData(:Asia/Dubai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7625
                                                            Entropy (8bit):3.7113086720696398
                                                            Encrypted:false
                                                            SSDEEP:96:R3pv/7V6Aj8aZaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:R3v/AauivBeRF+W35Syrwl9h5j
                                                            MD5:2ADD0DFC1F133E4D044727234251A3DC
                                                            SHA1:0D1502986258349E384017BA6CB8FA0AC424638C
                                                            SHA-256:3C3E4844C70D361893EF022D6C3C8E38B243E91D40C5A726C924355476816F25
                                                            SHA-512:70CDD53E7E44EDABF653A4F92EECBF5BB20A31DA95D65209D1CADE7DD9FC68946B8EC8829C28AE00BE5F42AAB545B9282CBBCFC5834437D6A94A179BF4FE0141
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Nicosia) {.. {-9223372036854775808 8008 0 LMT}.. {-1518920008 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {62258760
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2063
                                                            Entropy (8bit):3.718004112421892
                                                            Encrypted:false
                                                            SSDEEP:24:526enddzXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFf:5l40yVRB7VfXucydm46I/CTxwf
                                                            MD5:513B6A2AF76DAED9002C037BEC99862F
                                                            SHA1:82D1C47BDF46B8B901C35BACACE8595C093BF5F2
                                                            SHA-256:96A445D47D834C28480D1E2036ECA4962B35AFA494C219065D4879F71C1830DB
                                                            SHA-512:2FE5AF4FA9D6AAB4FBD8E354789B82D39FA1B52394D3A0ABFBC6A30A531E0B7429A3D9AC7835A2843A6E9859E0255565F151FDFC87004ACB4EBD1AAD40BDA8A4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novokuznetsk) {.. {-9223372036854775808 20928 0 LMT}.. {-1441259328 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2121
                                                            Entropy (8bit):3.714792994893581
                                                            Encrypted:false
                                                            SSDEEP:24:52sve20ruXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnF:5Hc40yVRB7VfXu0TKmtTTDOWQ
                                                            MD5:AC8C8D768503C8334A9FBAEF4C3A9CAB
                                                            SHA1:CA10BB99E2D7AB329229759BD4801068A3AEB6D5
                                                            SHA-256:EF799077291F6B3B19E0AEC88F224BB592FAAD09D30740F2376D3D20F2169639
                                                            SHA-512:34049B1AC4254F999C3E5AD8CB31ABF88AC2D972E20E19927F33CC59935354F92125A0342A413E64227E8AE29DDFC2FFE5F67AE538C89D8EBAD7FCA889321DFA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novosibirsk) {.. {-9223372036854775808 19900 0 LMT}.. {-1579476700 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {738090000 25200 0 +07}.. {7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2055
                                                            Entropy (8bit):3.6912374223526396
                                                            Encrypted:false
                                                            SSDEEP:24:5abexPvO1FMnFP1FCnFHnFKqenFdDnFQgOnFxjPnFITnFonFJynFAT4TBThSv0FP:5asvjdqxph01NSvPETKmtTTDO0
                                                            MD5:3E06B20B0B62AA09FA03082FAEE4FD62
                                                            SHA1:8886EC80528ECA13D3364138BFFE92F881768169
                                                            SHA-256:2605CD1E26E4AB48BCB4399BB5B17BAD115A47F87BA3DD54B55BB50C3FE82606
                                                            SHA-512:04C1B6A898D12C8EA1B0B2F6665C870434061C63CC8F7A067BFC708E9828BA2E60104B82E2025E42D51DA2F485890C4D34EC0341EF466A7942649BE64F5EEE17
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Omsk) {.. {-9223372036854775808 17610 0 LMT}.. {-1582088010 18000 0 +05}.. {-1247547600 21600 0 +07}.. {354909600 25200 1 +07}.. {370717200 21600 0 +06}.. {386445600 25200 1 +07}.. {402253200 21600 0 +06}.. {417981600 25200 1 +07}.. {433789200 21600 0 +06}.. {449604000 25200 1 +07}.. {465336000 21600 0 +06}.. {481060800 25200 1 +07}.. {496785600 21600 0 +06}.. {512510400 25200 1 +07}.. {528235200 21600 0 +06}.. {543960000 25200 1 +07}.. {559684800 21600 0 +06}.. {575409600 25200 1 +07}.. {591134400 21600 0 +06}.. {606859200 25200 1 +07}.. {622584000 21600 0 +06}.. {638308800 25200 1 +07}.. {654638400 21600 0 +06}.. {670363200 18000 0 +06}.. {670366800 21600 1 +06}.. {686091600 18000 0 +05}.. {695768400 21600 0 +07}.. {701812800 25200 1 +07}.. {717537600 21600 0 +06}.. {733262400 25200 1 +07}.. {748987200 21600 0 +06}.. {76471200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1664
                                                            Entropy (8bit):3.708603813141953
                                                            Encrypted:false
                                                            SSDEEP:48:53PvalvNhQQvmRKqv0fvzQIovWdvEGvDaDv7w9hYwr:JHaBNKs6b03zB0WJEuDa77w9hYA
                                                            MD5:A3BD0C15642AE4F001F98F8E060E8374
                                                            SHA1:366F3C7FD4000AC23B79AB0FF4429371ED323B81
                                                            SHA-256:933BBCD7AE0BF59A5B4A6E0EF74C237FEEDC42E6A3AEB2158131AA70FBA6FE47
                                                            SHA-512:16D8692D3EA96D3594E6220A6989BBFBB926A66EEBEB240C4DC68BE75C69C5206659D9D341D92AE6128928FD38A5F45B445621CBBBA4E4BA8C34C3AC52BF3C08
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Oral) {.. {-9223372036854775808 12324 0 LMT}.. {-1441164324 10800 0 +03}.. {-1247540400 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {701816400 14400 0 +04}.. {701820000 18000 1 +04}.. {717544800 14400 0 +04}.. {733269600 18000 1 +04}.. {74899440
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.958543249401788
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKeHKLNM0WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKTNg
                                                            MD5:EBF01E229CC41EB8B27650A3D668EDC1
                                                            SHA1:33E1B252C1B45EAE326FCF8CC7C80C78A46F7E8D
                                                            SHA-256:DCEE88876D00396918F43DECA421B6C9B02F84B5866A2CE16E641B814B390A9F
                                                            SHA-512:80840600F37A256B8FD9933760FBAE7C13DE1E24EFD970E47BE8DEC731DFABF6D6FB76999BEEC775FF8C8B8719E94788ED7EEB04376A34C827ACB443F720F7E3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Phnom_Penh) $TZData(:Asia/Bangkok)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):369
                                                            Entropy (8bit):4.492596995768464
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKT5PDm2OHUeoH99xV/1kc5k/MVSSFFCLkvScH+dMVSSFL1CnF4mMz:MB862L5bmdHFCRV/6c5kMxGLkHHaMxFn
                                                            MD5:9ADB1A9E41A143A06116E24EA0A53D90
                                                            SHA1:6E50B549E1A705C0090BD5EDE26F7DED78CDF71A
                                                            SHA-256:AC8370AEDF5FE3FE1E80710CE117DEE23815BE377D418E4B4F3259A1930E8DBF
                                                            SHA-512:92790B20B960AC518AB2E18F902C6E0BA887F268909F5571CAC1068F5E719CCF6943AE6902DA1B683E170658B5E7BE06C6A187C1C0A652DD052D5BD0B2A7B84D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pontianak) {.. {-9223372036854775808 26240 0 LMT}.. {-1946186240 26240 0 PMT}.. {-1172906240 27000 0 +0730}.. {-881220600 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 28800 0 WITA}.. {567964800 25200 0 WIB}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):273
                                                            Entropy (8bit):4.709411633376997
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wK8cE4SDm2OHnNoH9Aw8vmVuT0vjLtcjviov:MB8620cExmdHnNCGv2Ezv
                                                            MD5:727BBC1A1662B500F616F544A484F213
                                                            SHA1:93C1D902D9D4AA4197C7D16C61FB784AC01D0DE5
                                                            SHA-256:29BA17F756F5C0BBA30FEBF44E620504D04921C832BD1CB56E1B60EF288B57DF
                                                            SHA-512:C3C91E2F180109FF33E6491722F679A1B8DCE8CD31DE006D7FF2CBE270C008E927507C953641D28EE77D139BBEA54DEA1B7DBD6C30B208DDAB1B58756C32AC02
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pyongyang) {.. {-9223372036854775808 30180 0 LMT}.. {-1948782180 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-768646800 32400 0 KST}.. {1439564400 30600 0 KST}.. {1525446000 32400 0 KST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.851251407399968
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKK3ovXMXGm2OHPFV4YoHsQKb3VvVsRYovFFF3FRVGsWr:SlSWB9eg/2wKK3yXDm2OHoYoHxcvSNFS
                                                            MD5:CBA9635133F88AD3B27E23B95430C27C
                                                            SHA1:5E41232EC03BBC71B522F58CB2D05E6BFFFF1A75
                                                            SHA-256:18CCA69F933795CE3F7DB31506EFC063E6CE1DFDCAB32AA387C398456D7F7E1F
                                                            SHA-512:D7C43F1F9ADA54C914ADB3CB2C9063EB7044089CFC7755ACFD08828CDEBA3C116AE2BE916ABE5D561E63699B921BC52636DD0BBC2C4304F813616D320D7DDAAF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qatar) {.. {-9223372036854775808 12368 0 LMT}.. {-1577935568 14400 0 +04}.. {76190400 10800 0 +03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1698
                                                            Entropy (8bit):3.7252424912274966
                                                            Encrypted:false
                                                            SSDEEP:48:5DwvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQ4:BMaBNKs6b03zB0WJEuDa7sFZiKWaN6Tk
                                                            MD5:52E2636EA6360DA255DBB7921A03F664
                                                            SHA1:92438112D9F85B02805CDBBE45E47CF86CAB6610
                                                            SHA-256:9981882BBF0DEC7C2ED44BA0EB9BAA64FB13F635BD8BD19D1520ED09460CC856
                                                            SHA-512:2984B1370B0755B235DFE46978DD426DAF458D1FBFAF0792176DFD3F45121D0E353D3EF4D381EE8E76C135528A7EE4CCAD109B0CF21812A1E06D7A681697EE3B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qostanay) {.. {-9223372036854775808 15268 0 LMT}.. {-1441167268 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {7489
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1670
                                                            Entropy (8bit):3.734572151642808
                                                            Encrypted:false
                                                            SSDEEP:48:5NvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWgvNSvTqvIQvyovklvqQX0:TaBNKs6b03zB0WJEuDa7sFZiKWcN6Tir
                                                            MD5:026EC6E479EC006C4398288362254680
                                                            SHA1:24AD03DD21DA394B3423D27211955BFD694F8E73
                                                            SHA-256:CD6B067AA3EF6935B4E89CA36E6A03FCB97F1E0EE61A7B5D46C06BF4DE140774
                                                            SHA-512:023AC55E118F13A31CE996C7BA155C90D47DEB6C223EEB3C0EE7B702871FF0CCA13CDF61D65FDDABE41B888CD7A74274AA5730059CC5688F8ED4DDBF8FE4ECA4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qyzylorda) {.. {-9223372036854775808 15712 0 LMT}.. {-1441167712 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {701812800 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):174
                                                            Entropy (8bit):4.812955128020714
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8nv3vXHAIgNnDA6RL/2WFK02KQMFfh4WFKsyn:SlSWB9vsM3yHvPHAIg15N/2wK0GEJ4wy
                                                            MD5:BD3F294F1EDDD21467E980C9F5A0E7DE
                                                            SHA1:11A3FC3E4489C18BDF9BFFB4C44615559D9DD99D
                                                            SHA-256:E4D2C38D8E7377A528291A88129CDAC40CA4D40A5F1CD8ADB98228527556906E
                                                            SHA-512:FA5FD600627793EABB83C1066BE246A47BCCE1FC57830596B9C0CDE8901B949AF178ABDE876C3B73CC3751312E8A4C03C390888B0B5A9669F511344143F83073
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Yangon)]} {.. LoadTimeZoneFile Asia/Yangon..}..set TZData(:Asia/Rangoon) $TZData(:Asia/Yangon)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):148
                                                            Entropy (8bit):4.973311159904374
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFK814PMXGm2OHFukeoHqUi9VssWYcv:SlSWB9eg/2wK81GDm2OHF7eoHvi9V1Wr
                                                            MD5:AD3236CFF141732831732357AB181EE3
                                                            SHA1:EAF51A63898A2048EA5FBE9BA4C001EEE37FFDB2
                                                            SHA-256:411E31D09FFA48E44169C42661AE2F7FC142460BCAA216837D8C4740983CA7BD
                                                            SHA-512:6CA2D89C02568580786BE98A863453ADCF4D21CAC52E5B44C4F7A05E76D29AEB3E28E353D6FB758BB553DBC8F35389462B388F61E94C68F5DB50A3E8C429336D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Riyadh) {.. {-9223372036854775808 11212 0 LMT}.. {-719636812 10800 0 +03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.946090704619887
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8I65eV5XHAIgN2h6560ARL/2WFKwJ6h4WFK365ey:SlSWB9vsM3yJAVJHAIgA4k0AN/2wKl4i
                                                            MD5:0766480A295525EE5D65F1ED32094858
                                                            SHA1:7A2D68E1009DDD809A4A700931456C617DCD343A
                                                            SHA-256:C695981A0DF691C3F4509999FBC52858ADC75024CCCBDEFBE1094FED17E809E4
                                                            SHA-512:A21536FB61A64E953E8D6414FF0AEF1BC7E68A33C5DCF7090517A91FC449B96A93A4FBDF2C00682540D1193FDB29603349F5BDB455FD90045FDBCA61247A9860
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ho_Chi_Minh)]} {.. LoadTimeZoneFile Asia/Ho_Chi_Minh..}..set TZData(:Asia/Saigon) $TZData(:Asia/Ho_Chi_Minh)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2117
                                                            Entropy (8bit):3.7276904131666577
                                                            Encrypted:false
                                                            SSDEEP:48:5q+3Vv+0j6lua2Gg/3gO8UoflcXRDhUBAc+:YxIa2GOT8tiXBC6c+
                                                            MD5:295D51B8FBBE890C97637687B8F32322
                                                            SHA1:7BB72B0EC783898DDF625D275E3BBB964D1693FB
                                                            SHA-256:D7D0EA5CEF908442AB0D777A4B097BED18540CD5280FF63F33DD989E27E72908
                                                            SHA-512:9B3E3BA01EAE38A00B0EE8A8FB17191CB4ED2EE9E46AE06403BA8C1193804764C86599840DC03E0C6A631456E1BE2BC560BDF6CF0450068EF78A6E494041326C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Sakhalin) {.. {-9223372036854775808 34248 0 LMT}.. {-2031039048 32400 0 +09}.. {-768560400 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):879
                                                            Entropy (8bit):3.9460497720710506
                                                            Encrypted:false
                                                            SSDEEP:24:5t8eZd7QvalvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKT10Sv6r:5MvalvNhQQvmRKqv0fvzQIovWdvEGvDO
                                                            MD5:10A758996B0DF756E520541BEA9B7D75
                                                            SHA1:137E5FD4E00CFA4B3939EF11868862B7F93D87CD
                                                            SHA-256:35E4B905723891281D9A6A0A1FD3760A3A48136E1419C686BE31ACE83BF7AA9D
                                                            SHA-512:7E32661731EAB2ED8C387533ACCB4853F5B6225BAC11E93247E7B06D7AA856E6A665F63718BFE395CFD00F80A4C16789D7097FFA8DAD88B1D707BF9C155C1D4C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Samarkand) {.. {-9223372036854775808 16073 0 LMT}.. {-1441168073 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):985
                                                            Entropy (8bit):4.121802167517286
                                                            Encrypted:false
                                                            SSDEEP:24:5AemgvHzF+zg2c+z3NGmJhIUfqII8yHg/zoD:5F/nfWUBISHg/G
                                                            MD5:A1DE6975DEA70D7241B5B3C43E1EA3AA
                                                            SHA1:35EE563A2BCA77C761F7E878997763EA8D258040
                                                            SHA-256:C4F82C94650572FE4D03BC1FE54CED8F4BF55DFBEE855D52DE3EA6378240AF93
                                                            SHA-512:1639B0609115DBEA6A381986A732A5CA1523952AEF84843B4D714D5B2FF40B16C4166D8D60D31D4FC2C2BA34DED1F6DB39474336195603562265BDBF71687696
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Seoul) {.. {-9223372036854775808 30472 0 LMT}.. {-1948782472 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-767350800 32400 0 KST}.. {-681210000 36000 1 KDT}.. {-672228000 32400 0 KST}.. {-654771600 36000 1 KDT}.. {-640864800 32400 0 KST}.. {-623408400 36000 1 KDT}.. {-609415200 32400 0 KST}.. {-588848400 36000 1 KDT}.. {-577965600 32400 0 KST}.. {-498128400 30600 0 KST}.. {-462702600 34200 1 KDT}.. {-451733400 30600 0 KST}.. {-429784200 34200 1 KDT}.. {-418296600 30600 0 KST}.. {-399544200 34200 1 KDT}.. {-387451800 30600 0 KST}.. {-368094600 34200 1 KDT}.. {-356002200 30600 0 KST}.. {-336645000 34200 1 KDT}.. {-324552600 30600 0 KST}.. {-305195400 34200 1 KDT}.. {-293103000 30600 0 KST}.. {-264933000 32400 0 KST}.. {547578000 36000 1 KDT}.. {560883600 32400 0 KST}.. {579027600 36000 1 KDT}.. {592333200 32400 0 KST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):981
                                                            Entropy (8bit):4.16042656890735
                                                            Encrypted:false
                                                            SSDEEP:24:5Te3vvZJzHjwH6kHp7FH32AzHjZBHNHlQHuHxmHUjH6zHj2HBHeC:5ovZZO7lLpT24
                                                            MD5:A266AA43A84FD5E4890BC77AA4E240D0
                                                            SHA1:CD88C5D451CD7D3F50C9B36FDD47C84D20377441
                                                            SHA-256:3AABB42D9EFE95D906B7F34640E7815919A1A20979EBB6EC1527FCAA3B09B22A
                                                            SHA-512:13AE48F58C9AF24002F0FE4F28BF96B10EE0ED293E0DE9D29BCEBAAE102B2EA818F42CA4069544A254C95444A48604EC57E6AB2BEBDA4B5E72C82B49E61AD0A0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Shanghai) {.. {-9223372036854775808 29143 0 LMT}.. {-2177481943 28800 0 CST}.. {-1600675200 32400 1 CDT}.. {-1585904400 28800 0 CST}.. {-933667200 32400 1 CDT}.. {-922093200 28800 0 CST}.. {-908870400 32400 1 CDT}.. {-888829200 28800 0 CST}.. {-881049600 32400 1 CDT}.. {-767869200 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-650016000 28800 0 CST}.. {515527200 32400 1 CDT}.. {527014800 28800 0 CST}.. {545162400 32400 1 CDT}.. {558464400 28800 0 CST}.. {577216800 32400 1 CDT}.. {589914000 28800 0 CST}.. {608666400 32400 1 CDT}.. {621968400 28800 0 CST}.. {640116000 32400 1 CDT}.. {653418000 28800 0 CST}.. {671565600 32400 1 CDT}.. {684867600 28800 0 CST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):372
                                                            Entropy (8bit):4.436676898144829
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKfbSDm2OHxdoHvm5vWOb/MVSYyF/3MesF5XJSx0dMVSSFF8kvScHy:MB862nbGmdHDCvsvDTMsF/CFDMx/HHbO
                                                            MD5:008EED394614C7082478686F19D26707
                                                            SHA1:70313A704D225D1008CCD7A8A5D86931E12534CA
                                                            SHA-256:FDBD970E6835279A01E2D343D03994E32AC94A10EBDA88AD6942CBEAABB19136
                                                            SHA-512:786363D146630B76506D72071805D9C1C8CA825C11513EA6A6EF5D3373F39C42CE46DD675A3F15376D870EFAE2EDD1A4919AA226B756E80AC98430CC1C72D8ED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Singapore) {.. {-9223372036854775808 24925 0 LMT}.. {-2177477725 24925 0 SMT}.. {-2038200925 25200 0 +07}.. {-1167634800 26400 1 +0720}.. {-1073028000 26400 0 +0720}.. {-894180000 27000 0 +0730}.. {-879665400 32400 0 +09}.. {-767005200 27000 0 +0730}.. {378662400 28800 0 +08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2064
                                                            Entropy (8bit):3.7913177223006698
                                                            Encrypted:false
                                                            SSDEEP:24:5HJeidmbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxwy:5HSv+0j6lua2Gg/3gO8UoOZU2Wc/pKf
                                                            MD5:B4FA38E884A85F6BD47C8BB02BB0500C
                                                            SHA1:1DD135B79CC0D81C048D7B2C6BE0CF71171DD19E
                                                            SHA-256:705D6D8360C2DCD51E909E39E1910FE876145220D151031612DA36B247207395
                                                            SHA-512:2D32AAAF1BCC865B5F2810BFE0FB82BE98140BB5F2ECA1DA7FD148A3074DA127B81242F17B8BA9C9E259B61CBB123FD1513CCE6A85C8D7679ADFC0D689B552BB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Srednekolymsk) {.. {-9223372036854775808 36892 0 LMT}.. {-1441188892 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1344
                                                            Entropy (8bit):4.062084847879695
                                                            Encrypted:false
                                                            SSDEEP:24:5X2eIvZPzGzHjZBHNHlQHKn3HnHNd9HiHkHBHaHLHMtyH9Qm+zHFOzHZ32HZvHiR:5Xi1ypBvt1mwO3Kq46T
                                                            MD5:AECA800C8F2A679D0B19E5BB90AFD858
                                                            SHA1:2C7DCEB709F9A4312C511971FE1E6A9DC1FBD0E8
                                                            SHA-256:389C9D3EE2970665D0D8C5CB61B8B790C5FBDDC0DF0BF2B9753046F5953A477F
                                                            SHA-512:C2D6BB4FEB5848D0704647D26F94C0BD8CD7E834AA2187EC9C877E80157E9CC225BBA3BECEE0148894C8639105D292AB50EE95830992BF357C632ACF001E020F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Taipei) {.. {-9223372036854775808 29160 0 LMT}.. {-2335248360 28800 0 CST}.. {-1017820800 32400 0 JST}.. {-766224000 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-639133200 28800 0 CST}.. {-620812800 32400 1 CDT}.. {-607597200 28800 0 CST}.. {-589276800 32400 1 CDT}.. {-576061200 28800 0 CST}.. {-562924800 32400 1 CDT}.. {-541760400 28800 0 CST}.. {-528710400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-497174400 32400 1 CDT}.. {-478688400 28800 0 CST}.. {-465638400 32400 1 CDT}.. {-449830800 28800 0 CST}.. {-434016000 32400 1 CDT}.. {-418208400 28800 0 CST}.. {-402480000 32400 1 CDT}.. {-386672400 28800 0 CST}.. {-370944000 32400 1 CDT}.. {-355136400 28800 0 CST}.. {-3394080
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):878
                                                            Entropy (8bit):3.9280321712564845
                                                            Encrypted:false
                                                            SSDEEP:24:5geQqdNRvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10Sv6r:5+EvdJqxiF0rvK50Sv6r
                                                            MD5:DB59DB8E401E12917B7367D5604D3DE6
                                                            SHA1:7CC7C5C1DB551BD381B833C81746201D36BC59A9
                                                            SHA-256:4445F3F892C7267A6867009CC1A3F0B0548D0240408375A9D15360B28993C2A9
                                                            SHA-512:2C7AE63C408A9F06F973AAC16845E1DBE92D15A421BBBE420914F21155AD5E57CD058D7E4427E43185E023D2FF475EBF9D74003ECEF004FF4E5F9D5681ADFB80
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tashkent) {.. {-9223372036854775808 16631 0 LMT}.. {-1441168631 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1729
                                                            Entropy (8bit):3.6815162494646034
                                                            Encrypted:false
                                                            SSDEEP:24:5yBeqvIdZlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPqUsx9Ul4N:5MmsUf8mFpNWFnytO6VnYK
                                                            MD5:C376C9ED66F6CC011E063D3E8E0DCED1
                                                            SHA1:13C6345F8CB0EC79FE7C78B156C5737BCB66E49E
                                                            SHA-256:B637BB0E49144C717E99E93540CB2C4D3695D63B91FE42547F2F0AA006498693
                                                            SHA-512:FD60192CBEDC91C5D6B3B5E6F19DEDCAE14DCF48DCAE6D4865A8F0BBDC01CBF8DAAE92C4C46C353AF5B3EEE36CCC87B23F193DDF221132F5404C42507B708364
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tbilisi) {.. {-9223372036854775808 10751 0 LMT}.. {-2840151551 10751 0 TBMT}.. {-1441162751 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {694213200 10800 0 +03}.. {701816400 14400 1 +03}.. {717537600 10800 0 +03}.. {733266000 14400 1 +03}.. {748
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2354
                                                            Entropy (8bit):3.666553647637418
                                                            Encrypted:false
                                                            SSDEEP:24:5Z2eendFalxbr1p4USUcESUUxSuEqzSUUongA3jJW3eY37U8uuZrc3cNWH1/ANzx:54G9SOSWzx1qcK83kv3OR0xV1ox
                                                            MD5:A7A174A14E51E0ACD7092D2A5AA50F99
                                                            SHA1:69ADDDDB68084B90819AD49A5230D5B0E1A9CD85
                                                            SHA-256:25870503A8A679DA13B98117BD473EAA0C79B094B85D3AD50629FF0946D5EACE
                                                            SHA-512:1ECFB558B13C94BDC848E7BBBB0CA1BB854BB12E112EBF306045EC14F00CE3E3C2DA51EBA8AF2D63C95D71B945647C3D9E9881158FE128DEBE940A742C4BFEB1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tehran) {.. {-9223372036854775808 12344 0 LMT}.. {-1704165944 12344 0 TMT}.. {-1090466744 12600 0 +0330}.. {227820600 16200 1 +0330}.. {246227400 14400 0 +04}.. {259617600 18000 1 +04}.. {271108800 14400 0 +04}.. {283982400 12600 0 +0330}.. {296598600 16200 1 +0330}.. {306531000 12600 0 +0330}.. {322432200 16200 1 +0330}.. {338499000 12600 0 +0330}.. {673216200 16200 1 +0330}.. {685481400 12600 0 +0330}.. {701209800 16200 1 +0330}.. {717103800 12600 0 +0330}.. {732745800 16200 1 +0330}.. {748639800 12600 0 +0330}.. {764281800 16200 1 +0330}.. {780175800 12600 0 +0330}.. {795817800 16200 1 +0330}.. {811711800 12600 0 +0330}.. {827353800 16200 1 +0330}.. {843247800 12600 0 +0330}.. {858976200 16200 1 +0330}.. {874870200 12600 0 +0330}.. {890512200 16200 1 +0330}.. {906406200 12600 0 +0330}.. {922048200 16200 1 +0330}.. {937942200 12600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.876713308636272
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/2WFK+TT52WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/2wKsswKR
                                                            MD5:40B15013485EE2138A3DCB915F9121E7
                                                            SHA1:3ADBE38686C7CA1FDE3DDD12BE908F39BFD1E228
                                                            SHA-256:07537A30E6236D9E334DAFD5C4D352D25FDEF95D6DC7496F5D93EFAB74D9EBB1
                                                            SHA-512:DA3B7B44B3BEF07CA8AA5253BF684A838181D8A15D7CCF0447A6B5F5BAE28D155CF65BCFB6286EB36C0B9F4FDD1FE862A3297ADB6FC33532B9F766334283D725
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Asia/Tel_Aviv) $TZData(:Asia/Jerusalem)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.906503135441824
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8kNZ4WXHAIgNqFNKARL/2WFK9Z752WFKvNZovn:SlSWB9vsM3ykZ42HAIgc3KAN/2wKf126
                                                            MD5:081862B6FB33389BEC9B0E6B500AA342
                                                            SHA1:AF9467BB87C4C28921DF62A87B81223052F9FF4A
                                                            SHA-256:37459C17B59639DF62B3F3943751902CE6AAF1F11B7630069DB45052EBEFB5B9
                                                            SHA-512:CAF6F1C928528C4471229A2EF2944623545626532986628E6CE38884535286A0B38BA88C1A295E8B11322475D6BFAC61BF89786A76330C1A0C729339A3532BAF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Thimphu)]} {.. LoadTimeZoneFile Asia/Thimphu..}..set TZData(:Asia/Thimbu) $TZData(:Asia/Thimphu)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.887493603495978
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKvNZJMXGm2OHEQUTFnoHqVaJKuc/v6Q61V9gmZVFSTVV:SlSWB9eg/2wKVZJDm2OHEfnoHDKuc/SC
                                                            MD5:F239452984CCA9F23E97A880652C39E6
                                                            SHA1:52D25282D03B79960F152D21E7492EE26DAEBBAA
                                                            SHA-256:B797C74E3840298C3CD8149FC8AA4BCE839EFE79E7C3310986FF23C965607929
                                                            SHA-512:1044BEDAE04FCA7BD62937AFCE70F6C447583A90DD1596C3029A64A8251E3F73C106F4D940548DD38E895D67FEFDCD196B257E11437DEB399085EE80C345AA50
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Thimphu) {.. {-9223372036854775808 21516 0 LMT}.. {-706341516 19800 0 +0530}.. {560025000 21600 0 +06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):388
                                                            Entropy (8bit):4.470556147950505
                                                            Encrypted:false
                                                            SSDEEP:12:MB862ymdHOx5CvAoK3zoiIxtoFDIe+zT0agbov:5yeOCvARzzCOVa/gby
                                                            MD5:3CCC15B63A882DB1B7459A51CD1C8165
                                                            SHA1:77A3EFE6E4EE524B9EC6F51593DD7521FD7B8DAD
                                                            SHA-256:3DA522FA88541A375D53F30A0B62DC4A305FA0315FEE534B7998C9E0A239450A
                                                            SHA-512:15238E96DABAB5D2B9FFD25B3F50417ED32205FA69239D6F6B28DA97A378D669FD409164964D0DD2A5B1D795C8F60E8D4EB15924046348C3D6010646A536E07C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tokyo) {.. {-9223372036854775808 33539 0 LMT}.. {-2587712400 32400 0 JST}.. {-683802000 36000 1 JDT}.. {-672310800 32400 0 JST}.. {-654771600 36000 1 JDT}.. {-640861200 32400 0 JST}.. {-620298000 36000 1 JDT}.. {-609411600 32400 0 JST}.. {-588848400 36000 1 JDT}.. {-577962000 32400 0 JST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2116
                                                            Entropy (8bit):3.695316005718174
                                                            Encrypted:false
                                                            SSDEEP:24:5CeLz/XJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEno:5H040yVRB7VfXucydm4IqtTTDOS
                                                            MD5:E95DE93CBCE72C5E02D7ECFE94C96308
                                                            SHA1:59A49EBFE544D97545BADFEFE716BB5659C64C20
                                                            SHA-256:6B64A01D0F0B5EC7A1410C3BD6883BA7CC133E9F073D40E8BFECE037E3A3FA24
                                                            SHA-512:9E33DC9C1C6D60F3226263C484AF46A14AAB31F838516A0D69BA08F8F416EF10D09697E8D7ABAC1CE1F5BCE8AB0C2635D99FBE70C89ECC268DED0DCE89E67466
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tomsk) {.. {-9223372036854775808 20391 0 LMT}.. {-1578807591 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7647084
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.897140749162557
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8pYFfXHAIgNzGRRL/2WFKPQOrFJ4WFKov:SlSWB9vsM3yWFPHAIg0RN/2wKPQOrFJD
                                                            MD5:F6AE33D706C36FDD8A21F44AD59F5607
                                                            SHA1:94D6EC7A437249AEBE2FA4AF8AFB029A620368C0
                                                            SHA-256:732751845ACEDBFFD3C6170F4B94CB20B25BFDCFCC5EEA19F4BE439F5C5B573A
                                                            SHA-512:2314AB2B154887842211C9A570BC1323D9B4375FF60C96296835DB001E8A277CA62D40B8562BC34EDDF281D96D5325640B79F7907558C6E0319C7D2A76BE239C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Makassar)]} {.. LoadTimeZoneFile Asia/Makassar..}..set TZData(:Asia/Ujung_Pandang) $TZData(:Asia/Makassar)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1590
                                                            Entropy (8bit):3.7728141273024374
                                                            Encrypted:false
                                                            SSDEEP:24:5IerIvusF7cCGK6zoCjZte3kzMjsBw0oZzlL98oysHqGzJvqE+ksabzdX+YjL:5VujmUCei46oljFC67
                                                            MD5:A4647294401D2B54ABAA8E509BF05A6F
                                                            SHA1:BF804CC38996D7715E3BA9BAD715D7ADBED781B9
                                                            SHA-256:A56A26981163A717CF388A423CFE7A2BAD1BE8652BE2E338670CBC0C0A70E5E9
                                                            SHA-512:B43157FABDE016FA6636CAB7B06CC1DEA53526B42FB46BB41DC4B7E48188D191C325BEF0D170B125E885F321C4316746A8D478D798828E2DC4A51C71DA4A610C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ulaanbaatar) {.. {-9223372036854775808 25652 0 LMT}.. {-2032931252 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 32400 1 +08}.. {433782000 28800 0 +08}.. {449596800 32400 1 +08}.. {465318000 28800 0 +08}.. {481046400 32400 1 +08}.. {496767600 28800 0 +08}.. {512496000 32400 1 +08}.. {528217200 28800 0 +08}.. {543945600 32400 1 +08}.. {559666800 28800 0 +08}.. {575395200 32400 1 +08}.. {591116400 28800 0 +08}.. {606844800 32400 1 +08}.. {622566000 28800 0 +08}.. {638294400 32400 1 +08}.. {654620400 28800 0 +08}.. {670348800 32400 1 +08}.. {686070000 28800 0 +08}.. {701798400 32400 1 +08}.. {717519600 28800 0 +08}.. {733248000 32400 1 +08}.. {748969200 28800 0 +08}.. {764697600 32400 1 +08}.. {780418800 28800 0 +08}.. {796147200 32400 1 +08}.. {811868400 28800 0 +08}.. {828201600 32400 1 +08}.. {843922800 28800 0 +08}.. {859
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.728285544456033
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8TcXkXHAIgNrfcXORL/2WFKhrMEBQWFKucXB:SlSWB9vsM3yXHAIgTN/2wKhrMEewKX
                                                            MD5:D2EAEA6182FB332CAA707B523F6C8A9D
                                                            SHA1:3BFC654E2B3BCF902AF41AEEC46772C84FFF3890
                                                            SHA-256:D17FDAF17B3DAC3A1310E2332F61585598185E64CED799ABD68249EB5B698591
                                                            SHA-512:E16BEE28BFE3AFFFE6F0025C09D0D65001F38D5045AAB1B554E4D3A66A88273F985B7BAA11F8D26E76E5ABC9F559E3E4B794CC939AAD5FF012A5A47924D08CB3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ulaanbaatar)]} {.. LoadTimeZoneFile Asia/Ulaanbaatar..}..set TZData(:Asia/Ulan_Bator) $TZData(:Asia/Ulaanbaatar)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):149
                                                            Entropy (8bit):5.006390440264841
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2WFKjhfMXGm2OHEVPoHsWA0GVFSTVVn:SlSWB9eg/2wKjJDm2OHEVPoH3A0CUX
                                                            MD5:D6245CAAEC9BA2579F4CEFFF196A9369
                                                            SHA1:4D182953F2CEEFF3583265F977B14F40C1A2FB43
                                                            SHA-256:C445B8030DEDDDED0AFF5CC692CC323B63BE8C14BBD42DC3FDE90AD4F9D14785
                                                            SHA-512:A32C477B6FAA79247907D1C4E2DF400B05AF4B529277C4CE12B33097872311E3F579115DC8CBA93DAC936928FD574414F3473A9CB7C8E85AB57CCA57489B60F8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Urumqi) {.. {-9223372036854775808 21020 0 LMT}.. {-1325483420 21600 0 +06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2058
                                                            Entropy (8bit):3.773734429231407
                                                            Encrypted:false
                                                            SSDEEP:24:5petrlfgLv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxKG:5Ysv+0j6lua2Gg/3gO8UoOZU2Wc/pKF
                                                            MD5:5ADD78E4AFCBA913D078A8790861A2DE
                                                            SHA1:BB63A762D5D76C0FD3CB9AB2BCDE95718E1C99EB
                                                            SHA-256:9D639C0FC69B3BEEBC96969092F9590EB48E7946E901B225BF245E165973B9A8
                                                            SHA-512:7C2418FD1F96F101B83E2ABDF2551405C6E429DBBF30A2FA7CD2477E2CE1CEEBB790C51B28AEFF043BA7A7A914CEF3C812668058D69225B9FE9475C56508453D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ust-Nera) {.. {-9223372036854775808 34374 0 LMT}.. {-1579426374 28800 0 +08}.. {354898800 43200 0 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {764694000 43200 1 +12}.. {780418
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.858039387006872
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKgTjEHp4WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKgsX
                                                            MD5:D23A09C84A5368FBB47174BC0A460D14
                                                            SHA1:045A72FEA79C75E5F0029BD110E33A022C57DFAB
                                                            SHA-256:18F5E4FE8247F676278AC5F1912AC401DC48DF5B756D22E76FF1CFA702F88DA7
                                                            SHA-512:404EABC2FC162E18C678CED063249C7FF4C28653880EA1903CE846FD191CD1C5B61E0610736F250B79BBAC768B1AFD6B9A8824D56D74591A95D7301B47D48387
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Vientiane) $TZData(:Asia/Bangkok)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2062
                                                            Entropy (8bit):3.7094518963173035
                                                            Encrypted:false
                                                            SSDEEP:24:56beOUYQ7FyDy3le3i96VwAmnuBNuTw6vl9O8nfipRkwhUZDAcD:56cYQBIy343dVNUIukElcXRDhUBAcD
                                                            MD5:5C0C094B088D0212182E7B944197D4FE
                                                            SHA1:CF43A511FE9CD295207DF350704462E09D4D5278
                                                            SHA-256:2558C96E25359C72F168DAC6FB3C16C54F8FD7D0724EEB1671156D4A1F42AC6C
                                                            SHA-512:5D659EBDC8C2B06C964B083ECC78B4370A4658590D83F020CD23910C44E2D8DAFE69F61E8EB569E1905E89F38CD03ABE6B92F6CE36CF0B1EE0732A7645AFA65D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Vladivostok) {.. {-9223372036854775808 31651 0 LMT}.. {-1487321251 32400 0 +09}.. {-1247562000 36000 0 +11}.. {354895200 39600 1 +11}.. {370702800 36000 0 +10}.. {386431200 39600 1 +11}.. {402238800 36000 0 +10}.. {417967200 39600 1 +11}.. {433774800 36000 0 +10}.. {449589600 39600 1 +11}.. {465321600 36000 0 +10}.. {481046400 39600 1 +11}.. {496771200 36000 0 +10}.. {512496000 39600 1 +11}.. {528220800 36000 0 +10}.. {543945600 39600 1 +11}.. {559670400 36000 0 +10}.. {575395200 39600 1 +11}.. {591120000 36000 0 +10}.. {606844800 39600 1 +11}.. {622569600 36000 0 +10}.. {638294400 39600 1 +11}.. {654624000 36000 0 +10}.. {670348800 32400 0 +10}.. {670352400 36000 1 +10}.. {686077200 32400 0 +09}.. {695754000 36000 0 +11}.. {701798400 39600 1 +11}.. {717523200 36000 0 +10}.. {733248000 39600 1 +11}.. {748972800 36000 0 +10}.. {7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2058
                                                            Entropy (8bit):3.7081033128260934
                                                            Encrypted:false
                                                            SSDEEP:48:5h+r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2j:K5PhtjLiII2ZFlgm
                                                            MD5:E43E5F0EA7C4575525BAB130984DCDCC
                                                            SHA1:2D715749469FEA51A8E25D1F4F8DC4FF9178817D
                                                            SHA-256:3BEF13638C46F16435D326C675907E61BB68C8173153CED3359E983BE0E413E5
                                                            SHA-512:27954FEC865031BC363CFDE94E97B3B19836A6F777646EA4AAB12ECCAEE6D60A0C690711EA192B917AC717F94A01D1EF64BAE97DF968069CC12415971B070498
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yakutsk) {.. {-9223372036854775808 31138 0 LMT}.. {-1579423138 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {76470
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):244
                                                            Entropy (8bit):4.692243303623333
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2wKs5XDm2OHGVQoHvZN6FCDx+UIFDVkvScHbY/s5UIAy:MB862KTmdHGuCvZNNkkHH3Sy
                                                            MD5:D45766D30074719C9A88ACE8BB53204B
                                                            SHA1:69B333DFCCCCEB66DD0F7DC28B272BB10769B6B0
                                                            SHA-256:2526557810747E78E713AE09BC305621A80FAEECF8D441632E7825738D4C79CB
                                                            SHA-512:5255DEED72D7D13862A4D6BED7E0458C099D2EF5A1B41536CAA7C0E65A61DE8B8D1AD62AD44559F970B6613ADFB3862778D1CC99B9A05CB5BBCA7F0202B5A5B2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yangon) {.. {-9223372036854775808 23087 0 LMT}.. {-2840163887 23087 0 RMT}.. {-1577946287 23400 0 +0630}.. {-873268200 32400 0 +09}.. {-778410000 23400 0 +0630}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2095
                                                            Entropy (8bit):3.704641905144701
                                                            Encrypted:false
                                                            SSDEEP:48:5ievNhYvm1qv7vXIovPvSvlDvtvuovKKvKcNvHvAvivBvqvvEyv8vlvEv+v4v+v+:/Nupj40H6l75FKCKcZP8qdyEaoBAWkW+
                                                            MD5:D4DABA407BB8A10E4961D1DE5D9781D1
                                                            SHA1:6933DE65336331BD90E2BEC6AEA0609B16DAEDC9
                                                            SHA-256:2C78699EFC60758B8F8D0D1DEEDFDED5E65C65EBF3082B23E60BDEA8BF8FBCFE
                                                            SHA-512:459E2187FAA66414F5CE934C335F563DFD2FA5316B86A54D1A29123A0460AFD65B7CE46629BD6A070A14CB6873A28A2F2803DE5FF4F29EA610712EB07FAD303F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yekaterinburg) {.. {-9223372036854775808 14553 0 LMT}.. {-1688270553 13505 0 PMT}.. {-1592610305 14400 0 +04}.. {-1247544000 18000 0 +06}.. {354913200 21600 1 +06}.. {370720800 18000 0 +05}.. {386449200 21600 1 +06}.. {402256800 18000 0 +05}.. {417985200 21600 1 +06}.. {433792800 18000 0 +05}.. {449607600 21600 1 +06}.. {465339600 18000 0 +05}.. {481064400 21600 1 +06}.. {496789200 18000 0 +05}.. {512514000 21600 1 +06}.. {528238800 18000 0 +05}.. {543963600 21600 1 +06}.. {559688400 18000 0 +05}.. {575413200 21600 1 +06}.. {591138000 18000 0 +05}.. {606862800 21600 1 +06}.. {622587600 18000 0 +05}.. {638312400 21600 1 +06}.. {654642000 18000 0 +05}.. {670366800 14400 0 +05}.. {670370400 18000 1 +05}.. {686095200 14400 0 +04}.. {695772000 18000 0 +06}.. {701816400 21600 1 +06}.. {717541200 18000 0 +05}.. {733266000 21600 1 +06}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2029
                                                            Entropy (8bit):3.6487650030366106
                                                            Encrypted:false
                                                            SSDEEP:24:5O4GeuadYlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUUUl2ue/:5xKdsUf8mFpNWFnyLCPYmPJSi3sh4
                                                            MD5:2CFA7C55D0731D24679CA5D5DC716381
                                                            SHA1:2BB66783D75C71E76409365757980FBC15F53231
                                                            SHA-256:20871FA6AA959DDFB73D846271B4A568627B564CFC08A11BDD84B98C2F2019A3
                                                            SHA-512:CAB10A48859B2C0B2CC7C56E0AA530AE7E506A4986BADC5ED974D124BD46DB328B50C423F83FCFD52D31962A249EEFC10351798B86D51EDA500F412C8D42E6BC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yerevan) {.. {-9223372036854775808 10680 0 LMT}.. {-1441162680 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 10800 0 +03}.. {733273200 14400 1 +03}.. {748998000 10800 0 +03}.. {764722800 14400 1 +03}.. {780447
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9879
                                                            Entropy (8bit):3.557602151081988
                                                            Encrypted:false
                                                            SSDEEP:192:K35nZPOUYySoluItljncxelTMwtrayE6x5sETNek/CyNzybxYKmX6SXL/XbEcygI:K940pb6cL/b3Ldr9Q7TMq+ML
                                                            MD5:E7F2A3EE0362E9ED3ECBAD24168AD098
                                                            SHA1:98832274F6D9B641B809123D1272A1C04EEAA177
                                                            SHA-256:6B3609BE4E93D21A2AB492594EDD387931E2C787E8471C9F2D3A677F34002D8F
                                                            SHA-512:C48A76F8251AE455C759CB98802E40B3BEF716FD8E7441B6DE0242942C913367E3572B7C871082E97CA9BE67EC7DC37F8D01C438965217AC0EC36AD508DCE0D4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Azores) {.. {-9223372036854775808 -6160 0 LMT}.. {-2713904240 -6872 0 HMT}.. {-1830376800 -7200 0 -02}.. {-1689548400 -3600 1 -01}.. {-1677794400 -7200 0 -02}.. {-1667430000 -3600 1 -01}.. {-1647730800 -7200 0 -02}.. {-1635807600 -3600 1 -01}.. {-1616194800 -7200 0 -02}.. {-1604358000 -3600 1 -01}.. {-1584658800 -7200 0 -02}.. {-1572735600 -3600 1 -01}.. {-1553036400 -7200 0 -02}.. {-1541199600 -3600 1 -01}.. {-1521500400 -7200 0 -02}.. {-1442444400 -3600 1 -01}.. {-1426806000 -7200 0 -02}.. {-1379286000 -3600 1 -01}.. {-1364770800 -7200 0 -02}.. {-1348441200 -3600 1 -01}.. {-1333321200 -7200 0 -02}.. {-1316386800 -3600 1 -01}.. {-1301266800 -7200 0 -02}.. {-1284332400 -3600 1 -01}.. {-1269817200 -7200 0 -02}.. {-1221433200 -3600 1 -01}.. {-1206918000 -7200 0 -02}.. {-1191193200 -3600 1 -01}.. {-1175468400 -7200 0 -02}.. {-1127689
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8784
                                                            Entropy (8bit):3.833553120942514
                                                            Encrypted:false
                                                            SSDEEP:192:ZRBHksL3zq6bCvyjvspNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/+:ft0CC
                                                            MD5:B04E22B9B42722013941169B5D04DEA2
                                                            SHA1:32B96A7D9504D5022A6C4E2D310E95B5F062947F
                                                            SHA-256:099C3BEFBA3B4C00AE19BC53D475A52B32FAC9B36EC823C8EAEFC7D00F78F388
                                                            SHA-512:8B93BCA1E923B7A43F2EB0889216E8FF991D13CB8D25BD300310ED7CD8537DBD858E8F422C9B52AE2F52F7C1CB450EF0B7C5C1B3AE547C9C1E18E2A851569DD5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Bermuda) {.. {-9223372036854775808 -15558 0 LMT}.. {-2524506042 -15558 0 BMT}.. {-1664307642 -11958 1 BMT}.. {-1648932042 -15558 0 BMT}.. {-1632080442 -11958 1 BMT}.. {-1618692042 -15558 0 BST}.. {-1262281242 -14400 0 AT}.. {-882727200 -10800 1 ADT}.. {-858538800 -14400 0 AST}.. {-845229600 -10800 1 ADT}.. {-825879600 -14400 0 AST}.. {-814384800 -10800 1 ADT}.. {-793825200 -14400 0 AST}.. {-782935200 -10800 1 ADT}.. {-762375600 -14400 0 AST}.. {-713988000 -10800 1 ADT}.. {-703710000 -14400 0 AST}.. {-681933600 -10800 1 ADT}.. {-672865200 -14400 0 AST}.. {-650484000 -10800 1 ADT}.. {-641415600 -14400 0 AST}.. {-618429600 -10800 1 ADT}.. {-609966000 -14400 0 AST}.. {-586980000 -10800 1 ADT}.. {-578516400 -14400 0 AST}.. {-555530400 -10800 1 ADT}.. {-546462000 -14400 0 AST}.. {-429127200 -10800 1 ADT}.. {-415825200 -14400 0 AST}.. {1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6856
                                                            Entropy (8bit):3.8064107143060752
                                                            Encrypted:false
                                                            SSDEEP:96:KXVuHfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:KXVQbkIaFF1w0us4qE3+sSGjT
                                                            MD5:8ABD279386C50705C074EEE18BF5AE59
                                                            SHA1:C392231DBE744F5942DA4BFAC8AD0ABEBAEA0BF3
                                                            SHA-256:2026944DCDEBC52F64405E35119F4CF97EA9AA1E769498730880B03F29A2B885
                                                            SHA-512:3095759D01AC7EEA25E427CA38E8A0395BEFA7250E7A0C1327BF9D61F07F4570CDF7313FBE6695973EB0DD66D201C6C63591CC0DA8A1E0029926DC7056F4C95B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Canary) {.. {-9223372036854775808 -3696 0 LMT}.. {-1509663504 -3600 0 -01}.. {-733874400 0 0 WET}.. {323827200 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):246
                                                            Entropy (8bit):4.637993677747699
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/2RQ7RfDm2OHDoH1JlvQV/FFrR3FcykVvQV/FFf+nmwV:MB86267RLmdHDC1w/FH3FcyL/FomwV
                                                            MD5:1581C6470850E0C9DB204975488B1AF8
                                                            SHA1:6933ED13F18AD785CEDF0837F86EFAC671297A85
                                                            SHA-256:2EA59ACDB5BBDD3C6ABCEEA456838A5CA57371A3D2BB93604B37F998ED8B9D4D
                                                            SHA-512:9FFFA013D82CEFF6F447521C19270ECDD71152F23670164423E6013FEC46253C62D2CB79B42630BD786BD113F27369E746CA981DD17E789F7571F473B47247C1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Cape_Verde) {.. {-9223372036854775808 -5644 0 LMT}.. {-1830376800 -7200 0 -02}.. {-862610400 -3600 1 -01}.. {-764118000 -7200 0 -02}.. {186120000 -3600 0 -01}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.709193799640151
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqLG4E23vXHAIgvMG4EeRRL/2RQqG4EZrB/4RQqG4E1n:SlSWB9vsM3yCPHAIgvoRN/2RQ1rB/4Ri
                                                            MD5:601EB889A87F9CAD6F1DF4D1AB009FAE
                                                            SHA1:EB43C253A48755442A67A2408D7E3295549F831C
                                                            SHA-256:64FB8CAD17CD36666C7027AAD01344FEF659B13699EEF1942365842F8ED2170E
                                                            SHA-512:9CFC4A446ED6A3BEF6C26AE57324F10A970EE2ADD6933130447FAD6A3DB538841F2490DD461AF5776FACD9BD2CDC4A83247DFA6B34802AE844DDC6D4C37B28EA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Atlantic/Faroe)]} {.. LoadTimeZoneFile Atlantic/Faroe..}..set TZData(:Atlantic/Faeroe) $TZData(:Atlantic/Faroe)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6796
                                                            Entropy (8bit):3.804838552487436
                                                            Encrypted:false
                                                            SSDEEP:96:96ufXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:/bkIaFF1w0us4qE3+sSGjT
                                                            MD5:F97CC7EB9C52D00177BFF4715832FCD5
                                                            SHA1:CD9DCBB5E6ADD6EA91C8F142957EC229FC7F6DA3
                                                            SHA-256:795F438E7F01342D5F25ECCDD09FCE65C03C5D2D561B9B5191301D57EC16B850
                                                            SHA-512:9586289FEB6C597160011A47432F0AC40000483FA2E579BD89046EFD33E98DDAD652B792FD80CEDEB4CD87B6439A7B473F25F1B7375BC75353CBAF9F77E1084E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Faroe) {.. {-9223372036854775808 -1624 0 LMT}.. {-1955748776 0 0 WET}.. {347155200 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600 3600 1 WEST}.. {811904400 0 0 WET}.. {828234000 3600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.957633978425468
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/y+YF3vXHAIgoq8yFRRL/2RQqG0EHEcAg/h8QahV:SlSWB9vsM3ymhVoPHAIgoh6N/2RQaK85
                                                            MD5:95C2D55CCE5809089CDB041EA3D464F8
                                                            SHA1:B395F5F26CE979BDF2B9E2CB51C06929AED11A6C
                                                            SHA-256:11BF0746F95BA01807D3B34C8FAE3FF4AE9DB5E4E6BC0CB8B36906CC3F44EDE5
                                                            SHA-512:AB2BE22E95A7C36E18EBA1BB63B3930A523ED793E43A3F597A8F63AE2F0E44436C39144BC136E7E5716D7FCBFAE7F1FAF36BCFFCF9C8D51151FF25BB14D6F8B5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Berlin)]} {.. LoadTimeZoneFile Europe/Berlin..}..set TZData(:Atlantic/Jan_Mayen) $TZData(:Europe/Berlin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9709
                                                            Entropy (8bit):3.80455694200614
                                                            Encrypted:false
                                                            SSDEEP:192:hZUiLbMsf/ss0qKd+aKyUXtOZHY1SCOcesoQivoKbFVCdm1rXWNXyCXTOuUbkIaq:hZZDQX1rWJysukysLE3+sSGjT
                                                            MD5:AC6647F9B53B5958214EC3F3B78A4D85
                                                            SHA1:7355622AF99296F069F73899D5C70941C207F676
                                                            SHA-256:B2A0D0DDC26806A05B2BE806CA3F938DB12A3FA40110B8B21FD3F04EFED3A531
                                                            SHA-512:07569CA4D5DC6D57D91D6FDC370671A7546B73BA653D094E1B501D33570F7700727AD7FF2A083BC79E9EDE807C47E7A5604BEF5803F290B2F277C51DEF10FA6B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Madeira) {.. {-9223372036854775808 -4056 0 LMT}.. {-2713906344 -4056 0 FMT}.. {-1830380400 -3600 0 -01}.. {-1689552000 0 1 +00}.. {-1677798000 -3600 0 -01}.. {-1667433600 0 1 +00}.. {-1647734400 -3600 0 -01}.. {-1635811200 0 1 +00}.. {-1616198400 -3600 0 -01}.. {-1604361600 0 1 +00}.. {-1584662400 -3600 0 -01}.. {-1572739200 0 1 +00}.. {-1553040000 -3600 0 -01}.. {-1541203200 0 1 +00}.. {-1521504000 -3600 0 -01}.. {-1442448000 0 1 +00}.. {-1426809600 -3600 0 -01}.. {-1379289600 0 1 +00}.. {-1364774400 -3600 0 -01}.. {-1348444800 0 1 +00}.. {-1333324800 -3600 0 -01}.. {-1316390400 0 1 +00}.. {-1301270400 -3600 0 -01}.. {-1284336000 0 1 +00}.. {-1269820800 -3600 0 -01}.. {-1221436800 0 1 +00}.. {-1206921600 -3600 0 -01}.. {-1191196800 0 1 +00}.. {-1175472000 -3600 0 -01}.. {-1127692800 0 1 +00}.. {-1111968000 -3600 0 -01}.. {-
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.910514445868106
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2RQqGsA/8rVDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2RQjQD4
                                                            MD5:ECB480DA99D29C0ACE67426D45534754
                                                            SHA1:784CF126B030C3D883EE541877E6181F795C9697
                                                            SHA-256:BDA015714260001BAE2848991DD21E802580BE2915797E5DABC376135D1C5246
                                                            SHA-512:54C1B20E45C7C73354DCD4E0F4444720771820ED10B282F745DC391BEADEAEDC629BEF97B1908FB62CDAEC915D32AF1F54FC6AA9DC83E317E7CE19FC2586EF28
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Atlantic/Reykjavik) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):160
                                                            Entropy (8bit):5.011466665416709
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/2RQqGtlN62/EiMXGm2OHXT14YoHvhFvdQVIyV:SlSWB9eg/2RQrlo2MiDm2OHXqYoHvTFS
                                                            MD5:3B310BB8C90CA716DC1AC5A697ACA9CD
                                                            SHA1:CD583F49478DCDAD91EF78539502C6FC62945C1E
                                                            SHA-256:51BFABCB3388107753A3C1A8CF31118E6627132BAA09B9878D9E7CEDBEBB4886
                                                            SHA-512:F593B7A1FAF0EA6B42D5EE86C20C9A8F5CD7ACD9B30EF7755E45ECAFEA8752C32E4CF4BEDF531F494E59D9F0C49CCC6FCA077292E20794AA265DFC0A56DFE579
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/South_Georgia) {.. {-9223372036854775808 -8768 0 LMT}.. {-2524512832 -7200 0 -02}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.880390141563645
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2RQqGt4r+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2RQr4rV
                                                            MD5:2C73A963F515376A46762CE153AAF5C5
                                                            SHA1:996C3C93DFAD89EA80AC5DFA1DFBD7CECD9ED28D
                                                            SHA-256:1C9CA8966FC8BD0BE70F4A187E17E56FB99139BC88C392E82BA2E23E23111C54
                                                            SHA-512:35A9ADC047DB058D71C21FC4ECB57CD14B0D9BA4416506763D1800D72CE6C9E81636F332AAD3533616F05C86F90A60416BD4065C5F832A51AA3DC186218BDCAE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Atlantic/St_Helena) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2256
                                                            Entropy (8bit):3.662522763865322
                                                            Encrypted:false
                                                            SSDEEP:48:506KSBSdSs2SbSwGSyPU3lSsS5SGScSo/SkSuShSceS3SBSc7XSiSgSwSd/SJkS6:JKU+Ew0FU1TuhrR//tOIoOjXZfDWSkPR
                                                            MD5:77C7ECE4FCBE150069B611C75E8DAA0E
                                                            SHA1:22F4E5F15BCA92D8456B70BB36230F2605CA5E1C
                                                            SHA-256:F0E99EF01F140CD5AAFE16803A657922207E6F7F6AF10B0AE795790916C302C4
                                                            SHA-512:6FB57E8499A587292AFAFA9BD003721572393D5268CAF956230DA76983A112B27D6731BE561A22CCEF84935F43AC988B667C2DC404C157EA8D0E7830FC1A2AB8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Stanley) {.. {-9223372036854775808 -13884 0 LMT}.. {-2524507716 -13884 0 SMT}.. {-1824235716 -14400 0 -04}.. {-1018209600 -10800 1 -04}.. {-1003093200 -14400 0 -04}.. {-986760000 -10800 1 -04}.. {-971643600 -14400 0 -04}.. {-954705600 -10800 1 -04}.. {-939589200 -14400 0 -04}.. {-923256000 -10800 1 -04}.. {-908139600 -14400 0 -04}.. {-891806400 -10800 1 -04}.. {-876690000 -14400 0 -04}.. {-860356800 -10800 1 -04}.. {420606000 -7200 0 -03}.. {433303200 -7200 1 -03}.. {452052000 -10800 0 -03}.. {464151600 -7200 1 -03}.. {483501600 -10800 0 -03}.. {495597600 -14400 0 -04}.. {495604800 -10800 1 -04}.. {514350000 -14400 0 -04}.. {527054400 -10800 1 -04}.. {545799600 -14400 0 -04}.. {558504000 -10800 1 -04}.. {577249200 -14400 0 -04}.. {589953600 -10800 1 -04}.. {608698800 -14400 0 -04}.. {621403200 -10800 1 -04}.. {640753200 -14400 0 -
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.862270414049974
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjpMFBx/h4QWCCj1:SlSWB9vsM3yI9kHAIgmON/2DCeMFB/4d
                                                            MD5:2EF41863430897F45E0CBB51E6A44069
                                                            SHA1:8E9561060E9509FAF235E5E033FC9C2918E438DB
                                                            SHA-256:DF7CBDDCBB2F5926A07D19A35739E5B8DCD9733C037F7D1FF95753C28D574674
                                                            SHA-512:9D3A37D64DCCCA28093C30FAB595690D021FACEC15F351A77CA33A779D645D305A2FA031869F0DE3B0404C498C2C321D3D02E4DC592D3C632F6700F5DCB54900
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/ACT) $TZData(:Australia/Sydney)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8372
                                                            Entropy (8bit):3.894755849491153
                                                            Encrypted:false
                                                            SSDEEP:96:j8SY62BXovlCyRL8pJXa4NyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:j8X3Xzgl3PaN8asiQ/Uv9UnvtCaRs
                                                            MD5:94E1A0C4326D09AF103107E64625CC6C
                                                            SHA1:C026565F020EB158309549D98313632BAA79205F
                                                            SHA-256:5C43D3152982BCFD5B9F51D0E909CF3A558BED1C270FEFFE030531D38D6F91B7
                                                            SHA-512:CA08A8BC0EB740D59650FE0A9E56D9E169348AD0994F2BFFD6CCFBF9CC42E82F892FB719E80C4E2084B5702E9725C651359EE3066BD71BB19397EA83B6A68430
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Adelaide) {.. {-9223372036854775808 33260 0 LMT}.. {-2364110060 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1 ACDT}.. {320776200 34200 0 ACST}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):674
                                                            Entropy (8bit):4.32071371733564
                                                            Encrypted:false
                                                            SSDEEP:12:MB862ELmdHLOYCvSi0xT0ryRIvUr0obZv:5ELe6dvSi6L
                                                            MD5:900B39F1D4AB93A445F37B6C0A8DE3D9
                                                            SHA1:DE82800779DCB8094C395B5024BD01FFA3C3BB8C
                                                            SHA-256:0D3C39EDAB34A8DB31A658A1549772F7D69EB57565E40AA87B707953A2D854A4
                                                            SHA-512:8D115D1D14FE6FF21A4AE77E3AAC075E6A877214E568956B9A4FD2E75A46E458CAA5AE26B483F128B4C62960D73BD7543BC32F22B760059423B3D9ABCBA24B6A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Brisbane) {.. {-9223372036854775808 36728 0 LMT}.. {-2366791928 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8437
                                                            Entropy (8bit):3.902306256303896
                                                            Encrypted:false
                                                            SSDEEP:96:QZSSY62BXovldRL8q75aANyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:QZSX3X2QfPaN8asiQ/Uv9UnvtCaRs
                                                            MD5:1553DAAB804A6C9BB15D711554980D3B
                                                            SHA1:5E3161B1FBB4C246DCB5E11ABD94095121CE38ED
                                                            SHA-256:734F295BD0B558BDF6178DE62151B8913699D08AB2B1D101C55B8DEBC410074C
                                                            SHA-512:06B21886070E39E390ECBD18841B7FDBFCA2C7C8573495D2BAA2B92EB113CD1C73C18D73C49DE3C49572CBCBCBED2FAD3248BC651BEB825A1E089B1DEDEFCBFA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Broken_Hill) {.. {-9223372036854775808 33948 0 LMT}.. {-2364110748 36000 0 AEST}.. {-2314951200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):195
                                                            Entropy (8bit):4.851279484907769
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjnSV1+QWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DCcq+DCyB
                                                            MD5:8944D3DF8FBECC03A8FB18C3B2DA3B53
                                                            SHA1:6B17B38D6560592CA49840C47DB9BDA7E79F9F76
                                                            SHA-256:5FE3CED97293FE0573D5ECE0CEF59CE5DDB4C57BC568AE7199E77B01D3ADE17C
                                                            SHA-512:907D8BB7EA840E0B3AC683884F2F709A2C06D67CE9258BE46400A0DA63581A9B1403A44FA43E1059BE8F5C7E06F9FA05C176309AD6295317BF14F0E9FA5741E4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/Canberra) $TZData(:Australia/Sydney)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.79231670095588
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DCkx+4DCVDy:MByMjUQVv8At2s4Ky
                                                            MD5:0C1DFC0877CE8EB08007B7C2B7AF2D87
                                                            SHA1:02F835BE2DA4FCA79DC2A6959BB4EB6ACC8DF708
                                                            SHA-256:1DD4EC4ED4F854E2EF6162B2F28C89208710F8EC5AABB95FFA9425D3FBBCAB13
                                                            SHA-512:358347045915B7D10940DB15E49528D0C636BEC1BE70129847D0B9D034F9E96E847394D88358E87D98A9E581605A3C2AB917B85FDE1296F290B4194BB7E3FA46
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Currie) $TZData(:Australia/Hobart)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):437
                                                            Entropy (8bit):4.508468081487136
                                                            Encrypted:false
                                                            SSDEEP:12:MB862pmdHPCvZUjMWpXgda/gd026Xgdvgd+v:5peKvZqMSX+4+56X+v+Q
                                                            MD5:A81864B2C0BD7BF81F4FA21F17800059
                                                            SHA1:518AC9E040A17083ED3962F4FBB47D1D83764FF7
                                                            SHA-256:AC004FD4B3C536406991EC13EBB3E64E0EC0C7B264BC18C0700C8FA545868155
                                                            SHA-512:3C24F4C2CC3072B3E820FCC1C68A747DCCBB9481FE743C1555783CC932DCBA44FE4851A732D24EABF62E845474D4E1278F120A04DB7549A18C7C49C31FB8D425
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Darwin) {.. {-9223372036854775808 31400 0 LMT}.. {-2364108200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):759
                                                            Entropy (8bit):4.110997549215461
                                                            Encrypted:false
                                                            SSDEEP:12:MB862EmdHvOYCvV2mV22wF2nUV2CF2+V2pCwF21UF2biV2cHVKF25V2VF2cV2tFq:5Eemdvg2wQCKZ4j5c0LVmtH1iknohwQT
                                                            MD5:1BC8DBD2E24606EFA49F933034FC0EEF
                                                            SHA1:A511695A1B87A689C6BFF65257C11D3962FDDA3D
                                                            SHA-256:79D0C770A304360DB33F3D1EF7B3935F1E4E8125893E0DCE683AC35A51302CFB
                                                            SHA-512:A839D390D70F22FC833322029B732F3AE68FF48793B07005041BD12322DD6E5D5E5FF31787AA004A507A57F8FC245133891F266C4EF19D49F085E6B412E5B04C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Eucla) {.. {-9223372036854775808 30928 0 LMT}.. {-2337928528 31500 0 +0945}.. {-1672555500 35100 1 +0945}.. {-1665384300 31500 0 +0945}.. {-883637100 35100 1 +0945}.. {-876120300 31500 0 +0945}.. {-860395500 35100 1 +0945}.. {-844670700 31500 0 +0945}.. {-836473500 35100 0 +0945}.. {152039700 35100 1 +0945}.. {162926100 31500 0 +0945}.. {436295700 35100 1 +0945}.. {447182100 31500 0 +0945}.. {690311700 35100 1 +0945}.. {699383700 31500 0 +0945}.. {1165079700 35100 1 +0945}.. {1174756500 31500 0 +0945}.. {1193505300 35100 1 +0945}.. {1206810900 31500 0 +0945}.. {1224954900 35100 1 +0945}.. {1238260500 31500 0 +0945}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8734
                                                            Entropy (8bit):3.8515786470328823
                                                            Encrypted:false
                                                            SSDEEP:96:aOqigkx6WsYyS39nQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:aOq05hnQiAmcOM6e0pj
                                                            MD5:5E04BF8E1DEBFCC4130FDD1BBD67B2DF
                                                            SHA1:796AADCE7BB2FAF5E6FC916C941A4E3DCAFACC9E
                                                            SHA-256:D813F6A97BEFC22CA4F24C59EB755D269B9C68A449CC7CF0D2C61F911860EBE7
                                                            SHA-512:3A69CF1D1F57D6BD39E5F4DAF76BBB06A749D42BEB29452A0A5BDAA68F5DACC0DF176EDDA7A083F5B5B84FC651926C09D46CAAD2F6C4F1595AB9CCA1A958D653
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Hobart) {.. {-9223372036854775808 35356 0 LMT}.. {-2345795356 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-1646640000 39600 1 AEDT}.. {-1635753600 36000 0 AEST}.. {-1615190400 39600 1 AEDT}.. {-1604304000 36000 0 AEST}.. {-1583920800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AES
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):199
                                                            Entropy (8bit):4.912882643701746
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yIoGEoPHAIgjGg6N/2DCkx/2DCPGUv:MByMjeXV6t2a8v
                                                            MD5:425DC7B1E31F4AA41DAD74E3C9AE3562
                                                            SHA1:D92A3269F7BF5EC00F082C64CEF6E20C43017180
                                                            SHA-256:4D84E4040FBC529C9E0366BB74D0CFADEEEEDA0DFCC6C2C9204DED6C6455CAC3
                                                            SHA-512:F3031F16C0D00D9F8A38CD378F599EB3E63F4FF85F120DB38E3013E93F08E6F512D969F164BBC88CD625910FB3E086F3352E5B8FFC1373C3CC98F363FB3FD3F7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Lord_Howe)]} {.. LoadTimeZoneFile Australia/Lord_Howe..}..set TZData(:Australia/LHI) $TZData(:Australia/Lord_Howe)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):824
                                                            Entropy (8bit):4.249672335529665
                                                            Encrypted:false
                                                            SSDEEP:12:MB862gtmdHVCvCi0xT0ryRIvUr0obbty/ywtUj3yv:5gteMvCi6Xlt8
                                                            MD5:504A422280E0459A2126E7CB02F527E6
                                                            SHA1:EF61B98EFB1E44EE59020E99A69EA67D6B8ACFC2
                                                            SHA-256:01B278309353849CC2FDF62A30E2FF483833D5713CF5E329252738BE6F2C0A84
                                                            SHA-512:BFDAAD56D817CD3AAB17DFD0A33EFDD422645BC542ABE269C0F8520E33796DF4F19EAB2E40BFC6C4AF93EF654239B8F2E285639B4662040D865B9C340A23CFAD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lindeman) {.. {-9223372036854775808 35756 0 LMT}.. {-2366790956 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}.. {709912800 36000 0 AEST}.. {719942400 39600 1 AEDT}.. {731433600 36000 0 AEST}.. {751996800 39600 1 AEDT}.. {762883200 36000 0 AEST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7764
                                                            Entropy (8bit):3.5615258807990537
                                                            Encrypted:false
                                                            SSDEEP:96:pmz39IyKxb/JbcD9gKniAF23QbNS1fEGXALNbbT2JFJ/FaKaTQ9ZJhRVK:p+cpVKniAF2AbkFKL
                                                            MD5:10F983F4683CDE13A1228AC0B04D8513
                                                            SHA1:45378BA5949BE53D698108F50FECFF50C9E3D296
                                                            SHA-256:76D1F1ED67B8F8D6903789C2FDDF79590A83677972D416F5F3C9687614EC6238
                                                            SHA-512:D60D802EF215A33750E4F859657BA12A67084B1E9FCF1B4A7CEEE7B9D816BC2C6670775D93C88EC8380CDD7790AD574133D6F90F0828F848313C26583B2F196A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lord_Howe) {.. {-9223372036854775808 38180 0 LMT}.. {-2364114980 36000 0 AEST}.. {352216800 37800 0 +1030}.. {372785400 41400 1 +1030}.. {384273000 37800 0 +1030}.. {404839800 41400 1 +1030}.. {415722600 37800 0 +1030}.. {436289400 41400 1 +1030}.. {447172200 37800 0 +1030}.. {467739000 41400 1 +1030}.. {478621800 37800 0 +1030}.. {488984400 37800 0 +1030}.. {499188600 39600 1 +1030}.. {511282800 37800 0 +1030}.. {530033400 39600 1 +1030}.. {542732400 37800 0 +1030}.. {562087800 39600 1 +1030}.. {574786800 37800 0 +1030}.. {594142200 39600 1 +1030}.. {606236400 37800 0 +1030}.. {625591800 39600 1 +1030}.. {636476400 37800 0 +1030}.. {657041400 39600 1 +1030}.. {667926000 37800 0 +1030}.. {688491000 39600 1 +1030}.. {699375600 37800 0 +1030}.. {719940600 39600 1 +1030}.. {731430000 37800 0 +1030}.. {751995000 39600 1 +1030}.. {762
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8341
                                                            Entropy (8bit):3.8532171550973526
                                                            Encrypted:false
                                                            SSDEEP:96:Yyigkp2EUyn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:Yy3VnQiAmcOM6e0pj
                                                            MD5:40D06B80A4A0DB415270EFD9698B97BF
                                                            SHA1:1999F0E8C7EBAA11BD21D64D9E07FA911F13C64C
                                                            SHA-256:F21B9EA51C0D41BAD0420FE0601E5A4B491FB895856F4BDDF6541D704469D92F
                                                            SHA-512:E47D597CC85D177CF2804C44C216EB4C5B74472457F15F697704311A847BF8A051DCAFD26FA61DD689555F35640151E26F25D5DC5319EFEFEA62AD86657A4A95
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Melbourne) {.. {-9223372036854775808 34792 0 LMT}.. {-2364111592 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.893713405897538
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjREeQWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DC5eDCyB
                                                            MD5:80B7CDD1EA5A5308CE84C038180005F2
                                                            SHA1:B7CA15B58ADA8CA3EB74B7971073022D57D8EE70
                                                            SHA-256:73D7C9E207E61ACF8DF7242BDCD84488189033E22A84873A953B65DE02FA1B0B
                                                            SHA-512:F627F5FF335600AC9158D6A0D3694AB7E70180177449C17B5605BBF7B1B7F8FB447A9C207F4E1BCB627074DB47B8A66F5D78E03C6DB8FA17F8BDD6AABB331665
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/NSW) $TZData(:Australia/Sydney)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.830368875485429
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjbvvXHAIgoXjbBvRL/2QWCCjsrQWCCjbi:SlSWB9vsM3yIFHAIg2N/2DCZrDCl
                                                            MD5:14CB7EA1C028F457345EBEB8ADDC9237
                                                            SHA1:208BF676F56533BA271D1B98363A766DF17CF6F2
                                                            SHA-256:A983C9CAD7E542CAED43B083E68CD2B782959A4B54015F374C29250D3ACF9B8D
                                                            SHA-512:099F65E5FA705FD7257CF7B8E103905EE313C6D082844F69CCD3F318E3E7F4098B29F952FA0AA28655E1FE290A0FB2E809911088315889DE7CAAF0E04698C2FC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Darwin)]} {.. LoadTimeZoneFile Australia/Darwin..}..set TZData(:Australia/North) $TZData(:Australia/Darwin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):739
                                                            Entropy (8bit):4.31793586514766
                                                            Encrypted:false
                                                            SSDEEP:12:MB8623mdHCBdCvmlXz6zezzOz4iaLYvzkzi4zm5fVcBhg8mfev:53eCB0v4+e3Oz4iaLYbkzi4zxhfqw
                                                            MD5:01B1A88867472AD60B8F5C0E1648E3ED
                                                            SHA1:9975EA750458E8061DD8A83585675CB7E4910CA6
                                                            SHA-256:FC1B54CA261074E47A8A486FEAC12DD04D46166D1D2B44163BD8791BEC32D275
                                                            SHA-512:20BDFBCD1A5038C81552EBD955F3921DE3447A1F30E64935937768B2B98735AE53049601DCDD2D519646C78E6D03289EB465CFF4F2DADEA7D89A329504C6C475
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Perth) {.. {-9223372036854775808 27804 0 LMT}.. {-2337925404 28800 0 AWST}.. {-1672552800 32400 1 AWDT}.. {-1665381600 28800 0 AWST}.. {-883634400 32400 1 AWDT}.. {-876117600 28800 0 AWST}.. {-860392800 32400 1 AWDT}.. {-844668000 28800 0 AWST}.. {-836470800 32400 0 AWST}.. {152042400 32400 1 AWDT}.. {162928800 28800 0 AWST}.. {436298400 32400 1 AWDT}.. {447184800 28800 0 AWST}.. {690314400 32400 1 AWDT}.. {699386400 28800 0 AWST}.. {1165082400 32400 1 AWDT}.. {1174759200 28800 0 AWST}.. {1193508000 32400 1 AWDT}.. {1206813600 28800 0 AWST}.. {1224957600 32400 1 AWDT}.. {1238263200 28800 0 AWST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):203
                                                            Entropy (8bit):4.803539644461131
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yIaWhSHAIgPWAvN/2DCoRWJvFBx+DC7WN:MByMjL9t2rOvFel
                                                            MD5:401B6B2E30EF17BE20212645287EB94B
                                                            SHA1:67D15A45C61122CE680B829FE0FA3A1C501A8C8F
                                                            SHA-256:DDA669B9BFB3E08FC23CE67030148B9E4740824ADD8DE02580D6AFD31CE05BAB
                                                            SHA-512:F4348F8F4FF261C47854725AEE4E14E7E334B3C31496E5C46B0E0041551CB6861380E684E8888AFE9DA7E8E97236AC322B9CE2738EF245E9D46C9681665F83A1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Brisbane)]} {.. LoadTimeZoneFile Australia/Brisbane..}..set TZData(:Australia/Queensland) $TZData(:Australia/Brisbane)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):198
                                                            Entropy (8bit):4.752918480727309
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yIDRpGSHAIgSRrN/2DCa7QDCuRpyn:MByMjdpQYrt23QHpy
                                                            MD5:D226A0718185854DFE549E00856AA8D5
                                                            SHA1:94EE96FAE259D90C2FDF169DD95BD82B3171FFAE
                                                            SHA-256:D9DCFDC377901EC0C0FEB9CEA743C2C1425273F69A1BAA7BF3B74FEC5885B267
                                                            SHA-512:7EE29A7235CAAEF4889246B7A2241CA9A0D5D2B2E1D56B20141247C93B8736F17280F0D46004AC4588E137D1E76F661C779C906BBFC2B5F8FA73C19F7657F952
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Adelaide)]} {.. LoadTimeZoneFile Australia/Adelaide..}..set TZData(:Australia/South) $TZData(:Australia/Adelaide)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8338
                                                            Entropy (8bit):3.847525715050911
                                                            Encrypted:false
                                                            SSDEEP:96:AZJigk42/yn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:AZJuVnQiAmcOM6e0pj
                                                            MD5:C0F1776E011C4C86B7709A592E7CA1EB
                                                            SHA1:1CA528D529BF4995E145D6E0D87A8752A3577E7F
                                                            SHA-256:FC453486325ADE1D31F14087B76D4936F3A6D551ABD1DB6FCAC129BDB043951C
                                                            SHA-512:F872182962C2615A35F012ECAB30C88F07C6BEF0261207AD52706DB22D8CDD0DA65723CD801FDA7C548C5EB0ECFC39DD66CC17503BAA3BBB77BFA35D20650E4F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Sydney) {.. {-9223372036854775808 36292 0 LMT}.. {-2364113092 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):195
                                                            Entropy (8bit):4.777331394201868
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DC3neDCVDy:MByMjUQVv8At2+eKy
                                                            MD5:9C58D9EFBB03472BBDA76CE2FFAD4BB4
                                                            SHA1:30959E3681B64AE26F7FA3957887896C26AF7F19
                                                            SHA-256:C94FA7A7640CD00963EE8FF1A3D9DCDA2075408739D998EDBF7CFC998DB764FD
                                                            SHA-512:2D6B778217726691F2CB4A4995A8B1AB08DDB7FE4570A3FD04EF54F718F455EF3CBD4EEF1A1BCC99A2088C82A6E89DB455BAF1327CECD6BF608837E50F14A6C1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Tasmania) $TZData(:Australia/Hobart)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.818875198673406
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yIvFfkSHAIgoFNNvN/2DCzyQDCMF4:MByMj9fKaNNvt2xQz4
                                                            MD5:0B144A2E47C81354BC510BC741DE5150
                                                            SHA1:A7396F1741F02C6C208FD1286362E4E0720198B8
                                                            SHA-256:DBEF9C5BDD290FEC5FA740D697143332D3CA1FC373CF1DF736F1883AC9BA3298
                                                            SHA-512:562B029591F9ADB8C324BA56E849B2B524E91B26D3DB441510194882A8E1E63E6948D041874A00A0A76F29925A1CEAC53DD2AE5D7F23123B6FE919346CBFD8CC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Melbourne)]} {.. LoadTimeZoneFile Australia/Melbourne..}..set TZData(:Australia/Victoria) $TZData(:Australia/Melbourne)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.831654343064909
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjXFeyXHAIgoXjrWARL/2QWCCjH0QWCCjQ:SlSWB9vsM3yInHAIgOWAN/2DC00DCt
                                                            MD5:5F5916CB038876BE27AA5E2AD74EE085
                                                            SHA1:18AC21B638188B542455BA3DA91F958DF1724E68
                                                            SHA-256:75ABB7F20C4A0B618138AA190AF33CEAF2A6D2C707DA6C1314E4BFF2F9904F58
                                                            SHA-512:ADFD83E292AC1BB5E19255A9B2DA0E3BB9323A5F9B92D458DE34C291D7F9B6CFBBF62AA3351FB320E54F34305DD485ADC72134D21AFA6A27B2B8B7D93DCA2113
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Perth)]} {.. LoadTimeZoneFile Australia/Perth..}..set TZData(:Australia/West) $TZData(:Australia/Perth)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):212
                                                            Entropy (8bit):4.918079927018121
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yIcKlHAIgJK3N/2DCkuM0DC9KM:MByMjcKeJK3t2kVSKM
                                                            MD5:BEDEA56FCE4B2F0A3F3E9319856A5560
                                                            SHA1:9FD0FE998A003C6B4CCCD00A977153347DE07F55
                                                            SHA-256:55A9264D0414644A1BE342106AE86086A6659596DC9322A74FC4D1DDB41F7C60
                                                            SHA-512:7C438B72262B99EDEEB31AC95E0135BB722A3B0B049278B6DE67DB5FB501837FB9C03785233B538E83F4B56104F6EA3B3DA0F7C2275E0F78F232161840AA4C63
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Broken_Hill)]} {.. LoadTimeZoneFile Australia/Broken_Hill..}..set TZData(:Australia/Yancowinna) $TZData(:Australia/Broken_Hill)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):194
                                                            Entropy (8bit):4.888429541699473
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/xWh490th4:MByMYdIp7tQ490I
                                                            MD5:A8A7A10DA4321819ED71F891480770F8
                                                            SHA1:930674EF7711542D7F471A59C1870D4576E027FD
                                                            SHA-256:2F594239A434052D36053A2B3EAB134EADBAD06EB6737E67CF72166DAB157537
                                                            SHA-512:C6AD1869A713DDE0E4DE53F7894E5CE0B7AEFDDD7C5C3D83BB5B92FB7D8E20B373A6694045053E1AE8EA98A7B7D0C052EF2C21310E47DC650A7A399A5F73D586
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:Brazil/Acre) $TZData(:America/Rio_Branco)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.875339623736144
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wKy4oeyXHAIg20wKARL/1bIAJl0IAcGEwKyovn:SlSWB9vsM3y7/rDSHAIgp/AN/xIAE90j
                                                            MD5:E0D0EFBEC37E27532B49FF6DD9893DA0
                                                            SHA1:9C00993A885AF448E48201A46E17629A7A602FC6
                                                            SHA-256:A676562A90FF8587A775F6F0E3BE05D870456A56D25B5330816BF9043C8D475B
                                                            SHA-512:AB0E6907F9C0002CA5C050A0069AF013B14BADA08CA4553C96B302C078DF7629D5D7EDE4A19A53DEC6E7B9E6D9857F14EC7A1DB9BC11F2EEC9FFBAC70E129EEE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Noronha)]} {.. LoadTimeZoneFile America/Noronha..}..set TZData(:Brazil/DeNoronha) $TZData(:America/Noronha)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):191
                                                            Entropy (8bit):4.948480276987682
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0tQJXveyXHAIg20tQJE6RL/1bJHIAcGEtQJXy:SlSWB9vsM3y7tIGSHAIgpt36N/xR90tF
                                                            MD5:FCCB5F44903E1B988A058E5BBF5E163B
                                                            SHA1:E1CC03DD4A804C7305D8B0C12D8451D08AE262EA
                                                            SHA-256:961FB3AB99A63B1E9704B737EAB2D588B5A39D253A213E175CC678BEDFFD498D
                                                            SHA-512:F31C80E4AD6EBE6CB8A3382E0052DC47601D073E8F81375D50241105675AA3AB45433FFD0534524D9992ABE1086C6671D85FF7C72B0D6766EB9984426F608B77
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Sao_Paulo)]} {.. LoadTimeZoneFile America/Sao_Paulo..}..set TZData(:Brazil/East) $TZData(:America/Sao_Paulo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.902113962502196
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0znQZF3vXHAIg20znQv5RL/1bbAWVIAcGEznQe:SlSWB9vsM3y7zn+PHAIgpznSN/xn90zN
                                                            MD5:9F4B43F4F27D0B7EAC0C5401A1A794B4
                                                            SHA1:2A8543B994E93E54BD50EAA78463905E6A8EBE74
                                                            SHA-256:0500C9A248C8CE9030EA30D0AF9DD95DC465480BAF60646C0B7C511FA23C6D1F
                                                            SHA-512:0ADAF708ACFBD80F4704951EEBC24AD144FD5856997A429279E804F3A7F7F9A8FED41DCEE85BFB1ECDBF1E05137E87E7430186474BCF5DE42067FFC74746F048
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Manaus)]} {.. LoadTimeZoneFile America/Manaus..}..set TZData(:Brazil/West) $TZData(:America/Manaus)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7736
                                                            Entropy (8bit):3.7984816540097843
                                                            Encrypted:false
                                                            SSDEEP:96:09+xKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt7:9Ss41sFpM5vwA6Efv03TBZLl
                                                            MD5:6DB983AD72FB2A88FC557BE5E873336F
                                                            SHA1:C64E988010087ED559A990B3D95078949C9B4D72
                                                            SHA-256:E2AEA7CFD428A43D9DB938BCC476623ADC1250BD8057013A7FFF5F89D7FF8EFC
                                                            SHA-512:C0A646F80FB2FD42D9146A4FD36CF5A7F62016684F8D5AF80453EC190F4AEA65EDADC5BCF071AE746ABFB43B29C27B2743F2152B6986D41BFDE1617CA774A7C5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CET) {.. {-9223372036854775808 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766623600 3600 0 CET}.. {228877200 7200 1 CEST}.. {243997200 3600 0 CET}.. {260326800 7200 1 CEST}.. {276051600 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8505
                                                            Entropy (8bit):3.8095769056779916
                                                            Encrypted:false
                                                            SSDEEP:96:e3HgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:eQaUqtfA604qSBgI7DBch
                                                            MD5:A6F88C55E8613A27DE3E6C25B0672910
                                                            SHA1:3B593CC17BF153A6209FC5AACE7B88DA9603BD44
                                                            SHA-256:73A9841F233AA657AFB6CED8A86A37D55FE5582DD996B9B28975D218BCCC078F
                                                            SHA-512:526A922B1594A2800B03F363F7BFEC29203D4A4F2B49C5F2618469F59176CE4F8AFBA0616B226AC39D308DB05DE7147714D9B6CDBB2EA7373A041A4D47F50E2E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CST6CDT) {.. {-9223372036854775808 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-84384000 -18000 1 CDT}.. {-68662800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.804821796604604
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/0nalGe2IAcGE2NEOyn:SlSWB9vsM3y7UEOXHAIgpUEqA6N/0af9
                                                            MD5:33A04963E70EBF29339204348E0DF874
                                                            SHA1:456C0DB88ECE4D180EEE5AE5AEF5FBEB6E977D00
                                                            SHA-256:6DC6354D761CBE7820C9186568CAB87AD48CA925507F6A740357195B60E16D87
                                                            SHA-512:DF8F46827760BD7EC922C6837E0B6649B4FBD220B79E6F1B67FE3DD8CB3D2D035ECDAF4CF6CE5BDE6DC79C6F7B6EE2B9787AF08A97845CD0D647720A2E78D7EF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:Canada/Atlantic) $TZData(:America/Halifax)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):191
                                                            Entropy (8bit):4.863241040396457
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0po/vXHAIg20puFvHRL/0nPQox/h4IAcGEpoyn:SlSWB9vsM3y7pYHAIgppuRN/0d490pl
                                                            MD5:97E50CE9FBA3F1A6DFCF333F9E6D592C
                                                            SHA1:EE472C411079E788DBF32FAC9C5B7EE121960DC2
                                                            SHA-256:DB32E83949D62478D229E9FB57BB1624D21B3A9CCEE4CD55335F8262C01D820A
                                                            SHA-512:D547E3DC03848A677BE67F7CF4124E067F76EE09BB724A5B10F028BEA72C1526B17678A035B2C53F69498E9ECAACD3C5445D42B7FE58DF706DD2C5F2ADA05A73
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Winnipeg)]} {.. LoadTimeZoneFile America/Winnipeg..}..set TZData(:Canada/Central) $TZData(:America/Winnipeg)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.758562813220951
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/0nbHboxp4IAcGEqM:SlSWB9vsM3y7RQtHAIgpRQPN/0Dboxpp
                                                            MD5:4365BEFA3D50EEE20843EF97A095E512
                                                            SHA1:7756049B4CD6459742686925E9516E64A9727306
                                                            SHA-256:22844994AE893F3236A091B050E932E84A5218EC0D01F72595E17CCC471FA564
                                                            SHA-512:CB265E79DF926026BEBF7158590369ABE5353C759540F509ABBA2A7ADBE59A705BC2AB936F400614BE610EDB761DE9A2B1E179A0A8B0A87E595392362C2516AA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:Canada/Eastern) $TZData(:America/Toronto)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.8181126338833655
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx07nKL50vXHAIg207nKLyRRL/0nNYLo/4IAcGE7nK1:SlSWB9vsM3y77G2HAIgp7bN/0W8/4908
                                                            MD5:FA0D0024AD72CCE4EC7229FA897FB1B7
                                                            SHA1:4373A07F2674FE974189CC801987652AA97F0204
                                                            SHA-256:D7A203E60FF19DCDEAAD14121720DE51DA73392D25B40FFA301C1935CDF89517
                                                            SHA-512:82EF7F429604A69734B04D298B4C9C9AC3BE57B9DD8C4CECF59C7AB3470BDFBA0505886C4E6AA3864F5EC7FBB4C69C54CF153A6417376828234833013C29A0C1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Edmonton)]} {.. LoadTimeZoneFile America/Edmonton..}..set TZData(:Canada/Mountain) $TZData(:America/Edmonton)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):196
                                                            Entropy (8bit):4.998628928230972
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7tgYJHAIgptVN/0xdBx+90twv:MByMYnKpTt590g
                                                            MD5:A2DCCB8BFC65DD4E7C3BB7F10DCEFF11
                                                            SHA1:6FD2F4FAE06C5D4D3F189A167A98AA76497569DD
                                                            SHA-256:87F42F45FD7D059CA47650D445420DE8320F3A7C1CBC7671FBFA8A8881274433
                                                            SHA-512:F42E32C5BD785BA914E5054784BF67DDF951460A708290D1899621CEEDC63475B584FC052A86A3B6D45BF3C651D42427FB6F9CE2A2A33764DFFF731053BECC16
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/St_Johns)]} {.. LoadTimeZoneFile America/St_Johns..}..set TZData(:Canada/Newfoundland) $TZData(:America/St_Johns)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):194
                                                            Entropy (8bit):4.887587766811186
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7ZLgXPHAIgpZLgFN/0N290ZLgK:MByMY13p1stx901/
                                                            MD5:68900CE38FE0E40578323BBD3D75184E
                                                            SHA1:9D5EAB5CBCD495DD46974207FBE354A81DD2070F
                                                            SHA-256:5C4FD46054B190A6D4B92585B4DAE4E3A8233EE2996D14472835DDD264911DC6
                                                            SHA-512:3EF53F0FCD8D88A1B977886BDFAA03D7B84EF021AC6BEDF7C571BFBF2242BFC3F3EB6A6B6A9C2F6852AF412A96DFBC30F3BB25A6619CBCD8736F3DF5B64DE1BF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Vancouver)]} {.. LoadTimeZoneFile America/Vancouver..}..set TZData(:Canada/Pacific) $TZData(:America/Vancouver)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.887593462838566
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/0nogS64IAcGEsAzEB:SlSWB9vsM3y7hzi2HAIgphznN/0Hd499
                                                            MD5:A4237BDCAF68B0EFECA97178F3DEE724
                                                            SHA1:A9CBC02B5545A63A0C9B38C8FA7FA2DE6D483188
                                                            SHA-256:46BA00AE3A07A4DC83D6CB517D87C9CBBA491B3421FE9AD6C74CAC5695EB73F7
                                                            SHA-512:832BF256BE8CB2DD205DDE50017448D5830B46FF4DCA77BDB852067EE0C9DF9977014F2A3E3DD6944336158D8EA377CFBBE519EE5B56FB26EB64325B45476B9D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:Canada/Saskatchewan) $TZData(:America/Regina)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):195
                                                            Entropy (8bit):4.889486451014262
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7peR2fkSHAIgppeR2rN/0CF/490peR24:MByMYkGk7pkOtBQ90kB
                                                            MD5:490D99BD5465CBF5A8FE28F33180B8A6
                                                            SHA1:4783295C31A804BE98145270ED28956A0783E655
                                                            SHA-256:A1B1AF37DC89C6BA663E4E967A18409AE4E0FA9EF1B908D0461368DA31001C09
                                                            SHA-512:9F6B4F204A21B69E1DFCB766C0671D3736414C73269DCEDCDB4FC3DBA869BBA1511DF6B5061F8964F0AF9C3816133D04E5DFB8A6AD07CA06E7712787A8FECC5A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Whitehorse)]} {.. LoadTimeZoneFile America/Whitehorse..}..set TZData(:Canada/Yukon) $TZData(:America/Whitehorse)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):194
                                                            Entropy (8bit):4.812019117774239
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7tfEJkHAIgptfEJo5N/0rHM490tfEJB:MByMYE9pEOt4X90EB
                                                            MD5:6EF54792279C249B16877100682F1806
                                                            SHA1:A62629EA055207D917740E3AEF4F0B005EA49CC4
                                                            SHA-256:5B40167DD0C0B5C293861070C4AC249F78DDF8BAD798DD0165E3AE894C9B9570
                                                            SHA-512:3CF93003C3EA2B4386660F0C87074F9AE2BAC4EE72D88451DCB1EA8B79502D2187B1608B6D5CE8D7EDC00AED99CF9DB7B006EB6ED2A2B5009F2C0E757D282D74
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Santiago)]} {.. LoadTimeZoneFile America/Santiago..}..set TZData(:Chile/Continental) $TZData(:America/Santiago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.808907056781067
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG7ZAJWXHAIgObT7ZAiFvRL/0bxOdBx/nUDH7ZAZv:SlSWB9vsM3ycJAUHAIgObJAiRN/04dBn
                                                            MD5:2EC4FDD1EFBAF1D9F9DBAC8B1B5EDD09
                                                            SHA1:FECED8EBC7B666628B7B45C9694FCB3A0B20A42A
                                                            SHA-256:1E2DA1862E0E0F131B7C6EB12FAC5F920852C61C162993A30BC843A464A5AAD4
                                                            SHA-512:74D61141505BAF1ABAD61FB91941C63C169EFE3C85829FEBB4D29A72EA54D1A07EC84E2E9B48E963E65CBF7663245459FAD288D620B1BEFFE682A2D1C243794D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Easter)]} {.. LoadTimeZoneFile Pacific/Easter..}..set TZData(:Chile/EasterIsland) $TZData(:Pacific/Easter)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):175
                                                            Entropy (8bit):4.857134440822812
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02TEMVFfXHAIg202TEyRRL/0lIAcGE2TEMy:SlSWB9vsM3y76EkHAIgp6EyRN/0l9068
                                                            MD5:3FB16EA4A9B0529220133C4A7B05215B
                                                            SHA1:BD56B6E76A92A5925140CB5CC3D940E1DE90993F
                                                            SHA-256:6F4F2D7F5BCA4E5183460C0153D2B98F5239A99F149DE6638B311C73CEDB1329
                                                            SHA-512:690EC1BCE7FA979BD55725B8ED6DF042BB331CAD332827B2C64B31F107539934AA5A30268B1F03D52697528E68A1BA72E4D56B5199A68B1ED897B75FAFB33A8A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Havana)]} {.. LoadTimeZoneFile America/Havana..}..set TZData(:Cuba) $TZData(:America/Havana)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7440
                                                            Entropy (8bit):3.695300167191082
                                                            Encrypted:false
                                                            SSDEEP:96:CgDIMcVbf+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlt:KlfyDjivBeRF+W35Syrwl9h5j
                                                            MD5:34339D40AC889DCB5A09D10F123175AD
                                                            SHA1:57E1F70FA8999106FA3874A9CE1E75A7ACBC81E9
                                                            SHA-256:64E284F9F7A36CC0A352809141D76E73A99344A9F30CFFEA254CBB9D2C589ADA
                                                            SHA-512:2DCF16D9D7593FC3E5844E18FD689AADA157866490CFD37A38A47F747DDA189822055F6DD470CA2D77040D2C5A2527512880C22ED8EC16D9424EDF3DC228AFED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EET) {.. {-9223372036854775808 7200 0 EET}.. {228877200 10800 1 EEST}.. {243997200 7200 0 EET}.. {260326800 10800 1 EEST}.. {276051600 7200 0 EET}.. {291776400 10800 1 EEST}.. {307501200 7200 0 EET}.. {323830800 10800 1 EEST}.. {338950800 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 E
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):111
                                                            Entropy (8bit):4.924838898127838
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yLbNMXGm2OHLVva0v:SlSWB9eg/ylDm2OHLVi0v
                                                            MD5:B221E7141FFC9DEA317F64F81C7BB4E0
                                                            SHA1:B13BBDE790B169D8B9075275523F319D5173E2C7
                                                            SHA-256:6344BE02529C1CC5F7B5FE14B7E9BBCED4DDE68A24B824601EEBCAE207ABFDF2
                                                            SHA-512:FFFA733476D6C7DCF49C0B88C9F5E381DE2B69BAEDF6C7B1D91C6F45CE2D36E06D40F25B6BB65D4B5D650471BB52CD2EC3F68703DAB4BD5414F8D3F831D92BD2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST) {.. {-9223372036854775808 -18000 0 EST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8505
                                                            Entropy (8bit):3.8091719283634853
                                                            Encrypted:false
                                                            SSDEEP:96:R+kNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:RXoSItON0HY2iUmUFLqU
                                                            MD5:4578FE48781599B55F4BCF5560019789
                                                            SHA1:4EAA7134621DFDEBFD1405F5CC58227FA7E80C3A
                                                            SHA-256:0BE6161403BC5A96BFAB174F2C3FCBA8A677D4349699B408E9872B9DD0FE15CE
                                                            SHA-512:9ACC2EF396F635D22E3DF6B785831AD74B510049F1BE85F996467A5BBC0DF49A28B2FC3E4CA0CA9DC8FC2C29EA50D909F0B153265B107445D3052E81D9A4D50A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST5EDT) {.. {-9223372036854775808 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-84387600 -14400 1 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):170
                                                            Entropy (8bit):4.862365884559795
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsPHV5XHAIgNGE7TRRL/yCh0DcPHy:SlSWB9vsM3y7fHAIgNTRN/yg0DH
                                                            MD5:ACD69F34396296BA553243267D06CEE0
                                                            SHA1:9575FFE5E7833B9532F17AC5413EA9DB23F07ECA
                                                            SHA-256:936B6484469351DEF8FAFE8EC180862729F5E43BDE4E53E2E9636E221B54C3C2
                                                            SHA-512:149D23FF35747127E9A2F4056D09472E8E689970BC795D5411C5BF621D949ADDEBDA68674D375A248A63106ABDFF6C54A8AFE5385C45BE2916CAED0C30F7C4A1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Cairo)]} {.. LoadTimeZoneFile Africa/Cairo..}..set TZData(:Egypt) $TZData(:Africa/Cairo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):172
                                                            Entropy (8bit):4.901791318009318
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV5QH+o3vXHAIgoq6QHFRRL/yMQs/h8QanQHuv:SlSWB9vsM3ymnQeoPHAIgonQzN/yM/hm
                                                            MD5:E9C2C97EB65526F1D4BE1AD7385336FA
                                                            SHA1:09E4000CE320F779E2DFCA2FFD6B9258FFBA6CE4
                                                            SHA-256:B78A833337EFEC8B5F64622F1BFDA21FCB79CF290E9CF32A54B206EB20C6FDE9
                                                            SHA-512:EAEC097B58BF466CC7D6C0C6297628AF910CC308AC822565FD6CDABF96CD4EC57D4CC724FE782B6C1B606DFF9424013F6A890A871339577F7CB68BBB3C425E65
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Dublin)]} {.. LoadTimeZoneFile Europe/Dublin..}..set TZData(:Eire) $TZData(:Europe/Dublin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):110
                                                            Entropy (8bit):4.928744204623185
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDMbNMXGm2OHvDwy:SlSWB9eg/yRQJDm2OHsy
                                                            MD5:9C08898081382F52CE681B592B8E2C8D
                                                            SHA1:165944424740B1FA9B4B3B8E622198ABD0BDA0F8
                                                            SHA-256:66B0DF8888883BFF44B18728B48CDF24AAED0BB745D601F3422C4F2D4063E0AC
                                                            SHA-512:86EA639F999169F2FBA2457BE5042463A1938031268CCA71FDD03CCBC6194932937BA58B49FBED461E055E9AA668FF6EBF391AA7EC603C0A425416DF2E6CC84D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT) {.. {-9223372036854775808 0 0 GMT}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):159
                                                            Entropy (8bit):4.910789466104329
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDOm7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRSw8RQy
                                                            MD5:333F2BFA92742A49BB88F11C7CD896A9
                                                            SHA1:BB5BEC010C36427AEEBDDA2FB72083E22A3F5073
                                                            SHA-256:64466EA3759301E88C29AD1A833CDCBBC495EB4A5A3AC45E7B2987FECD6702BD
                                                            SHA-512:E2270F4B57C5F1C849726259B886E8644DCF497FA0D034AD48885146BEDC70DC8899900DA9AC01F2609A2DA881E10F9042CCBF75A3F5DA7344D7E92F1B070806
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT+0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.980500771169276
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOveyXMXGm2OH1VOwVn:SlSWB9eg/yRSvPDm2OH1VOwV
                                                            MD5:A7C3FD06D1E06F125813C9687C42067C
                                                            SHA1:515622C0B63E977AFBFC78AD8466053C4A4A71A6
                                                            SHA-256:3BE1EC71D2CC88FA9A3DB7DC0476475F33FE5BCBE6BC35C0F083859766466C32
                                                            SHA-512:548DA608CFCA5B8539652F94CA2040D624602D2DF64B2C8CCDB8B219B9B384E01386CDF95F3BF77409DF0584FA12A3B73D56D13107D98BEB4C2555F458B3F374
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+1) {.. {-9223372036854775808 -3600 0 -01}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):118
                                                            Entropy (8bit):4.965033464829338
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOPFNMXGm2OH1VYU7vV:SlSWB9eg/yRSPXDm2OH1VYW9
                                                            MD5:FF71149E56D4CB553D0ED949B5F4C122
                                                            SHA1:3459B47E0EEC80D7A29512CA4F3F236C89E86573
                                                            SHA-256:E61E826E6FBC2396EF152640698098F4477D4FFDFE5F791F62250C3EC5865304
                                                            SHA-512:43B0CC8BD7F1EFC80C3F14F115D651EADD5743B17B854C2FB7AC25995138D3DF8792915C2952B80F35784A7115F8FB335ACE171479B24C668190AC175523DB21
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+10) {.. {-9223372036854775808 -36000 0 -10}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):118
                                                            Entropy (8bit):5.002239901486653
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOeJMXGm2OHaBByVn:SlSWB9eg/yRSsDm2OHa7yV
                                                            MD5:08AABA917A8D6B3BB3D0DD1637F5ABFC
                                                            SHA1:D1D704F0250D4CBD450922A02D021E0000FBF5CF
                                                            SHA-256:143528946275DDC8B894218D3F1BE56C950F740828CEC13166C3D7E8E1B6BB7E
                                                            SHA-512:F37AE54864A613C830308CB94AB7CEA9534A86A53B52B4A2C28CEEFE6F5BC0518143AAFD77A6DA5EC55D392F5BD34FCD4B5BE51794B1A386ED783B9BA89C10C3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+11) {.. {-9223372036854775808 -39600 0 -11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):118
                                                            Entropy (8bit):4.97889339723103
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDONdNMXGm2OH3FNyUFFv:SlSWB9eg/yRSNDm2OH3XyMv
                                                            MD5:7374B66D6E883D7581E9561C3815EB92
                                                            SHA1:235E96A7420DF6733F3CA368D4A2D57766656043
                                                            SHA-256:A93EAFAC2C1089C608C8536127D0E8B53D8C7CFD13AE7DD69339E12A89F803C6
                                                            SHA-512:9BA59B17F20D65DFF1A5A2D557B535F69B04C172AECB15F88CA3484D74CC7D53894985C08653CF13D868BCBD5E7E5041E0CB2F457B5B603F3851198E552E33A7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+12) {.. {-9223372036854775808 -43200 0 -12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.922268982357521
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOcF3vFNMXGm2OHnFQVIyV:SlSWB9eg/yRS0fXDm2OHnFQVb
                                                            MD5:FDDC663E40F8FFFE27959E94625725DF
                                                            SHA1:EE3FBC1F6C8BBCF1BDC9E5DB4D2EA1A57E2E9BB3
                                                            SHA-256:AD5833153446960BDE0653A22AE2111BF80CFD61C3010993CE87B81D40C75C72
                                                            SHA-512:A1B2A153834FEAD7DC27C0918E1B1CB905671F82850C1CAAEBD89F5535703FB259F02F699EA7F82F3044E37668EE93DFA4D4EB862CD437AFF0DABA84867B1963
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+2) {.. {-9223372036854775808 -7200 0 -02}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.949132511023475
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOFfMXGm2OHBFVGAvFv:SlSWB9eg/yRSlDm2OHBFAKV
                                                            MD5:5C6F16F2CFD46030688066F9BFBE675D
                                                            SHA1:1DB5F36584822EB92E75B9AC9F440FD671BD90AE
                                                            SHA-256:C7BEE4C71905EDDB40BAF42C0CD0DC70BB9F298EAAB8B9367D484B8431DD084A
                                                            SHA-512:FFB2C4CD8EA7DE165C3D989454898FF2023D1A1E3B2B34EC23B1B71EFA7BF2538488DA0069E59F1152B8933D2263B762D2D7C56ADBED826C33FC0BA6672E34DB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+3) {.. {-9223372036854775808 -10800 0 -03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.971627677226461
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOqJMXGm2OHBvGQy:SlSWB9eg/yRSQDm2OHBON
                                                            MD5:E35244C1A6084C7BC1D79E437677C55C
                                                            SHA1:898619DA4B8B9AC72E69C7BD30DEA2ADEF9440FE
                                                            SHA-256:26D1EF512CC5797FC63BA2B83C7D6271025F4D4F5C904D9FA8E97F053393D9A7
                                                            SHA-512:0687758558C4C5FF7802F3A57212694A1515761A8337D4B75FFE81434D2AD8A221B005DEC36BF013F2FC3DE1E46DFBED36352811EB7C5A5AE3A167A2E314F57C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+4) {.. {-9223372036854775808 -14400 0 -04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.956438091983076
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOJNMXGm2OHLVvyV6Aov:SlSWB9eg/yRSDDm2OHLVKVg
                                                            MD5:7C560A0F3C42E399AC1247CB6C516DC6
                                                            SHA1:C314B09D4E369C69C23A8DC1FB066FD0CFDC7211
                                                            SHA-256:054910BDDFC44D9B806BBD3008C30547FA57ECD3C043418C406A725158144688
                                                            SHA-512:FCE8431B759BD5359847734FD98D9D91394916235B2AF587FC927D5F3196FB283E241A6A9200EA852F9265ECEF81402FF6ACD0FA3A4AAEF6DF9DB1B056B3A9EF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+5) {.. {-9223372036854775808 -18000 0 -05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.974743300958087
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOAkSMXGm2OHvTmULyn:SlSWB9eg/yRSbSDm2OHviX
                                                            MD5:EEB1A3E0FD3339E332587D19C116D4EF
                                                            SHA1:5DBF046031CD354B1EF88E46D3FED74706D21AC6
                                                            SHA-256:D53BB247E0E429A6243AB9A9BDCAE1EE1CF5F271D79748A843631906AB63A988
                                                            SHA-512:07BDF9056DC335C773684E634B1D389FBD139464D4597DE862B7EAC096676A093934682BF911F4E68F299789931218C0E431F0CC6BEBD7275B5FC8015EDD0942
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+6) {.. {-9223372036854775808 -21600 0 -06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.930134062078826
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDONeyFNMXGm2OHrXVYVny:SlSWB9eg/yRSNPDm2OHriVy
                                                            MD5:F92B31548D6BF8CCFA326C0CA6E205A0
                                                            SHA1:3FFC6C214EDBCBE9C2509306CE73B429113E1C8A
                                                            SHA-256:6BA5779E35D581B409F53B14B6E28ECC16F536FFEDD45DDBC8DAE4B8C28F66E7
                                                            SHA-512:317872E986099D02AF083397AE936854043D54CEBF45A70672F02DDC9E2F3B27BC3FA80902F9675131C51A09BBD3C2BD1CD437330935CEA113C643769E0DF20C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+7) {.. {-9223372036854775808 -25200 0 -07}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.915798027862021
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDOOF3vXMXGm2OHmFvGpn:SlSWB9eg/yRSqfXDm2OHaOp
                                                            MD5:B31B15E6006F8DF0D7627D6C90FF39AF
                                                            SHA1:7C4137BE11DA84771DF6DC5EBC32D5E5E87E060F
                                                            SHA-256:CA87559B154B165E83482AEE3D753BA8E38ABCA347A005E8504C566433CF4CB3
                                                            SHA-512:220F7E7379EABBC8ACD7ADBB7A4AC8E93E4B268F8F1C0965B7E6A09735EE86E293EF1C492990331EEB4176B8301A91EC20579756B962AE45C858A96C09349CCD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+8) {.. {-9223372036854775808 -28800 0 -08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.95764928386407
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDO3fMXGm2OHNms:SlSWB9eg/yRSPDm2OHNms
                                                            MD5:5B10173EB7119F1219250763504A3526
                                                            SHA1:A845021437C4638079040EF27AEF163C865FF8F8
                                                            SHA-256:A0987A1D078B0993FB3B07208E3F4538A2319DCDDDEB2FAEA32FC463DEAFB8DB
                                                            SHA-512:D213285D0A723B7771263122AFA269C2ABD0325A97D32C3870341255C06597DD6851C22860CFF42BF54E3FF5A36FC88C306F3BF1C69E7BD7FD7F69FE7601ED1A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+9) {.. {-9223372036854775808 -32400 0 -09}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):159
                                                            Entropy (8bit):4.898210849752128
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDIyHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRUyJ8RQy
                                                            MD5:5AFB7F12BA056619252D48904523DFA9
                                                            SHA1:CD6E6681C8302BF38095975DF556BD14959FDAC8
                                                            SHA-256:EFF27B3DEE9306641FF344801E06BB33FF768CDCCFE2409FA8AF752FF6D39F66
                                                            SHA-512:2869BB347F42667A3D174816466B15916FC61FCB5A6A1BE1DD750C5C1751602FEE0FE5A27651B7A19C9F6764872DD0F00D3D5AA16CA1A743DBA09646D25A4EB2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT-0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):115
                                                            Entropy (8bit):4.979902281541545
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDI/fMXGm2OHMKUrn:SlSWB9eg/yRUXDm2OHtUr
                                                            MD5:4000096844091488200125FC8F50E2F5
                                                            SHA1:9FFEAE66405CFB254180C7DBE185288791DFEE5F
                                                            SHA-256:B4BF883FBE9246EF4079179A746B1F9E59F2C77D4F598794B60732D198DC6044
                                                            SHA-512:25C69E04018C2978A2E5748F0D3C61157453D998C16FA4B3C257A6515B87F5FD2B754893B47604BBC60AB60B60BA162BF2D1463E616E72CB8713C736F1B4D428
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-1) {.. {-9223372036854775808 3600 0 +01}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.964101313797091
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDINFeyFNMXGm2OHMUUMy:SlSWB9eg/yRUN5XDm2OHXFy
                                                            MD5:AE6601FACF6BE1E68083F8D353901181
                                                            SHA1:8B3BFA307D2A94BADD3A1A5E42545D6F7C620BCE
                                                            SHA-256:EF3046D7789CAE069B5473D053F3EF0157248F8A359A1282EE02BA613A75FC94
                                                            SHA-512:1859E6A2CB94EFEE7CD5C17803AA4F2DEEBE4DCF43D3B1EA737DF00BA86ECEC79D296D75E69D5829DECB48380B6B650724104FFA7959FD18FE032DF7D002A88B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-10) {.. {-9223372036854775808 36000 0 +10}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):5.00162575418652
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIVSMXGm2OHlVVtyn:SlSWB9eg/yRUVSDm2OHlVLy
                                                            MD5:D864BA451C9E441BF47D233626C57B99
                                                            SHA1:6C38E6F8BA292575C496124572D187F97C9F8E73
                                                            SHA-256:CCDEADBD18BE81E59A669A460A14AFCBFF733C3A5D164FC2B6B93DEAF009B78A
                                                            SHA-512:5C16BD1189F3FE6789CB3630C841FD168EC87D0498EE6FCC4C8D635F8CF4BCAF0558B44F859C37E418F6BC5A7F6693D6EF1DD218A1DB6DA2D54FF55916685119
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-11) {.. {-9223372036854775808 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.978079707159482
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIjbNMXGm2OHwvv0UIoAov:SlSWB9eg/yRUjJDm2OHwvv0YAov
                                                            MD5:C3E7748C7CB9D8A7F7FA5170D5098983
                                                            SHA1:54F5374A32173BEC6EDA430745DCD18749ABC233
                                                            SHA-256:23B61B18C653E25F7245B0BB6E04AD347E038585B145962FD1EEACE26F118D54
                                                            SHA-512:4783A7CD4C94CCC67C1C71F9C5D9CD99A3918EA4792D8CE2443ACE8F034B9023EBC02405B5DEAB919AA35FD1FD29D8980774316AC96D32ECDEBEFA15BBE6878D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-12) {.. {-9223372036854775808 43200 0 +12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.994320173226919
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIaMXGm2OH1dNv7Dy:SlSWB9eg/yRUaDm2OHty
                                                            MD5:224AAAA8A31C283F50149A090E3970D5
                                                            SHA1:E7E4876EC2474FEFD82D4B174CA8E3A3427062F5
                                                            SHA-256:A9F1AD5A7CB5ED43C5E6E8A7A9B887329890ABB75B9FC9483B8543A367457EBE
                                                            SHA-512:6EE0C6F519AAB2DAA3F7D802F0F838BA9F6BF1D56530000D3C9EA4FDA81DCB9832A3285E36208F29EEB23C27EC5BFD3438DC272929A7531268B7C0626A65D6A5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-13) {.. {-9223372036854775808 46800 0 +13}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):117
                                                            Entropy (8bit):4.9895752453470585
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIxhfMXGm2OH0FVtXvFv:SlSWB9eg/yRUxJDm2OH8jNv
                                                            MD5:8ADF71739DCADE63433B7BF8321EAC77
                                                            SHA1:AA6BDE83FF0D8BCFDE0426160250F2D17D3AF81D
                                                            SHA-256:A37A7160027BD38356764C4D1AA5B9B17F8D5DC3CFB81EF2ED399E44C41734CE
                                                            SHA-512:AEE3929DE269ADB5265A54841F041E41595359C101539F6309A4E737E3F5DF0BC91560781C7118975398C29A084113682C78F66E07E2E4AC5EAC8DFC33C4F0ED
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-14) {.. {-9223372036854775808 50400 0 +14}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):115
                                                            Entropy (8bit):4.921164129348819
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDInWNMXGm2OH/VXF9:SlSWB9eg/yRUnSDm2OH/Vb
                                                            MD5:CABB864F4E76B90928F5C54CD9334DEB
                                                            SHA1:4818D47F83F16B9F7612D1E979B2440C170ECDB9
                                                            SHA-256:7211BF8329B2388563ED8FA8C5140099A171B8A303A9473E9A6F3AF0C5D239CB
                                                            SHA-512:1FDCB05D675F1D28CB52B9F5EAC7EC52FDF2CE7E7411740A6F8FB5E9D443ED636CE268E3AF9E08605CC3E13A49B2D86FF4EA6A85F518D5C79E263BA94263361D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-2) {.. {-9223372036854775808 7200 0 +02}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.948161547682094
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIYyXMXGm2OHkNsWYcv:SlSWB9eg/yRUlDm2OHkKWYe
                                                            MD5:4AE5F29A13A86E4A7064E9200668E43B
                                                            SHA1:2460BD1BB0FF3A3C774A5C7CC3DA10235DA06B0D
                                                            SHA-256:BFC86D65B0B94725DCE4C88EDC4300141ABBCA4B6CDECF037C437DF49F0C1D6A
                                                            SHA-512:190DC38B4A20F964C967866507086317D85D979DFCFA415D1569C485C6476024922BC6E7103273C41889D9D7B22E97933F286FCF4D341248077C1BA777D0EE3B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-3) {.. {-9223372036854775808 10800 0 +03}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.970850637731657
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIQXMXGm2OHkVsRYovV:SlSWB9eg/yRUQXDm2OHkSN
                                                            MD5:BBAF760E27C02D176A675AC3CF2D1E6D
                                                            SHA1:E524FAA7D424A1C1545D1D8EC00169125A68E8E5
                                                            SHA-256:02E2EEAF88EE179EF63DD29ACC7384A4B46DE1E3A151C1F3A5DD31BBB5A05AEE
                                                            SHA-512:6AC7CC0E52E7793C7F2D3DDA9551709DEAE654C1182EAD7108D04F1BAAAB7E1C473B6E8A3A126B0E421D8A246294A03B2EE9E070330924502DF2869CC61C37F7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-4) {.. {-9223372036854775808 14400 0 +04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.955530107787899
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDI7tNMXGm2OHM0VQVFv:SlSWB9eg/yRU7PDm2OHnVQVV
                                                            MD5:17F64A5969D3755211E60C0A9F83974F
                                                            SHA1:FEFA84725EFAE6405F43797296C342B974F2D272
                                                            SHA-256:3A2C75DCA11D1167126F0D44A8682420FAF75B0B82B3DCFC35A9F028A9A759E8
                                                            SHA-512:77DBCD8284A470E4869976E2E8A5EDE28104283F120C863785A6B2E64CF87E06243196817C0055A9B32D6FFFE94A25772F67D58BF8E885F7EC06C34FABE38766
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-5) {.. {-9223372036854775808 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.973993120288556
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIg3fMXGm2OHETNSTVVn:SlSWB9eg/yRUgPDm2OHETMX
                                                            MD5:51CAF7956E133C8A9788AE0B8C6145AB
                                                            SHA1:47F8B49DF9ED477BD95F908693A483AE4FDE881F
                                                            SHA-256:D22C87321373EC0EFB0F312925476CD0747323EF303E17621A871BF814C8ABB1
                                                            SHA-512:EC4B4BE74C1BA64DEC8EF11DAAA338C52BD67D55E8A2352FBC6C83FA142F8DBE424CC1110E9A9D9A891E1E858D1FFA6D1E3B997D41BBB374556FA1F9A708559E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-6) {.. {-9223372036854775808 21600 0 +06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.928999319005163
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIpdNMXGm2OHAXUVSYovV:SlSWB9eg/yRURDm2OHAXUVSYyV
                                                            MD5:56D88B54CA33B43E2E7D3EA6AD3A4D6E
                                                            SHA1:9351E0C001C5D83325281AF54363D76D65548B7D
                                                            SHA-256:70CB3A766A2E84148B68613D68687D263D3592ED4B6E672797FB20801ECA8231
                                                            SHA-512:32B58AD16F64590903C7AB49BA4890DAF6F1F3D33187A7654D3DA88A1C0047483EAA58B2498D824A30116E235FCC8F8FB3FADD57F86396240E5D92B2CA337027
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-7) {.. {-9223372036854775808 25200 0 +07}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.9145396982864895
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIlSMXGm2OHN/VsdYLyn:SlSWB9eg/yRUlSDm2OHUp
                                                            MD5:E462AD5E0C046EA6769EDB4B2C80F4D4
                                                            SHA1:6DDB94485648622875E0927BA1E8CFE67CEC1382
                                                            SHA-256:80C85D59416CEC91DB3DAC5FDD2FD7B91D6FC74A37BBBEF6FF58F6F6816E8FC9
                                                            SHA-512:42734FD2DA8BD6E0BC271FF1375A31DEB72EED85AB5EA6E1E0F81EE4E3E7E74380FFC98FAC30409684F736DB580AAAF4F62DB4757AA35C10383584F6144EF363
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-8) {.. {-9223372036854775808 28800 0 +08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):116
                                                            Entropy (8bit):4.956751740978211
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRDIeyXMXGm2OHENScFAy:SlSWB9eg/yRUPDm2OHsScr
                                                            MD5:98F70EC1B1AC7D38CB8D01705FB0CA56
                                                            SHA1:EDAFA132E48935ACEB8E72D3FF463E4FC857C1A9
                                                            SHA-256:57395BB968AFA5A041EADA4B684B82F0379A9333F9522D69F069A79FDEA2B8D7
                                                            SHA-512:97B8D7603D6B54C075B005B905B2A7A28B8BEA67894F055663C44D2BF730BB937AC8EF5B2DF182BDD2D9EFFDBD135DF9467C813AEE39AA6B34256908A12DC011
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-9) {.. {-9223372036854775808 32400 0 +09}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):158
                                                            Entropy (8bit):4.886484135647838
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDVMFHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRC1p8RQy
                                                            MD5:F879FB24EA976394B8F4FAF1A9BF268C
                                                            SHA1:903714237EBD395A27EAF00B3DAAA89131267EE5
                                                            SHA-256:AB742F93BE44BD68AB8FE84505FA28120F1808765D9BAED32A3490AF7C83D35B
                                                            SHA-512:F5EE4C331E37036516F2A1BF12F2E088B2E2C7F6475127BF4E7B4937F864550D64D570BC855B6058D4311755E8696EC42095A36AEF13BB29E62192EE0AFB6EAF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):163
                                                            Entropy (8bit):4.911342539638601
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRp+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRp6BURQy
                                                            MD5:CDD2DE9CF0FECFEA0CDD32DAC32DCDE2
                                                            SHA1:311CD4C6E819E18BAAACC382F81359BC208E2F73
                                                            SHA-256:F89167B6117838D9679C0397496B6D96D3A7BEAEF0BD99406ABACDBDB658FBCC
                                                            SHA-512:1AF061D07D2F579A089905B6B259AABD7C58F4FA0CD379EE54206164F0DCAEA5C720FB1F5E76F5782F8613E62D8F83BD55F1848D5D7A73D4A5C9F7BC6B9F5DB1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/Greenwich) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):157
                                                            Entropy (8bit):4.838936002050477
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRKh8RFB:SlSWB9vsM3yzTHAIgm6N/yR68RX
                                                            MD5:0587EB7D1B1C684A4A0F90D3CB0959C8
                                                            SHA1:3F2840AE512774494D9A0B6357C52CCB7DBA5265
                                                            SHA-256:0856D14DBBC53D46460BCD530BD070E9E8966D1C96BA01BA556E215A98C09CD4
                                                            SHA-512:DE38EF28893853219AC24AE4A522307ADAA1502F6D0C129219FAD9D75CFCE03A505C3E0758CFF2D2D4F7101414A5F7E4FC1C1B119B667E6A9C89B60DDA641E86
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/UCT) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):110
                                                            Entropy (8bit):4.903699772785336
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/yRF3yFNMXGm2OHvL:SlSWB9eg/yR9SDm2OHj
                                                            MD5:3D3F94B6AC5FA232E509356C703D9177
                                                            SHA1:502B8EE9D4A1EA75A91272181AC87B9B6ECE1F84
                                                            SHA-256:4D74D9EC2397B1708FEF47806294B0BCA26679F3A63149AE24E4E0C641976970
                                                            SHA-512:205A761A01C577F602236CB5C9938C834B7F3F9F681B94036B0A86101119893EF87D206D0C3F7737075ED833D4E35E374ACAE6605163E9C37B705D99BEBC928C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/UTC) {.. {-9223372036854775808 0 0 UTC}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):163
                                                            Entropy (8bit):4.874807282103623
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRYzXDJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/yRY7VMr8RX
                                                            MD5:65E28EFF342B625E79175793FD38F9FD
                                                            SHA1:08B11474822E670DEAB8F0EA168BAED7D5E3DBE1
                                                            SHA-256:A2B62C5914DE169A68A018A5B47C1253DBCA10A251862D17B0781ECFD19B6192
                                                            SHA-512:79641D0E05F81BFB80034937D34E74B7483A790F33C1F9A0FA92C6A7913AC8C03036CFDEFB43850B84EFB3DD3C4A39022DC8F22E5B5DE6353586A546E03A5789
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Universal) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):158
                                                            Entropy (8bit):4.874356623237119
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRaQEBURFB:SlSWB9vsM3yzTHAIgm6N/yRYaRX
                                                            MD5:EDABCAC858EC9632D5D8DCCFB28F4D6E
                                                            SHA1:E5BEF1367A97A1900749CE6B1E01CF32F582BDD9
                                                            SHA-256:BBD6E93206FF3B7017AFBE63905B4C932C422B582F3CE2A79A7B885D390EE555
                                                            SHA-512:3A22364D423F2F970123561408018A2B72F43C4978836D3B6DF7517217445605838DCB8DDBDA204FD01C49A4A7D5ADAD4CA8BDA7C3B412D54750BAEAA589B683
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Zulu) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.892809684252761
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/So3vXHAIgoq82yHRL/yQaiFAXowQahCv:SlSWB9vsM3ymhS2HAIgoh26N/ywAXoww
                                                            MD5:B0B409D665190569A56697799FBA5CD3
                                                            SHA1:840AA7D61E64ACE61FDDAB96F716575A61CEDB52
                                                            SHA-256:46141E7BC0F99D2117319C661569F8B38AF7D00108CED5784FA3A3B5090EF8E9
                                                            SHA-512:D7C0588D98AC46B5191D7C7E8F5181E94306EFFCC9E3F2DBA9E0003BAE51D992334527ADDD6D0C9701CFD60169A74984B3401E7A6A1322A734BC3D90DCC933BC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Brussels)]} {.. LoadTimeZoneFile Europe/Brussels..}..set TZData(:Europe/Amsterdam) $TZData(:Europe/Brussels)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6927
                                                            Entropy (8bit):3.8182041031531897
                                                            Encrypted:false
                                                            SSDEEP:96:CA34elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:CI41sFpM5vwA6Efv03TBZLl
                                                            MD5:D897DCA686A03495EB2C3323FAB0BEAD
                                                            SHA1:1433BC303DE92F7B36F881C8595A42B35E0814FC
                                                            SHA-256:F0B48DA7CA3659450D87CC0DDFDDFD28B464543DF1EE40D935C44D5CD7C9B9B3
                                                            SHA-512:A1C4AE1E0EC26B159B0F5D058A7A77B8774F611A4D3C6AECEDD7186957D6BD9F15CDFCBA248FCC8A4B4146BD72CD7D66B9F88A2BF7CDEF416F1831A2F335D48C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Andorra) {.. {-9223372036854775808 364 0 LMT}.. {-2177453164 0 0 WET}.. {-733881600 3600 0 CET}.. {481078800 7200 0 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0 CET}.. {733280400 7200 1 CEST}.. {749005200 3600 0 CET}.. {764730000 7200 1 CEST}.. {780454800 3600 0 CET}.. {796179600 7200 1 CEST}.. {811904400 3600 0 CET}.. {828234000 7200 1 CEST}.. {846378000 3600 0 CET}.. {859683600 7200 1 CEST}.. {877827600 3600 0 CET}.. {891133200 7200 1 CEST}.. {909277200 3600 0 CET}.. {922582800 7200 1 CEST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2063
                                                            Entropy (8bit):3.679377249443024
                                                            Encrypted:false
                                                            SSDEEP:48:TvCAs6kKR6aQmF1cSNWrI+AjXgV/Ap40FjDOP:rCAs6kC6aZF1cSN4I+AjXgV/ApDFjDM
                                                            MD5:CB860328FA96A14055BF51A3B2D35A08
                                                            SHA1:CFA49DC861F4AC3D29A78D63D71C2D6D83D68F84
                                                            SHA-256:4B5FB0AF225974D117374028285F20A02B833FF4136E6BFAE7B65E6D6D28829E
                                                            SHA-512:960152826F4245012462E53F80B69B0C45C27D75D46C70D485674CA19071DF268671C7691B614BE53B9E7BD8CFEC5D24F3DCF933F2F14D827F2A32EB347D7540
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Astrakhan) {.. {-9223372036854775808 11532 0 LMT}.. {-1441249932 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7954
                                                            Entropy (8bit):3.7252594544513795
                                                            Encrypted:false
                                                            SSDEEP:96:1D/8QdzFu+f+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:Z/8ohvyDjivBeRF+W35Syrwl9h5j
                                                            MD5:8B2C99E1CD04D7559709FDF8D382343C
                                                            SHA1:C595D5159C742B815AF89EC8604376E01291F9F1
                                                            SHA-256:47353319419505AAB205C23F8C97EA0B12E5DED2113147794F77B67349AFF52F
                                                            SHA-512:227CA21A3B6160357988582E261A62AE7B09D46D479EABFAC8039185D710EFA765CD1694F4388EBF8800978A1E1DB69F6AF9BB9BF82C0FCD66E883930E1F8249
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Athens) {.. {-9223372036854775808 5692 0 LMT}.. {-2344642492 5692 0 AMT}.. {-1686101632 7200 0 EET}.. {-1182996000 10800 1 EEST}.. {-1178161200 7200 0 EET}.. {-906861600 10800 1 EEST}.. {-904878000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844477200 7200 1 CEST}.. {-828237600 3600 0 CET}.. {-812422800 7200 0 EET}.. {-552362400 10800 1 EEST}.. {-541652400 7200 0 EET}.. {166485600 10800 1 EEST}.. {186184800 7200 0 EET}.. {198028800 10800 1 EEST}.. {213753600 7200 0 EET}.. {228873600 10800 1 EEST}.. {244080000 7200 0 EET}.. {260323200 10800 1 EEST}.. {275446800 7200 0 EET}.. {291798000 10800 1 EEST}.. {307407600 7200 0 EET}.. {323388000 10800 1 EEST}.. {338936400 7200 0 EET}.. {347148000 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.876296755647751
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQahs3QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/y72
                                                            MD5:7160C6EE32380846653F016AE8AFD52A
                                                            SHA1:DE7805089639C54893F2107FA67342DA72A79BBC
                                                            SHA-256:557023674F6E8376707517103EE69C1DEBBE53CDD4BCAB11E763CC53B9CB1908
                                                            SHA-512:FDBDECBBDB0C419226E2604608FD2923CFB06E4B6948493208FD83FD796880E81F6147C0FAFEB572079C9C916831B7B055620EC939164CCA1DAF76897BE60F2C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Belfast) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7309
                                                            Entropy (8bit):3.8204712502914653
                                                            Encrypted:false
                                                            SSDEEP:96:lp+/4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:lY41sFpM5vwA6Efv03TBZLl
                                                            MD5:02A003411B61A311896A6407B622152A
                                                            SHA1:3B8BC6D1AF698CE7BB14A08307F5A4295EB8ED03
                                                            SHA-256:74B225511B518B0CED972CBB33D694697712CCB96A6D81E0F50ADA28CF6E2C92
                                                            SHA-512:9E03B3EB1E528E5B1ADBA09F808E73BF9C4314EDCBF6F96E46844D51A5F425BED3EE8FD5BA8706C46A7FB9882485F119F81996F2EAB7E1E9B598978C402DDE0F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Belgrade) {.. {-9223372036854775808 4920 0 LMT}.. {-2713915320 3600 0 CET}.. {-905824800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-777942000 7200 1 CEST}.. {-766623600 3600 0 CET}.. {407199600 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 360
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8020
                                                            Entropy (8bit):3.820756136386754
                                                            Encrypted:false
                                                            SSDEEP:96:Pi9+qFR274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:PQs41sFpM5vwA6Efv03TBZLl
                                                            MD5:84027C3C8315BD479B38DE11F38E873F
                                                            SHA1:6E92A2A9734A9C6B02ECCD99F114D667C909C5BA
                                                            SHA-256:7E7111F06288069B52A4E1CA0B016216DF9328FB3B1560A740146497CCDD4D24
                                                            SHA-512:5FFDE523021FC0C490261F55999204C9CE6C8C274888525EA6EE7C01BC5CCABC7A3877FD454B4167D81F4B89BACB087E8BA6AB0BAC46C2874ED9257BE2092340
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Berlin) {.. {-9223372036854775808 3208 0 LMT}.. {-2422054408 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-776559600 10800 0 CEMT}.. {-765936000 7200 1 CEST}.. {-761180400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717631200 7200 1 CEST}.. {-714610800 10800 1 CEMT}.. {-710380800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.943205109348136
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVtXrAeovXHAIgoquXrsY6RL/yQahcvEB5yQazXrH:SlSWB9vsM3ymzbAeSHAIgozbsY6N/y7c
                                                            MD5:C69AB60BE74D4BB7E31BE4E5ECCD8FD2
                                                            SHA1:9DD0BA6171080F074858EF88ADA2E91C1F465619
                                                            SHA-256:1D7C539AAA1E3AD5EF3574A629523B5B781F1A91D352C9B39B8DE7316756026E
                                                            SHA-512:C273B97CCFB5F328EB7A13CCA3126DE8D91B3876CBD248990C0BE063DDBE5B0F31EA138E31A1C5C43B1ABCF42EA511448E6DC589EB99E8172D7C2A68BA31A8E7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Prague)]} {.. LoadTimeZoneFile Europe/Prague..}..set TZData(:Europe/Bratislava) $TZData(:Europe/Prague)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9223
                                                            Entropy (8bit):3.8450929464870804
                                                            Encrypted:false
                                                            SSDEEP:96:RhcSQnG1Czyc1+FdDKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcM:Rh8zyc4Ss41sFpM5vwA6Efv03TBZLl
                                                            MD5:E6C1153C3F71C8C005D7A46DDF6461FB
                                                            SHA1:CBDF7D5D36AF57D83859C910B493464617EC9571
                                                            SHA-256:1402A2072ADC9EBB35F4C0368D2E9A7A11493626C667C022614FFB7CC05B6CB6
                                                            SHA-512:8B1B47678F75DBE59DB08E034F0701BD11FF4FD3AD0304C8ABF45E848F717D2787B8E47558D3C334D369E0938C633DC217178D3EAE6486CEFBE25CF1668479F6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Brussels) {.. {-9223372036854775808 1050 0 LMT}.. {-2840141850 1050 0 BMT}.. {-2450995200 0 0 WET}.. {-1740355200 3600 0 CET}.. {-1693702800 7200 0 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1613826000 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585530000 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1473642000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301263200 0 0 WET}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7974
                                                            Entropy (8bit):3.7264631277913853
                                                            Encrypted:false
                                                            SSDEEP:96:vMSsQMAz5CXNU5paNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:vMS1kdUoivBeRF+W35Syrwl9h5j
                                                            MD5:88DB5686937D3499A8142413B2CF2EB5
                                                            SHA1:E37BAD2127553600D0E38A43053D1B07B2498DA8
                                                            SHA-256:C560D45104A8DD73FC7370B5AC1615E22043DBC93DFB46A9ECC6468C2D38B19A
                                                            SHA-512:375B8A63CFF2E278CD8C78BF9DBC86288FFB1AD57DAED00CD2199F0B05F4FBFA7D17D93C6458B20B86F6D05F3E3A49D594E60AC97DDB47141E21D7CDE10F8456
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Bucharest) {.. {-9223372036854775808 6264 0 LMT}.. {-2469404664 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {296604000 10800 1 EEST}.. {307486800 7200 0 EET}.. {323816400 10800 1 EEST}.. {338940000 7200 0 EET}.. {354672000 10800 0 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8287
                                                            Entropy (8bit):3.8244305880244567
                                                            Encrypted:false
                                                            SSDEEP:96:rHw0+D5xp4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:rQXj41sFpM5vwA6Efv03TBZLl
                                                            MD5:11468F958796F971ADD5FB1A0C426D78
                                                            SHA1:3FA58BEF391BCF7BAC6A124D093B6505B4EAC452
                                                            SHA-256:B58F3E9066B8B57EB037D509636AA67A06ACC8348BE6C48482D87CDC49844A4E
                                                            SHA-512:0492EABD6EE16392C00A196AF38995E5F9E55E30A82A50EFFB381DC978E9E63E801555CDC219869E6251BD51115972F742D8A7D9524372B8B11702AE4B28BFB7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Budapest) {.. {-9223372036854775808 4580 0 LMT}.. {-2498260580 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1640998800 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1600470000 7200 1 CEST}.. {-1587250800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555196400 3600 0 CET}.. {-906775200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-778471200 7200 1 CEST}.. {-762656400 3600 0 CET}.. {-749689200 7200 1 CEST}.. {-733276800 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-686185200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-492656400 7
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.952483060656419
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQahDZALMFB5h8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/y7D17/f
                                                            MD5:CED145F8D9B231234E021D2214C1064B
                                                            SHA1:7B111DC24CA01C78A382CECD3247CF495D71CD34
                                                            SHA-256:F511A80AB70FF93A0EB9F29293F73DF952B773BB33EB85D581E4FB1FE06E4F05
                                                            SHA-512:E2323C04BF99909ABA9A09A66F9B4696519B5F9FE3AF178FB04D5E0053F41CAA8B937DC4148954ED093D317F454E0547786BEC934F2ABF22A60AAA6A24E63BF9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Busingen) $TZData(:Europe/Zurich)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8096
                                                            Entropy (8bit):3.7635458172251406
                                                            Encrypted:false
                                                            SSDEEP:96:jXSsijEpkv2XkN8qc/OyEie8hF5WQ9VX/Zs1cw27oXqdCA5XqjqFLigTE9s5VpJ:jXS+WeUqKie8hF5f9PwdXM9
                                                            MD5:E7F52393523729CA3916768B3F3B4E55
                                                            SHA1:1524A3E610DCD33AC0006946BAB2929CA7F5A33F
                                                            SHA-256:2BD1C0AB412A5E9C97F533C4D06B773D045215B92568A4E89ADC93C7462D62EC
                                                            SHA-512:218674ECD9FD6C1A1C83EE69AFE6AA5AD0D5A8BB59FF497FDF2573B7CF52DAE98ECE0815CF99668CA4E172FF67D220B227369865076333B3EE802A8839C65279
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Chisinau) {.. {-9223372036854775808 6920 0 LMT}.. {-2840147720 6900 0 CMT}.. {-1637114100 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {-927165600 10800 1 EEST}.. {-898138800 7200 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-800154000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.925156646979837
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/y+YF3vXHAIgoq8yFRRL/yQagKVihh8Qahyuv:SlSWB9vsM3ymhVoPHAIgoh6N/yy87Fv
                                                            MD5:3AEDE4B340D0250D496C49CADBA04E62
                                                            SHA1:C466D8275C465752F5B024615268F6D1CBBA4B41
                                                            SHA-256:2B9A0F1775355E311FB63903E3829F98B5F6C73C08F1BECE1A2D471ACC2673E3
                                                            SHA-512:2B08B57D58699C65A9AAA43AC87F29DD1EDCBA9F91E79DF4B1E07832032F5B03A43847E20345484730E8D2323199E7439D8C1FC662E812E8BA6EE19C53C89681
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Berlin)]} {.. LoadTimeZoneFile Europe/Berlin..}..set TZData(:Europe/Copenhagen) $TZData(:Europe/Berlin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9810
                                                            Entropy (8bit):3.7678769652077873
                                                            Encrypted:false
                                                            SSDEEP:192:sExxHZiMU8EKTy74jT56XdEN1+UZBdMN186LPR:sEzZiMUZ6y0jT5bZHMN186LPR
                                                            MD5:E1EB426EA3351AF0D7D563006F9146BC
                                                            SHA1:1E94F3B38366FE43BB031A57D19894B569EBABED
                                                            SHA-256:895957521D6CA4DE7E4089DC587A6C177B803D8ADF63303B1F85DEB279726324
                                                            SHA-512:8F24E9519F5D42F34AEE5C52A94CAC7D035EAE7B31DC3E629C29CFE3BD85F1510188290D35CD327492A030168443FED8BD80EC57ED27811B786C4DC89B4B1181
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Dublin) {.. {-9223372036854775808 -1521 0 LMT}.. {-2821649679 -1521 0 DMT}.. {-1691962479 2079 1 IST}.. {-1680471279 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1517011200 0 0 IST}.. {-1507500000 3600 1 IST}.. {-1490565600 0 0 IST}.. {-1473631200 3600 1 IST}.. {-1460930400 0 0 IST}.. {-1442786400 3600 1 IST}.. {-1428876000 0 0 IST}.. {-1410732000 3600 1 IST}.. {-1396216800 0 0 IST}.. {-1379282400 3600 1 IST}.. {-1364767200 0 0 IST}.. {-1348437600 3600 1 IST}.. {-1333317600 0 0 IST}.. {-1315778400 3600 1 IST}.. {-1301263200 0 0 IST}.. {-1284328800 3600 1 IST}.. {-1269813600 0 0 IST}.. {-1253484000 3600 1 IST
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9509
                                                            Entropy (8bit):3.8837074152297704
                                                            Encrypted:false
                                                            SSDEEP:96:QTOKVA1oCobz0W4x2+ZE74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNA:QyoCvTZ641sFpM5vwA6Efv03TBZLl
                                                            MD5:D04F8EDDA1C3611692FB91E317CCADFE
                                                            SHA1:1C483FC95459EC6F1D5FE4DD275879A9EBCA1718
                                                            SHA-256:0524A31131405347C1D5D86C5EE38A2064AB055C030AB3B43F25DB3B28FFD8D2
                                                            SHA-512:4E2E18EBDE2765F2251B1FE41EF8E6AC79875617348974A28619F5E59EC0467239C682CCE8DEBD7A698BE2F00252C77D1F7FA50B6CAFF920B3BE53A0B836F815
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Gibraltar) {.. {-9223372036854775808 -1284 0 LMT}.. {-2821649916 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.879252060643389
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQakQAL/yQavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yYU
                                                            MD5:07AF23DA01CB963EA9E57534E34E7704
                                                            SHA1:1C4A214FF3B722E80C0ECACA0FFD5DFF302F6AE9
                                                            SHA-256:F7046808A8E80B7AE449D1A49AE3E480096736B7D3F554A240C7DFB10F82076A
                                                            SHA-512:713860D340C0EBA5EEF873ECB9B28CCDE9BFAD31B6A8626EF507E96585F5CC1091BF8D8A2DB7E5CB532E44F4561FBAE1797141724EF934755B69919FEA09A78A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Guernsey) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7368
                                                            Entropy (8bit):3.7258352536809705
                                                            Encrypted:false
                                                            SSDEEP:96:OsR0uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hzj:OkyDjivBeRF+W35Syrwl9h5j
                                                            MD5:7FF902B06FA79F14553670A70E77FF8C
                                                            SHA1:0105051541F38956EA6192BD0C7ED4047668005E
                                                            SHA-256:5B5C0A9261A414EA8DC34F594EE05BEE16F695488B230857D2B569A6B603BC39
                                                            SHA-512:551940199783A0FF9D73695B77B10300644F50E91D6B02FE79BB0CD4B78C7BA88CCE56F4B9408EC146361BF408F52D01A1F435183360C801EA5E219FB718247F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Helsinki) {.. {-9223372036854775808 5989 0 LMT}.. {-2890258789 5989 0 HMT}.. {-1535938789 7200 0 EET}.. {-875671200 10800 1 EEST}.. {-859773600 7200 0 EET}.. {354672000 10800 1 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {410220000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 EEST}.. {717555600 7200 0 EET}.. {733280400 10800 1 EEST}.. {749
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.914274131294981
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQaqpfioxp8QavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/ycS
                                                            MD5:F9A0F19FAF3131D8A70C50FF21B365B7
                                                            SHA1:7FC2B5302FAD06BC4C633CD22A80A7D40073FFF8
                                                            SHA-256:2F1151B0528A5325443379D4E7CCE32C00213722AD9DF764E1DC90198084B076
                                                            SHA-512:6D04DF4480FE132A6641C4BF7E01936E2E4A71A3A6C2AB9F7DA7A9D8A4B836BC66EE2BB597B8C318D07A06F72C05B07E6785B53308ED9BC1103AE6DBDD0FF24E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Isle_of_Man) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3683
                                                            Entropy (8bit):3.814835316757376
                                                            Encrypted:false
                                                            SSDEEP:48:Qi0p05zvSPBUUl0ZFzo4ay0CREDcxn6nH78BV0QbCgkCPviiM0H7hdli80+j7x9L:Qiq66OFEIFMssCfMsXV3heM2MRlA0
                                                            MD5:A8256656B971F58CB991BC270BF93B26
                                                            SHA1:189796E1B8E29A7A7B8B0E143DD9B44BAF217AB2
                                                            SHA-256:08061A80FC0F1EF375EEFE784EACDF0812E289FD67E8613BDEC36209985CA1D7
                                                            SHA-512:1F11308B5BAC1F3DB75CAC7322BBEA6E51C6B4A2A3450F1DB84DE6AA127F0F1BAA7DAB409FAF1288C100BDA77DA6FA1C6E3C0BA962F9406D1445D7C9E2AA3A60
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Istanbul) {.. {-9223372036854775808 6952 0 LMT}.. {-2840147752 7016 0 IMT}.. {-1869875816 7200 0 EET}.. {-1693706400 10800 1 EEST}.. {-1680490800 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1440208800 10800 1 EEST}.. {-1428030000 7200 0 EET}.. {-1409709600 10800 1 EEST}.. {-1396494000 7200 0 EET}.. {-931053600 10800 1 EEST}.. {-922676400 7200 0 EET}.. {-917834400 10800 1 EEST}.. {-892436400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-764737200 7200 0 EET}.. {-744343200 10800 1 EEST}.. {-733806000 7200 0 EET}.. {-716436000 10800 1 EEST}.. {-701924400 7200 0 EET}.. {-684986400 10800 1 EEST}.. {-670474800 7200 0 EET}.. {-654141600 10800 1 EEST}.. {-639025200 7200 0 EET}.. {-622087200 10800 1 EEST}.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.8801202136140915
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQap6cEBx/yQavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yzx
                                                            MD5:FE10770868A75F4F8D76C5E23D99AA81
                                                            SHA1:30AC768BA47AF7A53831F5142B58ECEC41933621
                                                            SHA-256:97EB33915ED7C9C34144F8F42357FAB2262B3CD45287F3CFFD26C33D65F7651E
                                                            SHA-512:1D82DF45AB0CCDFBFAD0431C668794996E01776800F34DD4131C5287D37291657A749D497AA5B0AB81CAFF3190896633FBFF456BFFEB7E93A3420AA841E54842
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Jersey) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2512
                                                            Entropy (8bit):3.941165221943348
                                                            Encrypted:false
                                                            SSDEEP:48:coNlj+X2uxhuHJkw0QqXknzaVV04v3TfdGY3kNmneVuNlh000sGpdh:coN9+1EpkwCXkSV3A8qc0
                                                            MD5:104CCB93300F40BAF8F4D7CC882EFC05
                                                            SHA1:EA83F3C3791BD6F083844939DC405B248E738FE3
                                                            SHA-256:2387D26DF5429DF9867F42F7D4F872DC146643B4B3CC57DA7298C18561DE8BFE
                                                            SHA-512:12724C5BBEE0835626A98B66BF55C3DF1311F07018C70D76FC5C50E7E7BA5C4A9F064D9EDC376CC3B06C4FFFECA3FAF5B66948615A03DFECA7C361E326D950EA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kaliningrad) {.. {-9223372036854775808 4920 0 LMT}.. {-2422056120 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780368400 7200 0 EET}.. {-778730400 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-749095200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):173
                                                            Entropy (8bit):4.970386708540243
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV2cvXHAIgoq1csFARL/yQaoM2EBUQaocqn:SlSWB9vsM3ym5HAIgoiAN/yOEBUC
                                                            MD5:74ACF46A3248341CFD84B1592F884A8F
                                                            SHA1:888FBB54381A1B5BC19E65AF38A1913635A8E7E4
                                                            SHA-256:05C55F87182F0D5D3E8E6C1F9164EDDBDB8035146A0955C04283BC1347D45B30
                                                            SHA-512:21A752390E023CBD582BC43865D43458B44B036299A2373948269196071742ED7EB6067DD9A288F3A15E808B452FE4192750FAE813F70738FAB0C866219D57CB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Kyiv)]} {.. LoadTimeZoneFile Europe/Kyiv..}..set TZData(:Europe/Kiev) $TZData(:Europe/Kyiv)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2029
                                                            Entropy (8bit):3.8660567822471537
                                                            Encrypted:false
                                                            SSDEEP:48:FFvCAs6kKR6aQmF1cSNWrI+7VmTeCTU50x0Y7:FhCAs6kC6aZF1cSN4I+7VmTeCTUax0Y7
                                                            MD5:98AF41BC0A39CB3A67286A7EAC4448B8
                                                            SHA1:436DF41B98766653FA6B687509D4DC099722AF66
                                                            SHA-256:71FBA6C221176ED891B3A7895A53A8FE669126A6904F05DBAE2B6CF2B2A01063
                                                            SHA-512:952B7DAB3241753A3958434BC265C3B6C2568054A73BBB19FCB289E8ABD70AC6C1A30380238FFC45598853CEF58E1466FECF652ABA6D79E24E73C44BC3E27B63
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kirov) {.. {-9223372036854775808 11928 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 MSD}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {654649200 10800 0 MSK}.. {670374000 14400 0 +04}.. {701820000 10800 0 MSD}.. {701823600 14400 1 MSD}.. {717548400 10800 0 MSK}.. {733273200 14400 1 MSD}.. {748998000 10800 0 MSK}.. {764722800 14400 1 MSD}.. {78044
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7455
                                                            Entropy (8bit):3.7624983280224953
                                                            Encrypted:false
                                                            SSDEEP:96:vC1LyEpkv8V3MpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb4:vC9VW0bivBeRF+W35Syrwl9h5j
                                                            MD5:F37C7529B53C4C158341AF90F80C3A11
                                                            SHA1:210650A882350D35C72A934749F276C58C572DFA
                                                            SHA-256:591264F69DB19DDCDC90E704525E2D3D3984117B710F482F19DA8F88628EE6A7
                                                            SHA-512:F23B0C5251EB7418A1C80344AB7623D2A0197E681E3B7D152E416187BF66DE09A7A60A65F8ED6A810272CF0C253D63684F08AF594A8C22ABEA89E3BBADC8F0A0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kyiv) {.. {-9223372036854775808 7324 0 LMT}.. {-2840148124 7324 0 KMT}.. {-1441159324 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-892522800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-825382800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {646786800 10800 1 EEST}.. {686102400 7200 0 EET}.. {701827200 10800 1 EEST}.. {7175
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9878
                                                            Entropy (8bit):3.8275310275285723
                                                            Encrypted:false
                                                            SSDEEP:192:j76abXsyZLEjx82YbtIaFF1w0us4qE3+sSGjT:j77bXsyZLEjx82atysLE3+sSGjT
                                                            MD5:0DA331C2A815739E6758797BD24554EA
                                                            SHA1:3829C441E908BEFDC4ED6AB65FD4ACD0C97D5E1B
                                                            SHA-256:9FAC9812411F88014779D34722F3E0D2750E45BF21595DF1AE14CB9CCFD3F33F
                                                            SHA-512:FEBBA05F64AC1F3066AF6351493DD89768154FD171D447503DAEDB90D16858BEDBCE4A74E24AC0C37B5FF191692AF44AADDE4A92E752F88C48DA646352AD9A0B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Lisbon) {.. {-9223372036854775808 -2205 0 LMT}.. {-2713908195 -2205 0 LMT}.. {-1830384000 0 0 WET}.. {-1689555600 3600 1 WEST}.. {-1677801600 0 0 WET}.. {-1667437200 3600 1 WEST}.. {-1647738000 0 0 WET}.. {-1635814800 3600 1 WEST}.. {-1616202000 0 0 WET}.. {-1604365200 3600 1 WEST}.. {-1584666000 0 0 WET}.. {-1572742800 3600 1 WEST}.. {-1553043600 0 0 WET}.. {-1541206800 3600 1 WEST}.. {-1521507600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1426813200 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1221440400 3600 1 WEST}.. {-1206925200 0 0 WET}.. {-1191200400 3600 1 WEST}.. {-1175475600 0 0 WET}.. {-1127696400 3600 1 WEST}.. {-1111971600 0 0 WET}.. {-1096851
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.948438246006353
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQavPSJ5Qahs0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNl
                                                            MD5:56C6C95484FEAF9BAF755683E7417B58
                                                            SHA1:A43176BEBC5B4D7144A7E1109E0AAEFD95C21EC6
                                                            SHA-256:713A842197516D618F2D86977262542A1CA334D7DF6026539FA2F2980DBF4CD3
                                                            SHA-512:566B6DF2D76A8A4D3405C4785C7A471A23D65CD8838831BD0DEDF5BF194E8A3B304CA9920CB4A8EC9D6CD60EAA9BE0335E38D9547A4D23C7E4E5E5A39A09DDAC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Ljubljana) $TZData(:Europe/Belgrade)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10211
                                                            Entropy (8bit):3.826887992237191
                                                            Encrypted:false
                                                            SSDEEP:192:GNoCvTZtcf80KYiK3BG0Myj9TYQOeMAwbccM0Fp:GNNTZtcf15iOBG08eNwbccM0Fp
                                                            MD5:0625C99E16D3C956DED1C0C0F867DEC3
                                                            SHA1:6ACDF0DB619B63E21EC89046B9320A85FBD3397A
                                                            SHA-256:D04C4E25DF4DE1C1CFE1EF84B3B6DD746CF08A271AB0958F22C7D580A3ED10E6
                                                            SHA-512:07AC42F0635DF01CC0AFD13F9668B143D4943BA0E4C377D254B5AF034D9DDBAB77BA813187E9AB73D2EEAD86EBAA26DC15599FD74FC82EEF287F5A6AB9C01635
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/London) {.. {-9223372036854775808 -75 0 LMT}.. {-3852662325 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):191
                                                            Entropy (8bit):4.920751023999728
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/So3vXHAIgoq82yHRL/yQavQLHKQX9J8QahCv:SlSWB9vsM3ymhS2HAIgoh26N/y1QzKQt
                                                            MD5:E4A8C25756D6C5D2073A51D2B54E3A0C
                                                            SHA1:4A24667ADC9BD31E8CB298BE3787C12301C3F1C8
                                                            SHA-256:8C0486A5B235E8B01069420976E1B8D08D77A4BEF587203AF1B68D7B5333546E
                                                            SHA-512:F3593C3B75C9DA931FB39BC2054EB9691C3A544A74F871425169C3244040D6D060510741FE1E352A1E59F53E5A585307D434A0D7C9D159D065717E78C807787C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Brussels)]} {.. LoadTimeZoneFile Europe/Brussels..}..set TZData(:Europe/Luxembourg) $TZData(:Europe/Brussels)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8517
                                                            Entropy (8bit):3.8326167134909177
                                                            Encrypted:false
                                                            SSDEEP:96:k5m01LdXKc0TJp+bwS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOn:+DaNVLSs41sFpM5vwA6Efv03TBZLl
                                                            MD5:63263380F57B756A1DFA3796E4188CD3
                                                            SHA1:8EEE707AC4FEA1C098C81AC2D289A46239121A5E
                                                            SHA-256:5337C9843C56DEEC6B91C4468C76EC1C896E80421B72B583B69DE5579063E09A
                                                            SHA-512:ACA4830020715C471741E27EB2292ACF002D2CD7EDCD1061978B64967EB447F61AA095F960D8A75A01B9B87558D83FF409F30BDACA83E063024F1E2381FA64C4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Madrid) {.. {-9223372036854775808 -884 0 LMT}.. {-2177452800 0 0 WET}.. {-1631926800 3600 1 WEST}.. {-1616889600 0 0 WET}.. {-1601168400 3600 1 WEST}.. {-1585353600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269820800 0 0 WET}.. {-1026954000 3600 1 WEST}.. {-1017619200 0 0 WET}.. {-1001898000 3600 1 WEST}.. {-999482400 7200 1 WEMT}.. {-986090400 3600 1 WEST}.. {-954115200 0 0 WET}.. {-940208400 3600 0 CET}.. {-873079200 7200 1 CEST}.. {-862621200 3600 0 CET}.. {-842839200 7200 1 CEST}.. {-828320400 3600 0 CET}.. {-811389600 7200 1 CEST}.. {-796870800 3600 0 CET}.. {-779940000 7200 1 CEST}.. {-765421200 3600 0 CET}.. {-74849
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8724
                                                            Entropy (8bit):3.816380386871747
                                                            Encrypted:false
                                                            SSDEEP:96:KAGvi2GmkwwnpH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZN:KLsww141sFpM5vwA6Efv03TBZLl
                                                            MD5:9B09D6EED8F23BAFFB62929C0115E852
                                                            SHA1:4AEF15333C73C2836C09D818FD0E20440D7C4780
                                                            SHA-256:C5C240BAAECE8235D1FBDD251C1A67CB2D2FC8195DD5BBE37FF9CFF0445FCDA2
                                                            SHA-512:43AA3492BD335A290C6EFEE275B47EA18E544199E37A9BBAE2E350D42BDFF42F0E9ED461A4BB1824CA33F84A90D4060906844A3E22DA49C9821E4CB460832D6E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Malta) {.. {-9223372036854775808 3484 0 LMT}.. {-2403478684 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812588400 7200 1 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 3600 0 CET}.. {-81997200 7200 1 CEST}.. {-71715600 3600 0 CET}.. {-50547600 7200 1
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.959733196757503
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV1AYKjG5XHAIgoq2AYKjo0ARL/yQausWILMFJ8QaC:SlSWB9vsM3ymrAdjGJHAIgorAdjo0ANn
                                                            MD5:C1844961691214F6E6DF6487788A7758
                                                            SHA1:6D08E9FB7B8602A80622148BFACD9676F45F0E2B
                                                            SHA-256:6136C3CFA4A767E7C9DDA23A283AD98B72E9868F192E6A8E3BFE6396F6989BD1
                                                            SHA-512:B2D1EA51AC5B34792AC02820A9D60FD41F3B91AB6505896476FCB0DC339B8DC1DE9E2C89A7627F69E16247661AE8040D789FFD2F8F1CD59F243B57C4845B450F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Helsinki)]} {.. LoadTimeZoneFile Europe/Helsinki..}..set TZData(:Europe/Mariehamn) $TZData(:Europe/Helsinki)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2177
                                                            Entropy (8bit):3.9354590900153172
                                                            Encrypted:false
                                                            SSDEEP:48:K8cVnR7xhuHJkminzaVV04v3TfdGY3kNmneVuNlh000sGpde:5mnRtEpkmiSV3A8qcN
                                                            MD5:9C10EAE9FA0DE192C5FD4F76E12606F0
                                                            SHA1:AFD5650410EC3E6ED564A8B2ABF91709D090B4AD
                                                            SHA-256:8C95EA696EA578DEF726502AC181AF475A676030878F56B4E2D667757BBD1C49
                                                            SHA-512:3B9ED6B68858485B9A46A0863B7D9D3C1E4C5BBA269457F24A9A12C274F0F9B35E63D8C25EB53E7200DB57DD35ACCB7FD7D8AB005FEE2C4D7FC6E72E8CF57194
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Minsk) {.. {-9223372036854775808 6616 0 LMT}.. {-2840147416 6600 0 MMT}.. {-1441158600 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-899780400 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-804646800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {670374000 7200 0 EEMMTT}.. {670377600 10800 1 EEST}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.9089012087310095
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVtEXc4o3vXHAIgoquEXeRL/yQauPMFBx6QazEXcov:SlSWB9vsM3ymzESPHAIgozEON/ySRpEB
                                                            MD5:2015CF8BBEEE12AF0D9C82FD2E246C72
                                                            SHA1:062BFFBB266C3EBB5776A509DDB7A6044C82B864
                                                            SHA-256:9DF16BB1C26100635DC4CB1DF409B0FA7B139C22BF09574ED337EE244CA3C546
                                                            SHA-512:FD3479588D4F3B84CF6C8B8A5DB1AB3BFA0A87CA2FFADB4FEBBBB25711C77963BE7CD0D1DA5ED985D729F39C5B44E8CBD429F1E2DA813DF26272D66CAE4F425A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Paris)]} {.. LoadTimeZoneFile Europe/Paris..}..set TZData(:Europe/Monaco) $TZData(:Europe/Paris)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2430
                                                            Entropy (8bit):3.942836780611272
                                                            Encrypted:false
                                                            SSDEEP:48:7fnjazk7e+LxhuHJkvVineTeCTU50x0Y7:7fnjazk7eoEpkvVieTeCTUax0Y7
                                                            MD5:4547D47E9364ACAFB2A4BEE52D04BFBB
                                                            SHA1:1E7F964692F81D49AEAF581FE70AD22D4E36226B
                                                            SHA-256:31F9C3C2F17B3EE4FA6D9EE6A86BF407AC0377DE4D666C65E86CE5AC591F829F
                                                            SHA-512:7F1D7C80A1BF611D5440EEF9085DA6CDED86B5EF4C2737C105640030E5AA998A0951182E72DC224190A25DA8846CDE856A78EBAA8876AA0B18B1CBCADBB060FF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Moscow) {.. {-9223372036854775808 9017 0 LMT}.. {-2840149817 9017 0 MMT}.. {-1688265017 9079 0 MMT}.. {-1656819079 12679 1 MST}.. {-1641353479 9079 0 MMT}.. {-1627965079 16279 1 MDST}.. {-1618716679 12679 1 MST}.. {-1596429079 16279 1 MDST}.. {-1593820800 14400 0 MSD}.. {-1589860800 10800 0 MSK}.. {-1542427200 14400 1 MSD}.. {-1539493200 18000 1 +05}.. {-1525323600 14400 1 MSD}.. {-1491188400 7200 0 EET}.. {-1247536800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.7873368289068905
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85GKLlXHAIgNwMGKLZRRL/yQatHefeWFKYGKL8n:SlSWB9vsM3yZdL1HAIgGMdLZRN/y3HeA
                                                            MD5:BE82205480617CF07F76BA0DF06C95BC
                                                            SHA1:46D2D8D9FE4FB570C2A09BC809B02C8960F9601F
                                                            SHA-256:FC93B7516933EDFDC211AC0822EE88BF7ACAD1C58A0643B15294F82EB0F14414
                                                            SHA-512:F490A70053A6011D80FB0A4E96D2871BFEEB168690E21C4EC31F2F5C0E24A67C706528C81322A1D48E71242F0FFA277550192925FDE5B1F34BFCB308290E11FC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Nicosia)]} {.. LoadTimeZoneFile Asia/Nicosia..}..set TZData(:Europe/Nicosia) $TZData(:Asia/Nicosia)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.910647918749938
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/y+YF3vXHAIgoq8yFRRL/yQasWJAQahyuv:SlSWB9vsM3ymhVoPHAIgoh6N/yI7Fv
                                                            MD5:242748F361AD524CD8E288BEE8611E19
                                                            SHA1:A636A544BB54851185E2BE83DAC69C813B824827
                                                            SHA-256:C84E9C0D22059573079211CBF487072CAB95C14B5ECEFB596CF1F594ABD3458C
                                                            SHA-512:404B272D0C6B70332052601EA65C0F7AE71C12F62D19FD3010BBA6FB25E4F2F95BB9E5F295D8494CBADB1AE9C7F833C42382AE7488317EA6F0C20E60B63BEFE8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Berlin)]} {.. LoadTimeZoneFile Europe/Berlin..}..set TZData(:Europe/Oslo) $TZData(:Europe/Berlin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9152
                                                            Entropy (8bit):3.8506895725632746
                                                            Encrypted:false
                                                            SSDEEP:96:fySTO1C+4qoMYOKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdi:fdp+3Ss41sFpM5vwA6Efv03TBZLl
                                                            MD5:9CAF8C5C5AF630E7F782C0480DD786E7
                                                            SHA1:9FBEF9EEDD8BAFB48B17E3AC388CFEF8DCD10CB0
                                                            SHA-256:AE61491C4A587F56426A9F2118E31060276F2B0231E750C461781577551CA196
                                                            SHA-512:F809744BB597184A2815758A27B6A07C515C65DB96CFFB3625FD059DEBBF05EE903E999483B3459C7C8D3991824746F8530CD1378F8A63B1F54F60CFACE9F89B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Paris) {.. {-9223372036854775808 561 0 LMT}.. {-2486592561 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1470618000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1253494800 3
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.910162937111088
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQazKIGl1/yQ0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNK
                                                            MD5:52C36955D6BD1D9FE9CB64822D04B6DB
                                                            SHA1:D5FF82EC486409E6FB314AD5ACE608577C9632CF
                                                            SHA-256:B87630FF459DE07EB16CD0C2452660772E3FFC4EEB8419EA77A013B6F63A5900
                                                            SHA-512:ABA49D3F05A41A4982600E4DA5C225D8994251F447401EE6FE8478E008BCD5D41C057034185B5CFF805634D571F3CC98EFE98093ABC8E6271351E11A4DA1E7AD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Podgorica) $TZData(:Europe/Belgrade)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8038
                                                            Entropy (8bit):3.8240363895915914
                                                            Encrypted:false
                                                            SSDEEP:96:Kr9+neXAS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlh:KnASs41sFpM5vwA6Efv03TBZLl
                                                            MD5:828134FA1263FEFA2B06A8B2F075F564
                                                            SHA1:4B332DE6E0855F8B9517F7098A3FB439671FC349
                                                            SHA-256:5D3AFED5C1B07C6C6635D6BDEB28A0FB4D11A61F25F26C91227B2254BE5F4AA0
                                                            SHA-512:9AB1462CDBD7F13F0CECDCCC2D91A85D8C0576B71508F935D26638C25ED023CF8FF4BA4FFDA402B308E6142B135D1B9D88700A519DBE2381E8E945329A5354F7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Prague) {.. {-9223372036854775808 3464 0 LMT}.. {-3786829064 3464 0 PMT}.. {-2469401864 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-777862800 7200 0 CEST}.. {-765327600 3600 0 CET}.. {-746578800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-728517600 0 1 GMT}.. {-721260000 0 0 CET}.. {-716425200 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654217200 7200 1 CEST}.. {-639010800 3600 0 CET}.. {283993200 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7658
                                                            Entropy (8bit):3.7750218768791806
                                                            Encrypted:false
                                                            SSDEEP:96:eq+cEpkjXkSV385aNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:ePWjUS7ivBeRF+W35Syrwl9h5j
                                                            MD5:0D3C919F60081388524BD5DB22E6904B
                                                            SHA1:6691EAB901C8B57D2F2693120A45A67799D05FCB
                                                            SHA-256:8B64A42BAFD90F9255CACFDBAC603D638DD7C18DC27249F9C9B515E1DA634424
                                                            SHA-512:62A2820B8C1C5468AC1F1BB626F9AAAD0BA1DEC5B73740F00FE4DB8CFA3F2BCF9947968E693824FC8770BA20AB962F93F7E5E345AE8A85F99CDB18E2B510308E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Riga) {.. {-9223372036854775808 5794 0 LMT}.. {-2840146594 5794 0 RMT}.. {-1632008194 9394 1 LST}.. {-1618702594 5794 0 RMT}.. {-1601681794 9394 1 LST}.. {-1597275394 5794 0 RMT}.. {-1377308194 7200 0 EET}.. {-928029600 10800 0 MSK}.. {-899521200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-795834000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {6
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8813
                                                            Entropy (8bit):3.8168470239811736
                                                            Encrypted:false
                                                            SSDEEP:96:hhGvC2GmkNXEq74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhn:hUsF41sFpM5vwA6Efv03TBZLl
                                                            MD5:C4F49446D3696301EDB339691DCB2FDB
                                                            SHA1:537963A77B9BE9BE6B997A812A6E6DD120F6F247
                                                            SHA-256:DCD2D9144507311E573568598E1FFD0E0574FB677AA0DAFC5641D80A19EB6E58
                                                            SHA-512:1F0A9A549FA0995C51E90AC392671E3F09744B268F1EE6A27CA7E3C41C2B02A4BA0F98369BE40BA482FBA1FED8F1EE712F0B3217AD86164D1AD498E369C24D76
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Rome) {.. {-9223372036854775808 2996 0 LMT}.. {-3252098996 2996 0 RMT}.. {-2403565200 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-830307600 7200 0 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-807152400 7200 0 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 36
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2118
                                                            Entropy (8bit):3.664269700453612
                                                            Encrypted:false
                                                            SSDEEP:48:7PvCAs6kKR6aQmF1cSNWrI+AjQnTRYZ/YF0LUdt/LkajuZbIJltiabs2Tb:7HCAs6kC6aZF1cSN4I+AjQTRYZ/YF0Lw
                                                            MD5:965D987F6576F66A08871697144D4CDB
                                                            SHA1:AF7226DF81C2B3C3A5832F59FC708A6BCBF389CA
                                                            SHA-256:8F395352AA05D35E7D13380E73659A0D5B56FFC17E3F4E40E4F678A902F0E49B
                                                            SHA-512:B82E0CFA5EDA0FCDF03609AE439255F8937A7E9EFA0AFE15EA8877316782AFC74514BCD2B4F06F1B5F0F3C5A64A933D73CB50D5AED2BB1491BD6CACBB77B10E8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Samara) {.. {-9223372036854775808 12020 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-1102305600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 10800 0 +03}.. {687916800 14400 0 +04}.. {701820000 18000 1 +05}.. {717544800 14400 0 +04}.. {733
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.955758257767983
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQawELDX7x/yQaxE:SlSWB9vsM3ymx5PHAIgoxvN/yt/yrE
                                                            MD5:D253DA6880630A31D39DB0CFA4933ABD
                                                            SHA1:E5798DAAE574729685FE489F296B964BC1CCF2E4
                                                            SHA-256:B6856A0E38C2404F7D5FA1821559503F8AE70923A562F0D993124D131515F395
                                                            SHA-512:CFB6005F3E8D1C585AF36EB7A8C9F49760EF6F446C97E7804EB61EFD0804424C4FB6AE81B71C5A867274EF89A17DAC0D2A0FF882A0F6AEA1D5FFD51593726C5F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/San_Marino) $TZData(:Europe/Rome)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.937834327554967
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawEX3GEaQa5:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNZ
                                                            MD5:F7C7DAE9C5D371EF9EE1F490246ED3CC
                                                            SHA1:40C388FE2A55078C8E0524A4385B3F8846960E24
                                                            SHA-256:BC00D953C2F3E55E40EDA13838AB66B9E9D0BDAD620E4EB917637761ABB06FB1
                                                            SHA-512:EB22C59F4D58D96797A718FC59B010795F587626E456D44A3E6398E0FBF4ECD97BCDC151BC1359151798B5AF2964FE5708233F8ECD0D344C3E27629F2645687F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Sarajevo) $TZData(:Europe/Belgrade)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2061
                                                            Entropy (8bit):3.6638125261109824
                                                            Encrypted:false
                                                            SSDEEP:48:yFvCAs6kKR6aQmF1cSNWJjXgV/Ap40FjDQ:yhCAs6kC6aZF1cSNcjXgV/ApDFjDQ
                                                            MD5:CC4D7C478790588D232568CAB12D8E67
                                                            SHA1:07A7CFCFFFF91D124EDFC99F5053BAFC79FBB12B
                                                            SHA-256:AB90363DEE5077C39EC55FE8E519593FF08223E5A8E593F6CCE01FB5B8B35BAE
                                                            SHA-512:23944D20624C942CFDE58F1019160D64401BD0AFB8C3EC49F904038482FAA6741812548C860A2DAE050B8D17A7E08ED9C6EBE7FF19393CFA46D78B1D21B1CACA
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Saratov) {.. {-9223372036854775808 11058 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 +04}.. {575420400 14400 1 +04}.. {591145200 10800 0 +03}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {780
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2389
                                                            Entropy (8bit):3.9491446081772748
                                                            Encrypted:false
                                                            SSDEEP:48:wM2wE0xhuHJkYaVV0XOnbdSisa0ewEKGfUslIYtq8X:UwEAEpkzVFgaNl7
                                                            MD5:03E05E60E064198BF6562B2E6E8DA8D2
                                                            SHA1:51461207B671536CD4A7587BA283DE2D0017AA4A
                                                            SHA-256:D51CD3DE50C50BCA1624EFC952ADD15D418A09EC213760DF5BC3097E35C5A7A0
                                                            SHA-512:73B7773DABE19F20DD211E178B822FD35620DC4AC8B9D20259971B1157ED7A60A5A41026258FAA8B15016268D241ED804AC1307CACDA00D6FE657407D254B02C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Simferopol) {.. {-9223372036854775808 8184 0 LMT}.. {-2840148984 8160 0 SMT}.. {-1441160160 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-888894000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-811645200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {646786800 7200 0 EET}.. {701042400 7200 0 EET}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.953089768975736
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawOgpr8Qahr:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNO
                                                            MD5:0BF8ADBB63F5D6187C75FF1B0BAC761E
                                                            SHA1:7DE15E767D34812F784CE6E85438A592E2CBA418
                                                            SHA-256:52F20858433261B15797B64F0A09CEE95D552EF93B5DAA7C141BFAB6D718C345
                                                            SHA-512:27D395635427C8FA1A4E0063A32F482701D2CC7C7724B4A06E661D4A419D23E219672888D37367FE5E70B6872914EB9EE034AE359DCB6A4C4CE05CA34C3589A9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Skopje) $TZData(:Europe/Belgrade)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7654
                                                            Entropy (8bit):3.727428614069594
                                                            Encrypted:false
                                                            SSDEEP:96:8lmG4+K7Gjz5CXNUatpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:8lmGWwkdUasivBeRF+W35Syrwl9h5j
                                                            MD5:91357DFC23ADB0CE80C463E4B6D896BE
                                                            SHA1:273F51BE4C67A9AC1182F86AC060E963684151D5
                                                            SHA-256:6415F279CB143EA598CF8272263AC5B502827B10CEEB242B39E6EFCC23A2EE12
                                                            SHA-512:8EA7E2D4C2239879A4D6CCE302C38A6D2A9093A2CADEF4F4294E60D373AB9A2C468BA6E3D54DEC7F73D954CE5226EF2B022F8BDEF29B3B4AAB3838B05C72EA29
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Sofia) {.. {-9223372036854775808 5596 0 LMT}.. {-2840146396 7016 0 IMT}.. {-2369527016 7200 0 EET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-781048800 7200 0 EET}.. {291762000 10800 0 EEST}.. {307576800 7200 0 EET}.. {323816400 10800 1 EEST}.. {339026400 7200 0 EET}.. {355266000 10800 1 EEST}.. {370393200 7200 0 EET}.. {386715600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465350400 7200 0 EET}.. {481075200 10800 1 EEST}.. {496800000 7200 0 EET}.. {512524800 10800 1 EEST}.. {528249600 7200 0 EET}.. {543974400 10800 1 EEST}.. {559699200 7200 0 EET}.. {575424000 10800 1 EEST}.. {591148800 7200 0 EET}.. {606873600 10800 1 EEST}.. {62259
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.956798438511978
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/y+YF3vXHAIgoq8yFRRL/yQawRMNSTyQahyuv:SlSWB9vsM3ymhVoPHAIgoh6N/yqMNSTm
                                                            MD5:ACFB8E2D1D4BA0D2D46410F2F2823B21
                                                            SHA1:4AC3A19E94DE606DFF7D93BC6C7F113F3D2D083A
                                                            SHA-256:64615AEA9EF14A2609D2C804901281C83FDDC0A8BCA9B377D6CAD62D81801C66
                                                            SHA-512:2E23AC0DE7D3D0CF2BA4FE3EE31E15EB614A7442097578209D38CE2FF2E3DF006881463866FE67DD4DDEAB179E5CD2946E8A9E8F7401F1B953E9AB216EC753F0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Berlin)]} {.. LoadTimeZoneFile Europe/Berlin..}..set TZData(:Europe/Stockholm) $TZData(:Europe/Berlin)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7549
                                                            Entropy (8bit):3.76585669030767
                                                            Encrypted:false
                                                            SSDEEP:96:dUusEpkjXkSV3AMaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:O0WjUSWivBeRF+W35Syrwl9h5j
                                                            MD5:54EF0224F5E28FA78F212EC97D4AE561
                                                            SHA1:FA7C9A951ED943F1E1E609D2253582016BC26B57
                                                            SHA-256:6F3594CCDA78B02B2EE14C8FAE29E668E47193AF2DFCF5AF1ECD210F13BCE9CE
                                                            SHA-512:2D1CA2BB1945AE5E3F56AF8FA7F950CE7169F215C783E683634581C5EC01B54159E47A0E9551897077BBEAB06158906029A4E4B0051A263D9E5D903EA9DA1692
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tallinn) {.. {-9223372036854775808 5940 0 LMT}.. {-2840146740 5940 0 TMT}.. {-1638322740 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1593824400 5940 0 TMT}.. {-1535938740 7200 0 EET}.. {-927943200 10800 0 MSK}.. {-892954800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-797648400 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 10800 1 EEST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7675
                                                            Entropy (8bit):3.809498345470167
                                                            Encrypted:false
                                                            SSDEEP:96:n05NWKIHBJ9AE4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt:0iKqxAE41sFpM5vwA6Efv03TBZLl
                                                            MD5:1983B88075A92942209BB2B80E565F4E
                                                            SHA1:12A0401026C5C036144FD1D544173AAB39969F61
                                                            SHA-256:C62686BF598138FEFB72E8CC6632BA75A5FE147F2A30124EE3583BE1F732E38D
                                                            SHA-512:E95C38FA0A2B526C00B9DCF5CDF53059DECF64B085AA18BE000968DA626561944415D053CF7A5C32BC672085538920CFD67A3A3B627CFD5B1A4C9CEC49AA3F96
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tirane) {.. {-9223372036854775808 4760 0 LMT}.. {-1767230360 3600 0 CET}.. {-932346000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-843519600 3600 0 CET}.. {136854000 7200 1 CEST}.. {149896800 3600 0 CET}.. {168130800 7200 1 CEST}.. {181432800 3600 0 CET}.. {199839600 7200 1 CEST}.. {213141600 3600 0 CET}.. {231894000 7200 1 CEST}.. {244591200 3600 0 CET}.. {263257200 7200 1 CEST}.. {276040800 3600 0 CET}.. {294706800 7200 1 CEST}.. {307490400 3600 0 CET}.. {326156400 7200 1 CEST}.. {339458400 3600 0 CET}.. {357087600 7200 1 CEST}.. {370389600 3600 0 CET}.. {389142000 7200 1 CEST}.. {402444000 3600 0 CET}.. {419468400 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {457480800 7200 0 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 C
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.906212162381389
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV+NM/LWXHAIgoq9NM/HARL/yQa3MPgJM1p8QagNMj:SlSWB9vsM3ymI6CHAIgoI6HAN/ytM4MO
                                                            MD5:E0C99DB7673EEE440BA1848046455BA1
                                                            SHA1:1BCCC1BE46306DEF8A9CA249DE8FA11FC57CC04D
                                                            SHA-256:FDD53FDB5F754BBBA8FF98F0B1555FE0BAEB7852843220A7CF93A190B641A9AD
                                                            SHA-512:CD56B540AE9084DEAA9D0A1DBBAF89733C465424C22CE74696B9AE90FD4FEFAB265CF23C5B13A7F04597D75FD0147BD593E0552B56D87372170CB4CA1BFC8259
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Chisinau)]} {.. LoadTimeZoneFile Europe/Chisinau..}..set TZData(:Europe/Tiraspol) $TZData(:Europe/Chisinau)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2119
                                                            Entropy (8bit):3.680951255407528
                                                            Encrypted:false
                                                            SSDEEP:48:kFvCAs6kKR6aQmF1cSNWrI+AjQndgV/Ap40FjDOP:khCAs6kC6aZF1cSN4I+AjQdgV/ApDFj4
                                                            MD5:83C86E437B5FBA1DC9CC5235396AC381
                                                            SHA1:5493A59C3A5A1B55ACD493E67F9E29D2A415A8DB
                                                            SHA-256:9FA9D09509B4F8F5A9C8E422DBA02605070C3EBDAEB7C1DF8527C8EEF5E3632D
                                                            SHA-512:86222489C65C87646939DECF91C2EC336EB46F64B644526A3FA8A4854B9D11819F6FD253107AB8A3DE911E254C88092D25137442164A6E437CDAF258A7CBB66C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Ulyanovsk) {.. {-9223372036854775808 11616 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 7200 0 +02}.. {695779200 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):177
                                                            Entropy (8bit):5.051734481833866
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV2cvXHAIgoq1csFARL/yQa2rUQaocqn:SlSWB9vsM3ym5HAIgoiAN/yFC
                                                            MD5:17A0CC51331756920B13FFA3FF556751
                                                            SHA1:C575FEF4F053393C57B34C7C7B0C1E9605413792
                                                            SHA-256:F8CAF5DBE12F1647B28E7CCDDB2E09E36788A766690D12E770A8ABD82E708644
                                                            SHA-512:E73F0FE5BE4DD91948A88DC895E148D81267576BA3BCFEA777E25C01EAE9C06845DBFFB651526045B70B7A3CCDB195DFFF60486C01E0A115DFB856873970008E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Kyiv)]} {.. LoadTimeZoneFile Europe/Kyiv..}..set TZData(:Europe/Uzhgorod) $TZData(:Europe/Kyiv)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.953146873643623
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQa1NEHp8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/yvNEJ8G
                                                            MD5:A0BAEC8B6AF1589ECBE52667DDB2A153
                                                            SHA1:37093F4F885CBFA90A1F136D082E8B7546244ACC
                                                            SHA-256:06B235BF047FC2303102BC3DC609A5754A6103321D28440B74EEC1C9E3D24642
                                                            SHA-512:DBEC235AFB413FA8D116FA1AFFE73706762E7458038B6D68E0BFD71C339510D766825BA97055A06DEE14D5880EAE6CD035BFE0C935C0DF44B0107A356D293A78
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Vaduz) $TZData(:Europe/Zurich)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.914414313741477
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQa1xLM1p8QaxE:SlSWB9vsM3ymx5PHAIgoxvN/yvN+8rE
                                                            MD5:2404265F8DE1F7D7745893DD4752BA1C
                                                            SHA1:C07E7F72DBDC7F5F746385523EA733C2714F5DA2
                                                            SHA-256:C203E94465BD1D91018FC7670437226EF9A4BB41D59DDE49095363865CA33D00
                                                            SHA-512:5C20834542B74041AAB1DBE35686781B32EEB5814B1A35A942E87D1FC3B6D8F9264CB90433C44A480EA86DDEA65D8C152F41CE3E983C1DE5FA74D6FB5208F701
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/Vatican) $TZData(:Europe/Rome)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7930
                                                            Entropy (8bit):3.8193566380830273
                                                            Encrypted:false
                                                            SSDEEP:96:8F6zq+gH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:8ozE41sFpM5vwA6Efv03TBZLl
                                                            MD5:6A3A8055DD67174E853C7A208BABAC9B
                                                            SHA1:64445543DE9D6C01FA858442976E249E37BE23EF
                                                            SHA-256:A8165313C9B51DAEF130401439CBA60DAA9887FC5EAA61A5AFD4F7BAD1AD934F
                                                            SHA-512:4407B9E8709A8DD05337A10030895AA9876EAF64EF5347952249EE2A541E304331B46D38532FD7CDFF9E633BF8C9884282F0A5ED259EBA1D99DC0914AF1A50C6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vienna) {.. {-9223372036854775808 3921 0 LMT}.. {-2422055121 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1577926800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555801200 3600 0 CET}.. {-938905200 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780188400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {323823600 7200 1 CEST}.. {338940000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CE
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7485
                                                            Entropy (8bit):3.7711709848169592
                                                            Encrypted:false
                                                            SSDEEP:96:FAhEpkwCXkSV3A/PplKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:FfWHUSKivBeRF+W35Syrwl9h5j
                                                            MD5:1AB5FCEACC4E09074BA9F72F0B7747D5
                                                            SHA1:E0134E61EC0ADC60BF6DB4544EA7B7FFA4EC7857
                                                            SHA-256:B762DB4A068DC79FA57691E070D7026086E5A6D2FC273D5C1872E7C8E3711533
                                                            SHA-512:07565071D05CF972DD64F6060599EB68A00BF264172873BA310168AD07CE0CFCF90D0019B775433EC910DA748B89F0C614E7FD4E821993DA53C7E33F194C6A97
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vilnius) {.. {-9223372036854775808 6076 0 LMT}.. {-2840146876 5040 0 WMT}.. {-1672536240 5736 0 KMT}.. {-1585100136 3600 0 CET}.. {-1561251600 7200 0 EET}.. {-1553565600 3600 0 CET}.. {-928198800 10800 0 MSK}.. {-900126000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-802141200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 7200 0 EEMMTT}.. {606873600 10800 1 EEST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2123
                                                            Entropy (8bit):3.8686829358191845
                                                            Encrypted:false
                                                            SSDEEP:48:menvCAs6kKR6aQmF1cSNWwVmTeCTU50x0YdS:mevCAs6kC6aZF1cSNZVmTeCTUax0YdS
                                                            MD5:3DC74C5B34E76D0A758B82C49F6FED1F
                                                            SHA1:98C0BD29E13C1F4453A1652FC9F206794846B6BD
                                                            SHA-256:2551A50EB75D83E6F04A9FF65A78029B05A36167AFA9F28E02B3914B5EE6B8E8
                                                            SHA-512:B10250033A72EE0E51285132662D5E5264A1045C204BC6CD777892C1C6A6454ED8097956CDB9B6FBA4AB51E3FC27619B53EC4D8080C53193EB0D817A51572052
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Volgograd) {.. {-9223372036854775808 10660 0 LMT}.. {-1577761060 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-256881600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 MSD}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {654649200 10800 0 MSK}.. {670374000 14400 0 +04}.. {701820000 10800 0 MSD}.. {701823600 14400 1 MSD}.. {717548400 10800 0 MSK}.. {733273200 14400 1 MSD}.. {748998000 10800 0 MSK}.. {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8662
                                                            Entropy (8bit):3.8187545871488995
                                                            Encrypted:false
                                                            SSDEEP:96:ELn9M9Nivtctwwoy4qelPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCso:E6Nivtctgq1sFpM5vwA6Efv03TBZLl
                                                            MD5:992C1D268E336AF1FB8200966C111644
                                                            SHA1:C893B82224C8EF282DB2E16A5BBCC3A21C49B6FE
                                                            SHA-256:F9DC10EC2AE2CC810A6C08837059B34BE651900BA4E1CEDB93C209972CCFB5A2
                                                            SHA-512:EC4E0D8684D57FA66144F11D8E8C80E5272D4A7304300FEBE20E236476C1B8B33BBC5E479BF96D9ED12900FE6D41DD1DC0D11CBE02B89E0C4C7A153B4BFBCB1F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Warsaw) {.. {-9223372036854775808 5040 0 LMT}.. {-2840145840 5040 0 WMT}.. {-1717032240 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618696800 7200 0 EET}.. {-1600473600 10800 1 EEST}.. {-1587168000 7200 0 EET}.. {-931734000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796870800 7200 0 CEST}.. {-796608000 3600 0 CET}.. {-778726800 7200 1 CEST}.. {-762660000 3600 0 CET}.. {-748486800 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-715215600 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-397094400 7200 1 CEST}.. {-386812800 3600 0 CET}.. {-371088000 72
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.899266605519742
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQa5rXv1/h8Q0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNB
                                                            MD5:B07D9D3A5B0D11A578F77995A5FBE12B
                                                            SHA1:1C4E186F2D53C0A1E6A82A6D33B172E403A41D6D
                                                            SHA-256:A49B3894EB84F003EB357647D6A40CEAF6213523196CC1EC24EEFD7D9D6D3C3E
                                                            SHA-512:43520AE325980B236C47C866620D1DA200AC0CD794E8EB642D2936D4B0ECEFE2DA0A93C9559D08581B3CCE2BC75251A4D5B967D376B16EB0C042B0ADCE1DCD01
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Zagreb) $TZData(:Europe/Belgrade)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.999265802825238
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV2cvXHAIgoq1csFARL/yQa58KXkcAEfh8Qaocqn:SlSWB9vsM3ym5HAIgoiAN/yjzVbh8C
                                                            MD5:5B150E25521FE5DD8B83DD9B1B8F3A7A
                                                            SHA1:0BB6F73F2C4B2464F3B1E62138843389AF1A07BC
                                                            SHA-256:EF928AC09B9A366FD015F488B6A19FEFD72DE1BAF34E5CADFB8334946BCF19FE
                                                            SHA-512:4A85A4E929EC6FE66AE60899FA55A75156D075CB2FE41C19337A128F5FA7363B9208AC2DC1BF4E44B76D5F115143D73F6D923E255EA78538D1BE4E45DEBA2049
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Kyiv)]} {.. LoadTimeZoneFile Europe/Kyiv..}..set TZData(:Europe/Zaporozhye) $TZData(:Europe/Kyiv)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7305
                                                            Entropy (8bit):3.8199799674700277
                                                            Encrypted:false
                                                            SSDEEP:96:94hH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:9Y41sFpM5vwA6Efv03TBZLl
                                                            MD5:EBD66FAEA63E1B90122CC1EB21634ECE
                                                            SHA1:C6487BB8AB2A6A72B2170B220F383ADB6B9AC91C
                                                            SHA-256:95AFA61E439CA38551306D8FDB11C2788D935C42768D0407C9E4337F105A3E93
                                                            SHA-512:25A8D0ED9BBE6BF23A1A76CC6D5378CF4D50544AA22DA97DDCD0673D7A5CCFEFFD81B660A1AEFB254B8BBEA55F6EF734BBBD3F0CB903E0721BE107667CA1E328
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Zurich) {.. {-9223372036854775808 2048 0 LMT}.. {-3675198848 1786 0 BMT}.. {-2385246586 3600 0 CET}.. {-904435200 7200 1 CEST}.. {-891129600 3600 0 CET}.. {-872985600 7200 1 CEST}.. {-859680000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):170
                                                            Entropy (8bit):4.8978035005721265
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/wox6QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/wRj
                                                            MD5:68667037110E713DB3F51922DDE929FE
                                                            SHA1:2EB02BE3FD35F105B59847892A78F1AA21754541
                                                            SHA-256:E20D829C605A7C5B2A96B83C3480DF28C964A13381A8BD2C72C2A37295131FA7
                                                            SHA-512:3A8CC2EC9E3053283F996CA2C4B422061D47F1D16CA07985CBA2C838DF322C23CC9DD28033646F22EAE0E401781480B9D3AF82A539444166A4DD9B7BCCAE45FE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):175
                                                            Entropy (8bit):4.90874180513438
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/w4b/h8QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/w4E
                                                            MD5:625520BAAB774520AC54BFB9EDCF9FCA
                                                            SHA1:C72F0FD45F448901C6B2E24243175729591B9A54
                                                            SHA-256:C9334480D0A970254B6BA6FF22E958DC8DD8BF06288229461A551C7C094C3F1D
                                                            SHA-512:1B672218FF9C86168E065A98C3B5F67DAB710D1C2A319E9D6599B397C4B4C00D3721B76C735C8AB04BCB618C1832B07F6CCDAF4266CC0D12A461A3A862D1AEB2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB-Eire) $TZData(:Europe/London)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):153
                                                            Entropy (8bit):4.867609984313873
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wZ8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wZ8RQy
                                                            MD5:A01FE6FC260711F0E11C85DC3DE3550A
                                                            SHA1:988311B71498591425C63669DC3F802F270B2C44
                                                            SHA-256:747C15CDC239855D5380B7A7F47112F2A26C61B0BF300EEB9711E6521550D189
                                                            SHA-512:BE4678DCBAE5DBC72865665413206C1909F28BA54F4943257870EFFBA6525457866DED7A985E89F2689C810B314DE4AA2FA3A0A1826A664727F5F7113AA56595
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):155
                                                            Entropy (8bit):4.917182390229381
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/we7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wI8RQy
                                                            MD5:3327B1BF3118AC6AFC02C31DF5B67CD9
                                                            SHA1:3932577E66801AD31519B0BB56CCE7B9E36221A9
                                                            SHA-256:BE48462CCFBB3AEE19597F082A17C2C5D2FD8BB1C9122245EFAB0A51F8F413B0
                                                            SHA-512:53866FD513B039E8203E51FF3434D5736D3A4C4E0A46874D1C99A17115181AF749F0D079C2E14C5B0538D3DFA52B1645C977CD6599DA3EDA57CC7F84EEAB2D06
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT+0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):155
                                                            Entropy (8bit):4.904279164422928
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/w4Hp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/w4J8RQy
                                                            MD5:0CFFC5655F031D954BD623CC4C74DC9C
                                                            SHA1:CE5E7AD67252F52D7E70719725FF5BE393DD6EF0
                                                            SHA-256:944C86F516141DDC3AEC1AE4A963E9769879C48ED12DADDF4ED63A01313ACD00
                                                            SHA-512:C7352D1394E8B8AC90CD19EE753D5277259BE5512ADDCAED2A2DEF144762CF20BE7A9FA09AAA1829EE401DD195C2AED8C967A7FF46739236E042AF4298EC84A2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT-0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):154
                                                            Entropy (8bit):4.892526720357546
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wPHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wvp8RQy
                                                            MD5:565B41A5DB28F9FE7D220E9BA39062A4
                                                            SHA1:5183689210F07C8A71F880DCE8E5C2CB62CEB17D
                                                            SHA-256:54850A5F488205DB01FBB46E2DA9FFF951C4571029EA64D35932DDEA5346DAAF
                                                            SHA-512:BD6E5141F06B03D62DCF725E9E48D6AA8ECD6E8E47A4015B25DC3F672392065FFFD80D688C6695324DC105EA528025CF447FA77E6D17E15D438E61DC51879CB7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT0) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):159
                                                            Entropy (8bit):4.917976058206477
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wE+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/wE6BURQy
                                                            MD5:443FA76F107ED438F9571A044B848C6A
                                                            SHA1:1CF508429DFC40643B1FAB336A249A3A287D8C7C
                                                            SHA-256:9E7A8DAA26CE36E8F7D7F13460915C063EE98E2A4DB276AD9D15CA5C7C06815F
                                                            SHA-512:6C0C5FF513A742FBDA349AC3A2581D456701B5348A54ECF38E496DAA1EFC74D937982B6F69F1761CC2FC4B88D9A971EFA2B16096E71EAF002EC5CE4130B533DE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Greenwich) $TZData(:Etc/GMT)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):111
                                                            Entropy (8bit):4.90682088010982
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x//LhdNMXGm2OH1V90v:SlSWB9eg/jJDm2OH1VGv
                                                            MD5:79C82A5F8B034E71D0582371E3218DBB
                                                            SHA1:1476CE8EA223095094B6D25D171E6319C96669F4
                                                            SHA-256:8D710699AF319E0DDB83E9F3A32D07AE8082EA2F7EABBD345EFFFFB0F563062E
                                                            SHA-512:ADEE55581D1A158929F09A63B03883ABE9193337DDF225C61AFDBB8A2C7D0BD248ADC4714E0EEFD334826C54C1AFFC8B1E6C2B0D6EF830C3CCA50CC79834F473
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:HST) {.. {-9223372036854775808 -36000 0 HST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.913328649996328
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8Li0vXHAIgN2qfvRL//XF1p4WFKQyvn:SlSWB9vsM3yW2HAIgAOvN///p4wKlvn
                                                            MD5:6A307B229C302B1BAE783C8143809269
                                                            SHA1:EA169AF81AD12380A69FB6B7A12479BA8B82878B
                                                            SHA-256:359C9C02A9FA3DE10BA48FA0AB47D8D7AFF3B47F950CFAF5EB68F842EA52AB21
                                                            SHA-512:505445FD0B3E140384EDC27993923BBF9ACD23A244B0F14D58804BFAA946D0BC4C0D301FBCCB492BAFDA42C8A92F4163FB96F4D75DD7374858D1C66183BEC24B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Hong_Kong)]} {.. LoadTimeZoneFile Asia/Hong_Kong..}..set TZData(:Hongkong) $TZData(:Asia/Hong_Kong)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):178
                                                            Entropy (8bit):4.853280551555672
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/+GAKyx/2DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/+XZx+D4
                                                            MD5:710D3A32EA8EAD11B45D4911DA8F2676
                                                            SHA1:146D2A6D48940E58567EFA3BCA134D195E4649E6
                                                            SHA-256:8A531293F672D8FE38996989FC4EEB22B5EFE6E046E2F58E94D01DA9CE56EF68
                                                            SHA-512:70432973549C1A83036E0658AEE81C883F19D0D631E35F4C70F2EC69C9384E99340004618EF8B414D8EA9090C6C3120CF46A5D9ABDE4113917995B2844337988
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Iceland) $TZData(:Africa/Abidjan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.807410166086502
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL/liEi2eDcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LzM2eV
                                                            MD5:0F20CBF1F7600D05F85D4D90FDAB2465
                                                            SHA1:2F3C9479C4F4CD7999B19C07359B89A5FB1B9839
                                                            SHA-256:1B1177CE4D59D7CBCAE9B0421EB00AD341ECB299BD15773D4ED077F0F2CE7B38
                                                            SHA-512:657341FC2CCD6A4F7B405ABC8E24C651F6FFEFD68EBD6E2086ADF44834DCBF21D1B9D414436E42C8DCE46FFB88116B98C1D073782E214B3996D49EC00DFF4383
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Antananarivo) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.853088038233057
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9WJx3vFNMXGm2OHi/FvoHscfJ7XH0VQVFV6VVFSTVV:SlSWB9eg/+LxWJxPDm2OHqFvoH9+VQV3
                                                            MD5:06143C3DFD86B3FE4F2A3060C0E05BB6
                                                            SHA1:88E0E30CEE4AB8117860A35AD03B16AF48988789
                                                            SHA-256:11044AD7CB0848CC734D2A67128AA6AC07CB89268399AA0A71A99024DE4B8879
                                                            SHA-512:79195D3D0D475BEA982F40683D4BA14AC33B3FA91311F513DCED955C9297C2B0F12D94CCA930FAE0FB7F95DB34CD4E74B5AF0233E792122646592B7EFF0F3163
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Chagos) {.. {-9223372036854775808 17380 0 LMT}.. {-1988167780 18000 0 +05}.. {820436400 21600 0 +06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.910217468889087
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/+L6EL9FBIEWoxp4Wx:SlSWB9vsM3y1LePHAIgKELtAN/+LxpWg
                                                            MD5:39CB9E58C0086B80FB12AC10A6D371E2
                                                            SHA1:2A9A5CCA411779615A62D9E82023B6A066CB3CF3
                                                            SHA-256:78A208B73426A1B6D7CF2FE89A0EF3F01721F877D569BC43F2E5B6625A947299
                                                            SHA-512:BB6C8CF2B6AF9F93A7F7382A453261FA43E6E42E9ED1223F25A70DAD2ABBBF2F5777288553F4BC0155944754655D2C3F81BD81E5B1F611C4B2CCDB729B67AAC5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Indian/Christmas) $TZData(:Asia/Bangkok)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):174
                                                            Entropy (8bit):4.818886812441817
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8nv3vXHAIgNnDA6RL/+L6EL9dEh4WFKsyn:SlSWB9vsM3yHvPHAIg15N/+Lxah4wKsy
                                                            MD5:9462E9CFC88C3DA3CCCDA18C92E49A97
                                                            SHA1:B50C82C6C7361BD6F028F82E2FEAF8486D798137
                                                            SHA-256:EB301EE97A9FDE8ACE0243941C0FAC9ED0E3ACFD6497ABE408F08E95FAE3B732
                                                            SHA-512:A48EBDA0A93C3505BC6149863F4A7B1043F856A8EB516CF42C050A95E81CD152BC1C0313B3DD115D53DABA95413AF34902D7D11C984DE5A03FC5FFADAF8EA89F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Yangon)]} {.. LoadTimeZoneFile Asia/Yangon..}..set TZData(:Indian/Cocos) $TZData(:Asia/Yangon)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.825881690094318
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL9TKlBx+DcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LxGV+V
                                                            MD5:7EBDFA311C7852AFADF880395071DE48
                                                            SHA1:F6EC21FDFB75EC1BE45B1C4170147CBA3E870E7B
                                                            SHA-256:53FA58E32DC2E4ABB574B2F78011815EEB7F89F453CC63C6B6C1460ABBB4CA5C
                                                            SHA-512:DFBCD4EA4AFFA1D1CAE7308168874527FD36B5CAE76153AADA9C5E5F628258AB26654A16C8A5F8906FC5918398FD880B15B6DD4E3EF6AD3BE63D4A2455701FA8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Comoro) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.822075418239496
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqKGE4YF3vXHAIgnGED9HRL/+L6EL12h6hwL6ELzEov:SlSWB9vsM3ypGEVFPHAIgnGEtN/+L5Ry
                                                            MD5:9AB222C67E079B55DDF3ACAE67BD0261
                                                            SHA1:F9E6C34A00F9F1B152CEA729F087BD24993CA2E8
                                                            SHA-256:138C7FFBFC520372658CA0CD1B42C4E5A240E9D9B98A277B02481DE5701222FC
                                                            SHA-512:5F3EFF78506056F981DB0446436B39953D90265227890176D8287E2149B176B9DCCA14E795083B1EBC202D02AA88D584A9BB49868F30895EF17E92AA98ACB7C7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Indian/Maldives)]} {.. LoadTimeZoneFile Indian/Maldives..}..set TZData(:Indian/Kerguelen) $TZData(:Indian/Maldives)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):170
                                                            Entropy (8bit):4.84472938642971
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8DeXHAIgN6S7ARL/+L6ELzJM1h4WFKQ3n:SlSWB9vsM3yj+HAIgMS7AN/+L/Yh4wKC
                                                            MD5:C866B2A879786B7D9341FA904FC7D01A
                                                            SHA1:DAF7B405E6DAA0C88C6F3A26AAA172E38CE5CAF3
                                                            SHA-256:613C5C05A8867E4B59A97A3D8C7235DDC0CA23239F2D57A5BFD42E4AB94FD510
                                                            SHA-512:BB01A464366F1F93591F48C42F300421AF774E50E5B5232AB0C755482E3306EDDB54A9BCF6E9D325EAE63AAC6D3857F4D754FC28A34F90AC728B7158B61E2C57
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dubai)]} {.. LoadTimeZoneFile Asia/Dubai..}..set TZData(:Indian/Mahe) $TZData(:Asia/Dubai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.883092265054605
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELzE5FNMXGm2OHnz8eoHvZT5lxV/uUQwGN0VQVFv:SlSWB9eg/+L/EJDm2OHnz8eoHvZT5rdI
                                                            MD5:4DF975C040D78FA8F9C92E5565D63A73
                                                            SHA1:48488F076871530D32278084F1C9CB90CB1E6AB4
                                                            SHA-256:9FAC69DC609CC6074ECD67E0BE8AE62E33D8D9C7F055A3E0DEE1430C7FFC54F6
                                                            SHA-512:880B920FB51F48731BA8C741B9583038A3276221C55F1CE0B464D2797D71EF9D22B4E166841BAB0544B7091CE683697BFCA5A4235FF1E6264B0619DBDD4BB619
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Maldives) {.. {-9223372036854775808 17640 0 LMT}.. {-2840158440 17640 0 MMT}.. {-315636840 18000 0 +05}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):272
                                                            Entropy (8bit):4.5144164346164715
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/+L/GDm2OHlNnoH9SvulvSNFF+c0FSFFMVhvSNFFVBjvVFSFFVGlvSN:MB86+L/CmdHlNnCy6qB0FScZq9BjVFSL
                                                            MD5:05362B6A17C5F4F4E8CBE5A676D5D0DE
                                                            SHA1:84675D5E8D1425A5E9DB07D1BC1E6A5921B5AC91
                                                            SHA-256:A2B1B93CBEECBD900ED71E61A4932509EB52688E97A6015DAD067066D0D42072
                                                            SHA-512:351D2BC5F5888D8E842BF160D11D57E059811186D63B0413061768C7FE348CECB700748A0C0125F0ABCBB039FC74FF7BEEFDD42088BA1E28C785E545ED2CDF24
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Mauritius) {.. {-9223372036854775808 13800 0 LMT}.. {-1988164200 14400 0 +04}.. {403041600 18000 1 +04}.. {417034800 14400 0 +04}.. {1224972000 18000 1 +04}.. {1238274000 14400 0 +04}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.828945679595274
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6ELzO1h4DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/+L/O1hm
                                                            MD5:8ABBEC0E138C1A68CB5D096E822DE75E
                                                            SHA1:E9C5CE1A249F6DC0F6EDBB3F5B00F3106E3BD6CA
                                                            SHA-256:845C45FD7B6F0604B03A3C72DB117878B568FB537BCA078304727964157B96AB
                                                            SHA-512:15790CCA70140D3139F3E2A202DC8F12E68466A367C68458D6A78CDDC7822FB5EDB87D630926B51F3DE48D95DE7CA3FCB946CD7B762FE5B15866DAA9DBA40B46
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Mayotte) $TZData(:Africa/Nairobi)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):173
                                                            Entropy (8bit):4.825214661273383
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8DeXHAIgN6S7ARL/+L6ELsAceh4WFKQ3n:SlSWB9vsM3yj+HAIgMS7AN/+Lj4wKQ3
                                                            MD5:7B22FE05231A5721C939B6018F8A2814
                                                            SHA1:E272C25E79ABE705B2DB106D70DEAB3245EA9D35
                                                            SHA-256:5560B0D4A2D8A13D9FE9787FFFE31200D405A8C875F046C8FDDF850AF98662B6
                                                            SHA-512:26244855D029151B84A4D57E2FA69632B4F19F8C00B2E500A394D76A29857BE2A412344794BA0DFF50A2863FF17889210A151D0E231A67E55091F4909EC4AE79
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dubai)]} {.. LoadTimeZoneFile Asia/Dubai..}..set TZData(:Indian/Reunion) $TZData(:Asia/Dubai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):166
                                                            Entropy (8bit):4.809541513808179
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8g5YFeovXHAIgNqjyVHRL/+XiMr4WFKBpv:SlSWB9vsM3yA5oPHAIgcjeHN/+Xvr4wY
                                                            MD5:A90C26358FEF60E49044E3BE02866FAC
                                                            SHA1:137AC8CCA23F39E7A16C4050EA9A3A8731E9AAD7
                                                            SHA-256:FE7F4453CB5F6B81B23C1C795356B91FE319F0762BE7868FAFE361DB1F9C2A2B
                                                            SHA-512:D6C74CACF69D29E14CB46E5DD885234AC50EE2E258E0C5E3AC76465061622F064F974D33E91A6A020B9D618D90799DDA6EB1EA53022EDB6E26A9CB6ADFE0AA30
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tehran)]} {.. LoadTimeZoneFile Asia/Tehran..}..set TZData(:Iran) $TZData(:Asia/Tehran)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):177
                                                            Entropy (8bit):4.8290104377288925
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/+WXnMr4WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/+zr4wKY+
                                                            MD5:6BCC43951637D86ED54585BE0819E39C
                                                            SHA1:6F04F306B3AB2A6419377294238B3164F86EF4A3
                                                            SHA-256:805105F5F17B78929F8476BAE83ED972128633FF6F74B7748B063E3C810C27A6
                                                            SHA-512:ABB9F4308BF4BD5C62C215A7ECD95042CBFB3005AF1E75F640962B022574C930DD5A12CD0CE0AF8A3D7E38B999E37C3A45A55091683F6A87E9D0CDA9EE417293
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Israel) $TZData(:Asia/Jerusalem)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.722012123002917
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx00EIECWXHAIg200EIE/vHRL/9S//2IAcGE0EIESvn:SlSWB9vsM3y795VHAIgp95HN/029095c
                                                            MD5:1F020341AD51AA82794B8018F214DE0D
                                                            SHA1:4414E56C1277B4D31FE557F8652D522C0594F4B2
                                                            SHA-256:F01B00D52BD7B2694BF5CB55A17028C30A41BD22A774CA54740E8B1DDE4FCB2E
                                                            SHA-512:CC41848A851D4992AE9F27C38669CB87CE2FD05A33AB6989EA21AFCB1A2707DE0CB4D62BCC45E536DD944859991D7564847205F47509A42D41932370496A77D7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Jamaica)]} {.. LoadTimeZoneFile America/Jamaica..}..set TZData(:Jamaica) $TZData(:America/Jamaica)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):164
                                                            Entropy (8bit):4.8422204749795545
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8aofXHAIgNqsRL/9hM7/4WFK9vn:SlSWB9vsM3ypPHAIgcsN/4r4wKNn
                                                            MD5:9554A65BFFCFFCFB2C1588569BB4638E
                                                            SHA1:B377ECB04586396D37093856AEF8BBDC93192F66
                                                            SHA-256:98DBD07AE3B9251B9091F4D265336CE98BDFB492AF863C1F3FF25248A2CADF35
                                                            SHA-512:E2E761B8B1995B68721BC714A546E0F45EEC025FAF81DE579FF0D73D37783D0E031B9E78BA2FAC6B097E3673C47AFB8761FBC58E42E33018FD44B77F2871E0C6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tokyo)]} {.. LoadTimeZoneFile Asia/Tokyo..}..set TZData(:Japan) $TZData(:Asia/Tokyo)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.810216093939366
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG1/EOM23vXHAIgObT1/EOMH6RL/8/FMKpUDH1/Ex:SlSWB9vsM3yc1EiPHAIgOb1E+N/8xMEx
                                                            MD5:05C0C40F2AA456F580EAAFC4F7E49B56
                                                            SHA1:5796A9122693B2D6010BC5E617A6091F46330B0C
                                                            SHA-256:85E95363ACF468043CD5146927A97B2D9E3B141EDA0A7993DADA9382D1D6DD54
                                                            SHA-512:2155F8E3EB73312F0AFD5CDDF4B19EBB67A15658101870C2CEDF96955470DBC7B30F34E143D9C14CBFA7A138F63324009581BD0B807AE295C68588CA0470D7AD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kwajalein)]} {.. LoadTimeZoneFile Pacific/Kwajalein..}..set TZData(:Kwajalein) $TZData(:Pacific/Kwajalein)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.829980800076139
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsbKJqYkyXHAIgNGEnKJp0ARL/7beDcbKJ6v:SlSWB9vsM3y7JSHAIgNTxAN/PeDE
                                                            MD5:4D44D88336212E162CCEFADE6321EDBC
                                                            SHA1:B9EE7AFE26DC61AA9EA37EB99A3C10DD176E8063
                                                            SHA-256:F776839C1999056E6A0D2ECFDF9054FC309454AFDFF8E8BC803F33EC423B7361
                                                            SHA-512:FDDCBD194DE07B51DEBBDEF4FD96762EE3507117443FB9F7975FB56E0AE97B0D1F8657FE26B092021FB12B5A5D3EFFAB9E0A54B1C2AFCEC1029855442A0A95AB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Tripoli)]} {.. LoadTimeZoneFile Africa/Tripoli..}..set TZData(:Libya) $TZData(:Africa/Tripoli)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7736
                                                            Entropy (8bit):3.799706947156251
                                                            Encrypted:false
                                                            SSDEEP:96:aJCP8D3pCS2JWk55EyqJNSPTub3NDOyFyJYVtLbTxdqs0xcQVq+O7JSAmwQZjltB:FSyWBSPTujlOyqc3JuzVNvTN
                                                            MD5:02B993B4A6956014A2DB844E8A5498C0
                                                            SHA1:378333547254AC43BEB4FA2CBC24B8DE241B3078
                                                            SHA-256:DF45F5414F1636B1856C7534BB5F3D4387C32D56283A68BB47D8C48C1DDAD5BC
                                                            SHA-512:CC3ABCC1FB5ABD10A685F140931DE38D6875142D3595F8D9A581F5B31A7F354FA4CCC9727B69F58E0D2F773EA0F76D9ACFDF7ACBAFC6BAA6E93A46EAE8F18672
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MET) {.. {-9223372036854775808 3600 0 MET}.. {-1693706400 7200 1 MEST}.. {-1680483600 3600 0 MET}.. {-1663455600 7200 1 MEST}.. {-1650150000 3600 0 MET}.. {-1632006000 7200 1 MEST}.. {-1618700400 3600 0 MET}.. {-938905200 7200 1 MEST}.. {-857257200 3600 0 MET}.. {-844556400 7200 1 MEST}.. {-828226800 3600 0 MET}.. {-812502000 7200 1 MEST}.. {-796777200 3600 0 MET}.. {-781052400 7200 1 MEST}.. {-766623600 3600 0 MET}.. {228877200 7200 1 MEST}.. {243997200 3600 0 MET}.. {260326800 7200 1 MEST}.. {276051600 3600 0 MET}.. {291776400 7200 1 MEST}.. {307501200 3600 0 MET}.. {323830800 7200 1 MEST}.. {338950800 3600 0 MET}.. {354675600 7200 1 MEST}.. {370400400 3600 0 MET}.. {386125200 7200 1 MEST}.. {401850000 3600 0 MET}.. {417574800 7200 1 MEST}.. {433299600 3600 0 MET}.. {449024400 7200 1 MEST}.. {465354000 3600 0 MET}.. {481078800 7200
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):111
                                                            Entropy (8bit):4.902637155364683
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/6xtNMXGm2OHrXV4foAov:SlSWB9eg/6lDm2OHrCAAov
                                                            MD5:36119516E87814F3C219193069CD6A90
                                                            SHA1:BDB25531B30E6FC454100F37177EC9D4A0FB4E39
                                                            SHA-256:E57746D5DB479A8B30973F2BC16E2B8DFB6E2BFAECBFF0FB956F04526E4B935B
                                                            SHA-512:2730C5DABA0B2CCFD32A799C48EE07351659F51B9C2B91DCD145675AF276F2D0B5AA51ACF7D283C0DC236D3AFA3A75E58EB9F970B1831A6E36F02139CAF6A655
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST) {.. {-9223372036854775808 -25200 0 MST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8505
                                                            Entropy (8bit):3.8405400251137207
                                                            Encrypted:false
                                                            SSDEEP:96:T1ktwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:TswDPlLv/PCenJzS6cy
                                                            MD5:87B3BCD4A793BA383889ECFDB44C846E
                                                            SHA1:3EA34B5E6E3078A9501653BA069D5E5E879D7FE4
                                                            SHA-256:A5DEB89D59613D9A54C1E146056A805B3DE9F2A2593AEC2B8A25F863328699C0
                                                            SHA-512:AA4DAC2614661EF18A2A60A5BD4D5BBBCCB5D721F90A25E9D11C5B6AF8C39FD475B3E23894719E2F8F74469F13D5492FF31DDD193D9E3172182FBCBCDD860A41
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST7MDT) {.. {-9223372036854775808 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1 MDT}.. {247046400 -25200 0 MST}.. {262774800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.884776849010803
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/6AdMSKBbh4IAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/68K5h490m
                                                            MD5:3050A0100A2313C1D3AB4278B464F17A
                                                            SHA1:1A140447B3972900F13768659FD6979F68126E97
                                                            SHA-256:F8CA38A845CD01BF785EE222277DAD9325AB6BD17E44A362C450855AEB522814
                                                            SHA-512:C91C4BF2318C50D473E6051855C12F0E11CBAA8580B88115CDDE054D36476A1D8DDC5D17A7A123BD84148C20B96BD839511EAD573F5FD2C9A8556646B9CDE5E5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:Mexico/BajaNorte) $TZData(:America/Tijuana)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):191
                                                            Entropy (8bit):4.8897674180962145
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0zjRJ+ovXHAIg20zjRJ8yHRL/6AdMPCoQIAcGEzjy:SlSWB9vsM3y7zjRJvHAIgpzjRJ8yHN/Z
                                                            MD5:FAFD9727A0E153AFCB726690D215DA76
                                                            SHA1:3CD3B2737FC781F38DE26E255968CBB88B773CBF
                                                            SHA-256:2E6E32A40487F0146B59150B66FF74901CA853B12D47922819AF23EEA5B4149C
                                                            SHA-512:76D110494D4EB76961C818B2A2CCB2303B31DA161664FA712C87B95B81DE7B8F3E50DC7B2836C6ECC6437AE9595668E62E4E706F1B343EFEA12C32210F113540
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mazatlan)]} {.. LoadTimeZoneFile America/Mazatlan..}..set TZData(:Mexico/BajaSur) $TZData(:America/Mazatlan)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):200
                                                            Entropy (8bit):4.877941255622543
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y7zBDSHAIgpzBx6N/6BXl490zBf:MByMYzppzH6t6Bi90z1
                                                            MD5:29ACBFCD0FD521EC0C9523906B9E2252
                                                            SHA1:BBC1AD3F78CAA634A2F0BC38059975EF8E4A2CE9
                                                            SHA-256:2DFF1B83FECFAD5C27EC47B206696C29B91398F8185B5D406A66FA9E0AECA93F
                                                            SHA-512:802502010CFB6F1F4E60C22ECB0E6CA22750975E5838BE7E7DC9D12EA019CB6508F0F87465A113A98356CC9E145E32E6633AE2B45B93412A358C4AD13E923EFE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mexico_City)]} {.. LoadTimeZoneFile America/Mexico_City..}..set TZData(:Mexico/General) $TZData(:America/Mexico_City)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.888611285267583
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG/u4WXHAIgObT/KvRRL/5E1nUDH/uov:SlSWB9vsM3ycqXHAIgObOvRN/iy
                                                            MD5:92548E239012515D756E002768CA876A
                                                            SHA1:6BDC73DBD7356C3F82C5C76E6E2D58656FA9E21D
                                                            SHA-256:E22D629D53C54960AD156C377DE0AE461C27F554990A3D1305724CA8F869BCE4
                                                            SHA-512:42AD074EE08E083EE91270F203707698A8B3308005C94514B8B2D950F4C6F0B37D7D32973EC9F6AB49A0875209076FB40341B31433A27E47B3CC0EA711ECE321
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:NZ) $TZData(:Pacific/Auckland)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):181
                                                            Entropy (8bit):4.881663364410736
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9WQ+DyXHAIgObT9WQiovRL/5AmtBFB/pUDH9WQg:SlSWB9vsM3ycwQ+DSHAIgObwQTN/zzJ7
                                                            MD5:3811C133C6311E33FDAF93660E1EAED5
                                                            SHA1:64756FF877B2EB91BAED2889B3924DAB6784DF43
                                                            SHA-256:83F4CA3522B64F9B151EDEFAE53E0F28C2E6C4CE16D0982186B3344F2A268724
                                                            SHA-512:7724D6CD08E13E116CCDF073F86CE317C0D4A849C5FE81DF3127D435704507FBF554BFC6E7A50CCA3852F6001D8654B7FF90466878DB8C3298338BE16149FD32
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chatham)]} {.. LoadTimeZoneFile Pacific/Chatham..}..set TZData(:NZ-CHAT) $TZData(:Pacific/Chatham)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):177
                                                            Entropy (8bit):4.8545620422964015
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/5vf1+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/pd+90+B
                                                            MD5:5E9F3294F68873BF503F3DDDDF6713B0
                                                            SHA1:954CD6F123C043E64F5E49733327E2C78877BDFB
                                                            SHA-256:2CC8CE235F2EE3160E6AFD04A4E28AA0312494EBB6FED08D8CC81D414EC540EE
                                                            SHA-512:200FC489989CA57219D5B28FB135BE5BDAC67239F3D243C496545D86D68089E51856CEAC4D2E700C0E47BAE4D5FEAB18A367C554235615B2B860F4E5E1BB08C3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:Navajo) $TZData(:America/Denver)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):171
                                                            Entropy (8bit):4.902914099699953
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/nL75h4WFKdy:SlSWB9vsM3yMPHAIgO8AN/H5h4wKU
                                                            MD5:87C439DC623BF5C7EB01ADA6E67FB63A
                                                            SHA1:1CC357558E09CDEA49F821826D2AEA9A6EF2C824
                                                            SHA-256:6A5BAA9CA54B2A2C6D21287443BE0B1064AA79B5C4C62939933F8A0AD842B73E
                                                            SHA-512:E628B8F1C967AABAEFBB68A33416F6FE47422970BA18414BB3396AC063E65A4DC892595D4071395194AF320633EE915A494E1F8D4216EE8194A034739D275C49
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:PRC) $TZData(:Asia/Shanghai)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8505
                                                            Entropy (8bit):3.836877329152454
                                                            Encrypted:false
                                                            SSDEEP:96:0KhTG0hjvZkR/bvtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:0sG0U9bFzN6IkWq/WHQt/RY4yP
                                                            MD5:45E7E9E183A990F56E17C04FA48CE620
                                                            SHA1:A1F39E0ECEA3C64E761A9A3159E331FA51B625F9
                                                            SHA-256:D148708F1E70EEFA51E88E5823776CBE710535D4D6D6356E7753A44463A1C5AB
                                                            SHA-512:1D1F4BA90D07D7EE12DFD0E37DBFD5410A4EAFFBA8960B816FDD5963CD6B20938080A4248E7B249AAE02F068E817AB9A85735D226F7DA8DD2C5462A70B18E8EF
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:PST8PDT) {.. {-9223372036854775808 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-84376800 -25200 1 PDT}.. {-68655600 -28800 0 PST}.. {-52927200 -25200 1 PDT}.. {-37206000 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):909
                                                            Entropy (8bit):4.042826306713664
                                                            Encrypted:false
                                                            SSDEEP:12:MB86HbmdH2oVCvcCfdf3NaDyTb6Dye78ubUt1NEUtszIVbUtoUtoUt3mbUt4qUt6:Yekv5fcfem+Cuy
                                                            MD5:E5B913965F72AB807BAE67BD20C0A699
                                                            SHA1:2161B73EC868C8D18C09970766D19A8583FF7981
                                                            SHA-256:983884249ACC11C3FE740D78E72B1A89BE9C8B077283549BF6BCD8C93FA71731
                                                            SHA-512:F8807C52DB852C48C62F25569C990C31D977BC7D0DF502CF2B92F9ED6BCB89A6DD8A6758FBD1185E0B5C34DE5450D5C748B71760AC93E72DC3976B3B31D1A605
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Apia) {.. {-9223372036854775808 45184 0 LMT}.. {-2445424384 -41216 0 LMT}.. {-1861878784 -41400 0 -1130}.. {-631110600 -39600 0 -11}.. {1285498800 -36000 1 -11}.. {1301752800 -39600 0 -11}.. {1316872800 -36000 1 -11}.. {1325239200 50400 0 +13}.. {1333202400 46800 0 +13}.. {1348927200 50400 1 +13}.. {1365256800 46800 0 +13}.. {1380376800 50400 1 +13}.. {1396706400 46800 0 +13}.. {1411826400 50400 1 +13}.. {1428156000 46800 0 +13}.. {1443276000 50400 1 +13}.. {1459605600 46800 0 +13}.. {1474725600 50400 1 +13}.. {1491055200 46800 0 +13}.. {1506175200 50400 1 +13}.. {1522504800 46800 0 +13}.. {1538229600 50400 1 +13}.. {1554559200 46800 0 +13}.. {1569679200 50400 1 +13}.. {1586008800 46800 0 +13}.. {1601128800 50400 1 +13}.. {1617458400 46800 0 +13}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8772
                                                            Entropy (8bit):3.900078030355782
                                                            Encrypted:false
                                                            SSDEEP:96:pj4hKuZaqaaiFKgjGeGV3atL67G9kJGsU+mpe7Vy:Cla1KgjGeGcQMsa
                                                            MD5:8174D7205622711F58E0B515246FE89D
                                                            SHA1:9777B2633ACF5588268D5072F817E65C879358AC
                                                            SHA-256:201CFADB00FBCD3283249DAD73872ED75C5BEC07F5A5B157726638C20728B833
                                                            SHA-512:64121ED1EE70D5423710319E806B19261576AECC89A64CBEC44A29BF4AC9FEE21C6484CC3C4550CC92C315B3855BE265F696F8CD4D95027226D608B3ADD022F1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Auckland) {.. {-9223372036854775808 41944 0 LMT}.. {-3192435544 41400 0 NZMT}.. {-1330335000 45000 1 NZST}.. {-1320057000 41400 0 NZMT}.. {-1300699800 43200 1 NZST}.. {-1287396000 41400 0 NZMT}.. {-1269250200 43200 1 NZST}.. {-1255946400 41400 0 NZMT}.. {-1237800600 43200 1 NZST}.. {-1224496800 41400 0 NZMT}.. {-1206351000 43200 1 NZST}.. {-1192442400 41400 0 NZMT}.. {-1174901400 43200 1 NZST}.. {-1160992800 41400 0 NZMT}.. {-1143451800 43200 1 NZST}.. {-1125914400 41400 0 NZMT}.. {-1112607000 43200 1 NZST}.. {-1094464800 41400 0 NZMT}.. {-1081157400 43200 1 NZST}.. {-1063015200 41400 0 NZMT}.. {-1049707800 43200 1 NZST}.. {-1031565600 41400 0 NZMT}.. {-1018258200 43200 1 NZST}.. {-1000116000 41400 0 NZMT}.. {-986808600 43200 1 NZST}.. {-968061600 41400 0 NZMT}.. {-955359000 43200 1 NZST}.. {-936612000 41400 0 NZMT}.. {-923304600 4320
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):280
                                                            Entropy (8bit):4.715653436088026
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/FtTfDm2OHHhp5oHvZiuo2HvDVeEU8vScH9syZEizy:MB86FtTLmdHf5CvZiIvJeJ8HH9F6izy
                                                            MD5:4E858B3754BD8864719A61839ACA64E6
                                                            SHA1:597025A8DAFD5AE75EBD162AC0E9DA71815816BA
                                                            SHA-256:2D3BFDED297214BA25CFD8C6F508D0C8B1A1CD7D46701A78EC5E510076185EB6
                                                            SHA-512:720F301B73C852EA8EEFA79DEF6B6762554E50222DE114FE87EB5178507F1895A9A39B3872A1A4B9DFF58D1CC6460BA4A82F2C165E3659E13036451F22E389C3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Bougainville) {.. {-9223372036854775808 37336 0 LMT}.. {-2840178136 35312 0 PMMT}.. {-2366790512 36000 0 +10}.. {-868010400 32400 0 +09}.. {-768906000 36000 0 +10}.. {1419696000 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8165
                                                            Entropy (8bit):3.6566720439018874
                                                            Encrypted:false
                                                            SSDEEP:96:gpvlGCcn6AadFurBrioCdL49mq9X4a2t3I/KVE:gOCBdFurBr0soaz
                                                            MD5:8105A806A1762932897AB59C47BBE89E
                                                            SHA1:386E41A4A83FA84DBFCA994F679242D067CEED64
                                                            SHA-256:CA0EEF84DBC5964EF2265E9252237BE58BB8D75C34817CC2305CCCFAEC7E690C
                                                            SHA-512:8A609E7F4868BD455DA811E62142FECD792D0CA0DAAF7C10C4E4254C9EC44B8EB92D388D9224C8FD3CC3FB326A106D831B80F5E1264CCF3EABBCE177BB82E9D6
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Chatham) {.. {-9223372036854775808 44028 0 LMT}.. {-3192437628 44100 0 +1215}.. {-757426500 45900 0 +1245}.. {152632800 49500 1 +1245}.. {162309600 45900 0 +1245}.. {183477600 49500 1 +1245}.. {194968800 45900 0 +1245}.. {215532000 49500 1 +1245}.. {226418400 45900 0 +1245}.. {246981600 49500 1 +1245}.. {257868000 45900 0 +1245}.. {278431200 49500 1 +1245}.. {289317600 45900 0 +1245}.. {309880800 49500 1 +1245}.. {320767200 45900 0 +1245}.. {341330400 49500 1 +1245}.. {352216800 45900 0 +1245}.. {372780000 49500 1 +1245}.. {384271200 45900 0 +1245}.. {404834400 49500 1 +1245}.. {415720800 45900 0 +1245}.. {436284000 49500 1 +1245}.. {447170400 45900 0 +1245}.. {467733600 49500 1 +1245}.. {478620000 45900 0 +1245}.. {499183200 49500 1 +1245}.. {510069600 45900 0 +1245}.. {530632800 49500 1 +1245}.. {541519200 45900 0 +1245}.. {56208
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):202
                                                            Entropy (8bit):4.943709180393636
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/ZE/4pv:MByMdNXiU5tVv
                                                            MD5:7D9980F68F044EB9B7FA7ED2883645F2
                                                            SHA1:9444DA9D3139F51C6DFDA174C8C52A231215D71E
                                                            SHA-256:F324CA637180F50DB79FFA25204D974C6A7A6FAEFDA69FD1A280B9F366349A09
                                                            SHA-512:850577ABD3A3653076797D46AF481343CDF8103AC597EB68F575C5FF4931242C6ACEB054D14E0F6A9A90E5D22069F78027215A4E44FC900292445FDEAFB8F92D
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Pacific/Chuuk) $TZData(:Pacific/Port_Moresby)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8203
                                                            Entropy (8bit):3.5469404823178463
                                                            Encrypted:false
                                                            SSDEEP:96:QXn3AWkHkPp2YXaVU+POtUn4n6MSmSmiTpk9eL6Z5waKkhWILTc:QXn3AWJB2m+POtUnOSmSmS6ZaILg
                                                            MD5:002F3607DE2061A2E1A8EB8EBCB6E492
                                                            SHA1:6521B47847CFA76FE45AE5CC649109E4AD6C5262
                                                            SHA-256:D79A2A67606F25D6420F31129FAE966A54287DE96C661003CCE5F82B618014BC
                                                            SHA-512:03F3F262538FAF5A1B38832EFA62E3CC41A70BF54E73DE59BC99DCCA035AB002142F42BEDA5BFC2102CD556601E0A278908FDCC838A2211AC63C49A8483CE72B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Easter) {.. {-9223372036854775808 -26248 0 LMT}.. {-2524495352 -26248 0 EMT}.. {-1178124152 -25200 0 -07}.. {-36619200 -21600 1 -07}.. {-23922000 -25200 0 -07}.. {-3355200 -21600 1 -07}.. {7527600 -25200 0 -07}.. {24465600 -21600 1 -07}.. {37767600 -25200 0 -07}.. {55915200 -21600 1 -07}.. {69217200 -25200 0 -07}.. {87969600 -21600 1 -07}.. {100666800 -25200 0 -07}.. {118209600 -21600 1 -07}.. {132116400 -25200 0 -07}.. {150868800 -21600 1 -07}.. {163566000 -25200 0 -07}.. {182318400 -21600 1 -07}.. {195620400 -25200 0 -07}.. {213768000 -21600 1 -07}.. {227070000 -25200 0 -07}.. {245217600 -21600 1 -07}.. {258519600 -25200 0 -07}.. {277272000 -21600 1 -07}.. {289969200 -25200 0 -07}.. {308721600 -21600 1 -07}.. {321418800 -25200 0 -07}.. {340171200 -21600 1 -07}.. {353473200 -25200 0 -07}.. {371620800 -21600 1 -07}.. {384922800
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):789
                                                            Entropy (8bit):4.0457106900970325
                                                            Encrypted:false
                                                            SSDEEP:12:MB86HmdH6mvCON3Xj/kw2eX/xtDedjX24ots0FX2ud5KRGkpFxy:uegazZBzCdXUFQzy
                                                            MD5:6841B8A2FB9BBF464AA00088CBDCEC80
                                                            SHA1:26CC5CCE00A765F8B6493ED24F50957AA7F0089B
                                                            SHA-256:332372E5EFB46123FBB66F9F32F91B59EBD88ADB956249DB3F14CAAB01CE2655
                                                            SHA-512:A6C67A0F7361E599369597E9A8A52FC7D5C96DE6B5A7C1BE1D02F5DF11051F448289786C7F0E82E71CDEB825215E64E072CF034C45D6E2F822D7201AB8B41B57
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Efate) {.. {-9223372036854775808 40396 0 LMT}.. {-1829387596 39600 0 +11}.. {125409600 43200 1 +11}.. {133876800 39600 0 +11}.. {433256400 43200 1 +11}.. {448977600 39600 0 +11}.. {464706000 43200 1 +11}.. {480427200 39600 0 +11}.. {496760400 43200 1 +11}.. {511876800 39600 0 +11}.. {528210000 43200 1 +11}.. {543931200 39600 0 +11}.. {559659600 43200 1 +11}.. {575380800 39600 0 +11}.. {591109200 43200 1 +11}.. {606830400 39600 0 +11}.. {622558800 43200 1 +11}.. {638280000 39600 0 +11}.. {654008400 43200 1 +11}.. {669729600 39600 0 +11}.. {686062800 43200 1 +11}.. {696340800 39600 0 +11}.. {719931600 43200 1 +11}.. {727790400 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.82787610497142
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG11avXHAIgObT11ORL/nUDH7/UDH11B:SlSWB9vsM3yckHAIgObON/h
                                                            MD5:CD1AC50AADC3CF9C0E7A055D587E790D
                                                            SHA1:BEE0E16D3954DF33C697DEA469A130BD9875AB8B
                                                            SHA-256:790E6B48B261D6DEF7D183CC8F38FB8D8A6E3EFB8844281EFABB2DFD621E53B5
                                                            SHA-512:B6A93DFB4CBE2F35268AACA88FDCC4D19949A2E8DC9464D8341C38065C6FF48A3C49FE756FFCE777C8F806DE309C8AFC4CE4BC4ABD183C28808F995A0F89B091
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kanton)]} {.. LoadTimeZoneFile Pacific/Kanton..}..set TZData(:Pacific/Enderbury) $TZData(:Pacific/Kanton)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.913439535905759
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDH4ErKYofMXGm2OH18VkeoHvmUENBBy/aCPFVFv7Dy:SlSWB9eg/BE3ofDm2OH1VeoHvmH7y/Fy
                                                            MD5:6250F332356787613A2D1853EF6D1AC3
                                                            SHA1:0464B9EE8B691990022295D2DEFE1AAE4B247E63
                                                            SHA-256:336058DCA4802C79ED43F6177ADB73085D4FA0754B94051CAE2A19346B0C4904
                                                            SHA-512:B8FAB5E128D2EF3CB7050DA717D80247045BE09F7F6542AA154CB85F4A56884F195EE2776421890A3F86D133106DCA4672D7D9329E0DE6F4A7CF8F4030822988
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fakaofo) {.. {-9223372036854775808 -41096 0 LMT}.. {-2177411704 -39600 0 -11}.. {1325242800 46800 0 +13}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):986
                                                            Entropy (8bit):3.950865906618592
                                                            Encrypted:false
                                                            SSDEEP:24:CKeaEa+TkUqOL1X7dMUhSXUmxY8yiUKEMH0Mkxu:9pW15Mmk59NQMk0
                                                            MD5:E329ACBF859B35950B27F434D725B3F8
                                                            SHA1:9B46C4318CA0F03E016F8FF68FEE50EA93B22360
                                                            SHA-256:0FF7AF55C92806751473CBF7A55E860850719BA7255CD65FD630B99E05C7C177
                                                            SHA-512:84A7491E2C8A6866B40A3673C084ABF3F1E344CB0290C607A0BB06FF19D43EF0B9648CDA6489D10C410D39C700D8C62A8BA11EEF07AD36F5A9AD85C596205939
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fiji) {.. {-9223372036854775808 42944 0 LMT}.. {-1709985344 43200 0 +12}.. {909842400 46800 1 +12}.. {920124000 43200 0 +12}.. {941896800 46800 1 +12}.. {951573600 43200 0 +12}.. {1259416800 46800 1 +12}.. {1269698400 43200 0 +12}.. {1287842400 46800 1 +12}.. {1299333600 43200 0 +12}.. {1319292000 46800 1 +12}.. {1327154400 43200 0 +12}.. {1350741600 46800 1 +12}.. {1358604000 43200 0 +12}.. {1382796000 46800 1 +12}.. {1390050000 43200 0 +12}.. {1414850400 46800 1 +12}.. {1421503200 43200 0 +12}.. {1446300000 46800 1 +12}.. {1452952800 43200 0 +12}.. {1478354400 46800 1 +12}.. {1484402400 43200 0 +12}.. {1509804000 46800 1 +12}.. {1515852000 43200 0 +12}.. {1541253600 46800 1 +12}.. {1547301600 43200 0 +12}.. {1573308000 46800 1 +12}.. {1578751200 43200 0 +12}.. {1608386400 46800 1 +12}.. {1610805600 43200 0 +12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):4.770127787944403
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGqhyXHAIgObTq0vFvRL/nUDH4QwyFPUDHqNn:SlSWB9vsM3ycmhSHAIgObmSN/BCLNn
                                                            MD5:BBB00369FA8DCC23A7824EDB964BF48D
                                                            SHA1:A97E42B3CC45860CC0DFC62F468B24A628B43973
                                                            SHA-256:AFFB0A5D9CBD5949F2FC5047820FA2A2798F7C303F7BC972EC49CCF27837B00E
                                                            SHA-512:2D4C8616308522C987437C39C74E250973C2AC7AA1499C60321F42E84CE52C28D1F6AE81E6390B116C92C7B208EA0F211EB3C5A86E6E4CEE0620014DE5359F4F
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Tarawa)]} {.. LoadTimeZoneFile Pacific/Tarawa..}..set TZData(:Pacific/Funafuti) $TZData(:Pacific/Tarawa)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):247
                                                            Entropy (8bit):4.687336389955113
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/fEGDm2OHvQYeoHTie7KVQRncRvinrN5/uFifriX:MB86fhmdH0CTV7OcdrN5/uFiGX
                                                            MD5:0557D164DCD8DF5D99F7AF5A2AB1AD4F
                                                            SHA1:68AFD04303E5F541480425405D82E1827F78A8DF
                                                            SHA-256:192545659F971084ADC8489A2B96A6439FF391599DC962AA13375ACCFB3C09D9
                                                            SHA-512:1DA004E51F8E7A712EDE920CBB62E81F9F55450FB52B62F78F1CD4F8F4E342B4DAB2C28AA5161E8B24942A7A5BD55F978AFDA1C5E1949241E71D738079DEF9B8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Galapagos) {.. {-9223372036854775808 -21504 0 LMT}.. {-1230746496 -18000 0 -05}.. {504939600 -21600 0 -06}.. {722930400 -18000 1 -06}.. {728888400 -21600 0 -06}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):155
                                                            Entropy (8bit):4.976931060677737
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5hBYfMXGm2OHKToxYoHsdNfis:SlSWB9eg/DDm2OHPxYoH4qs
                                                            MD5:45330CE0FA604304C6ACF8EF8CAF51EC
                                                            SHA1:20EEF9646996C2EC9B2641EBCCBE4766BF38B17B
                                                            SHA-256:190E02A0C00D165FA45C73AEF9C0D6C82B1720E7406E5610DD860AED10A021A5
                                                            SHA-512:51C7931B503405DA0B4078F6BE411895DD00E86AC7C5BE475030664D5302AD614293541DEE7FFC3D86A9DDB1BDA32BCAA746CF1D207DB063FBA2F9E9BE12836C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Gambier) {.. {-9223372036854775808 -32388 0 LMT}.. {-1806678012 -32400 0 -09}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):157
                                                            Entropy (8bit):4.9796189407775255
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5RyJTLJ5FNMXGm2OHddHvpoxYoHsdMWdHPVtyn:SlSWB9eg/LJHjXDm2OHdFGxYoHgHPLy
                                                            MD5:DF09960360D8CEDCA2A4DC19A177C4A6
                                                            SHA1:9F73F271B8C85B25FE6392B8BF7465C92EFFE621
                                                            SHA-256:161762334DFF48B1D58824911E1FF4171386EA18234DD3DD5B0798515593086A
                                                            SHA-512:1BE9E0F90DA529C99E317F399BFDB913A076651CF8801A1849247B26A350A76D8B5807AB139F3DBB97790DDFC332BDBEB57B364BF67FA2BB440AFEDC4130A648
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guadalcanal) {.. {-9223372036854775808 38388 0 LMT}.. {-1806748788 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):733
                                                            Entropy (8bit):4.244282318063802
                                                            Encrypted:false
                                                            SSDEEP:12:MB862mdHanCTCtBCv1yWQkHHLTaWJ+x+87W0x+8+yWSi+JW7+sWU0dwaW1j+FaW2:FeaC2twvY3knLGs+I87p+8d9i+J7s70c
                                                            MD5:BA319E451BE323C852A8ABFC299DDA28
                                                            SHA1:FC9314C162FF1FE1ED5E2C5DF962A55D4D6D8115
                                                            SHA-256:42CB69ABC83415F63CA7D2A3E5314A41817AEE3206ECCC7172C50A74B1597DB0
                                                            SHA-512:3BF733B9ED2A57B01BE173A8421B2D5A45888A230461EA0BD8C5B4AC7DC010BB527346731196141C70AFECDF88DD47AFE48636243DFC395D88E58231BEDF7D2A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guam) {.. {-9223372036854775808 -51660 0 LMT}.. {-3944626740 34740 0 LMT}.. {-2177487540 36000 0 GST}.. {-885549600 32400 0 +09}.. {-802256400 36000 0 GST}.. {-331891200 39600 1 GDT}.. {-281610000 36000 0 GST}.. {-73728000 39600 1 GDT}.. {-29415540 36000 0 GST}.. {-16704000 39600 1 GDT}.. {-10659600 36000 0 GST}.. {9907200 39600 1 GDT}.. {21394800 36000 0 GST}.. {41356800 39600 1 GDT}.. {52844400 36000 0 GST}.. {124819200 39600 1 GDT}.. {130863600 36000 0 GST}.. {201888000 39600 1 GDT}.. {209487660 36000 0 GST}.. {230659200 39600 1 GDT}.. {241542000 36000 0 GST}.. {977493600 36000 0 ChST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):344
                                                            Entropy (8bit):4.640604617840767
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/PeDDm2OHsVVoHvBrai3UNFv+rUXaWFvAHovj/0nvCv7p+v:MB86WXmdH0VCvBz0GOTA0/0y74v
                                                            MD5:F3F0E64655FAA79E40860765EEBB5B77
                                                            SHA1:7F6C2FC100AEABC26B7205AB53C1E016B12E4D60
                                                            SHA-256:69319015799D32D3CF7C0A3E9991B4B1F3E0C5D1B4FBF400517350CCA9D2C3B7
                                                            SHA-512:7C9238BCCB13B90D4DC9B5E776C421A42C25D21B4E026406F57FA1E70983E8F6BF1CE927AB9D0D6261C5C1802A8B810399F506915262F82F487417CFD704B2F1
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Honolulu) {.. {-9223372036854775808 -37886 0 LMT}.. {-2334101314 -37800 0 HST}.. {-1157283000 -34200 1 HDT}.. {-1155436200 -34200 0 HST}.. {-880201800 -34200 1 HWT}.. {-769395600 -34200 1 HPT}.. {-765376200 -37800 0 HST}.. {-712150200 -36000 0 HST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.844454917943834
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yc6e8SHAIgOb6eKAN/NWyVheo:MByMdniinbtNWzo
                                                            MD5:4244078A03C2493009EF2F6BDA2F326F
                                                            SHA1:AC2FF3E91A8831A479B33DF32A0118BC2EB255D0
                                                            SHA-256:6E52B361AC8A6A578C709F6D58AA7535F06C0CB1707081C2D5A63FA8545D955C
                                                            SHA-512:398B32E0FAF80E40DF3ACD203DF380D61DC39322F0BA0388A18281BC26973945F45683A104B9A785BB9DF5E514322F6994F934289E4B56B7982F94D4528D4272
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:Pacific/Johnston) $TZData(:Pacific/Honolulu)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):208
                                                            Entropy (8bit):4.669308556946547
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/KyXDm2OHEMmzQwXy29BVyv7y/fTVVFty:MB86KyTmdHEZzQUBVyDy/fZvty
                                                            MD5:544A0A83241333805192A6F03888E359
                                                            SHA1:99D2BE79D57B44BD538386F9E7551C9E1874D7E3
                                                            SHA-256:0B1345555EC2B4738CC4DEBFE496C287966F238386263032FF1E27912CCBFBA6
                                                            SHA-512:61C91265632D01FBB7F4C739368756C428258FA6C141E49E88B6C78ABEA6150A74B8DFCF14C5AADDA03C1EA6F04D122734654495C26B8614561786B1C5C7EF10
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kanton) {.. {-9223372036854775808 0 0 -00}.. {-1020470400 -43200 0 -12}.. {307627200 -39600 0 -11}.. {788871600 46800 0 +13}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):219
                                                            Entropy (8bit):4.739672105601744
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/iSDm2OHjkeoHvmLVFFz4YWXfSzvjNv:MB86iGmdHpCvU4VfSbxv
                                                            MD5:1B695BBB9C50F6AFC05F67DE30374160
                                                            SHA1:08AD8BBB6C99EB36FC3E462DB41C6896F52F150C
                                                            SHA-256:4F7235B956A5A01676BE05275E086D5157EBC24FD91022E87817020669F915F7
                                                            SHA-512:DC35CB1C2E5E035A82F91D1B1F4B48D7B112D9B7A1A7DB9C4A4C42C4D58002E1ECD9D24B2EA5B624DBB526ADDF9A8AB37D4315843207C34C16B2EFE33A254752
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kiritimati) {.. {-9223372036854775808 -37760 0 LMT}.. {-2177415040 -38400 0 -1040}.. {307622400 -36000 0 -10}.. {788868000 50400 0 +14}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):394
                                                            Entropy (8bit):4.441317927120857
                                                            Encrypted:false
                                                            SSDEEP:12:MB869nmdHlCTvrvCvKcHwzHHI/HKOjHHwZaLYkcy:2ecrrqvGznISknwZaLxcy
                                                            MD5:B489D7BDE8EB805B2A24726A6FB0C441
                                                            SHA1:7997A33AA56857EC52B1198DBEF4CE1DB50D69FD
                                                            SHA-256:B528E5E712E5F878603183E7CCFF55E5DB97CB47D7628BCB635342796317B899
                                                            SHA-512:4898AC2747FB8620BE29933CC7AA344AF1A3B7777D1AFF08BB4C6CE6E7AF205581937CCB488F3CB39CC8CA7FB42EDC8E1CAD8BADC9FCA40E3CAD23271CD66FCB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kosrae) {.. {-9223372036854775808 -47284 0 LMT}.. {-3944631116 39116 0 LMT}.. {-2177491916 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 39600 0 +11}.. {-7988400 43200 0 +12}.. {915105600 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):304
                                                            Entropy (8bit):4.5947337310364835
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/yEyDm2OH4T2eoHvmfKnOjvScHrkL/Xy2185k0YAov:MB86XmmdHWCv6KOjHHgLN8tby
                                                            MD5:7D1FC9913941693ACBD6A3CCB2F34555
                                                            SHA1:D07C8AAED1DF9614BCA6EEF0F72FB98BE46CF5EF
                                                            SHA-256:38133BE70100D7DC244A680827879E6B240646C7C0B68F58652051E681A71985
                                                            SHA-512:419F0A1D1D71C8F84765C7B54271D7EFD6A81F428751523A214ABB24A8770DD5A7666F634A20AF97D5AAB8F21C0DEF23DCDE068CF4C1CCC7639ABC43864A9DBC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kwajalein) {.. {-9223372036854775808 40160 0 LMT}.. {-2177492960 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-817462800 39600 0 +11}.. {-7988400 -43200 0 -12}.. {745934400 43200 0 +12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.7986219497241995
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGqhyXHAIgObTq0vFvRL/nUDHznHlUDHqNn:SlSWB9vsM3ycmhSHAIgObmSN/QxNn
                                                            MD5:EB409C340A475B60993965A0E2892B6E
                                                            SHA1:819881A078F34EF8FC55D71D829B82C56E6723D7
                                                            SHA-256:935BC00C13863715D09463E54DC2A6FF0F1A7EEA8D5895C87836AA59716CBD57
                                                            SHA-512:A28AF85022F8B3C2EE5F93BF6FDC0C349B73F25D88BA151ACE424EED1A95FA29608A6B1AD3D5FD952B2FB7F48DF6FDF8E6504F2B53E6782E4FF73335AF9A15C0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Tarawa)]} {.. LoadTimeZoneFile Pacific/Tarawa..}..set TZData(:Pacific/Majuro) $TZData(:Pacific/Tarawa)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):159
                                                            Entropy (8bit):4.976348164850869
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHzrHeWNMXGm2OHOx5oHsdNpNFvvIVVFvYy:SlSWB9eg/cHeSDm2OHOnoH4/FvQVVFAy
                                                            MD5:80CB45F42BAB1AA72CD7C7BC394DF3F8
                                                            SHA1:8B5ED2BCCA1AEB41F22AFD14F46533959828B2BE
                                                            SHA-256:AE0B5055C6E57516F23749B13681205EAD376E682959716A457B1377AF8160BA
                                                            SHA-512:71562E340B7A96B91D04FCBCAF71B66EA725CA1BD1094343C4442F8F9A8C67A3BE378034849197407D21C3EE74E2C753B1FD3BAFF2378714B993AD9336236A0E
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Marquesas) {.. {-9223372036854775808 -33480 0 LMT}.. {-1806676920 -34200 0 -0930}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):194
                                                            Entropy (8bit):4.81307101485774
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHz0HvUDHurKv:SlSWB9vsM3yciemHAIgObiecN/Zevn
                                                            MD5:13CE48F8FF74BFCEFCB8D217D6357E38
                                                            SHA1:296D31E3F868934C6EB34BF1BF4C23F3E1839294
                                                            SHA-256:F62C6A2DEC1E9EC78115D5F14E5B9DB7C86F788662D2E68F7E6714F4A05DC974
                                                            SHA-512:778813FC08EF803743F392000BECE73C1C079883DAFC26FAC0AF8FA3FA4AE1D94BA8F3CAA5E82DD4DB1A5F12AD49E123901908F5483E0E325952622AB4C4A26A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Midway) $TZData(:Pacific/Pago_Pago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):244
                                                            Entropy (8bit):4.702705620563736
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/JdDm2OHceoHx6sCH/ZdqvScH9cd0YAov:MB86J5mdH9CMhcHHauby
                                                            MD5:30A8285FCCE2E98889E53DF60B906C3D
                                                            SHA1:C7789CB11A2C8FE3861FF3C0A7A41F6CAFD87631
                                                            SHA-256:22C367F3219B5FC736260D9DBFEF5FCB767F1A6BDA991C9352F790A3D1FFE884
                                                            SHA-512:02DA82680588839B06F820979AECC78B7FBEAB9D6D49176B513B80F1C8BA2D55FB3674B19EFDD574EE6FC01539EF7C3081A4B34D14A54DACF367D816B62E5843
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Nauru) {.. {-9223372036854775808 40060 0 LMT}.. {-1545131260 41400 0 +1130}.. {-862918200 32400 0 +09}.. {-767350800 41400 0 +1130}.. {287418600 43200 0 +12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.846897598147338
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHwMQA3WNMXGm2OH0SNoHoRWVGXyOyovFaSUGFAZvBByV:SlSWB9eg/Jm3SDm2OHJoHFGXCodZUGFd
                                                            MD5:6E8EC957423917AE7A7EF503661C1A77
                                                            SHA1:B4FA3C3E3F96C28B7DB87BFD441D2EE99CC81B6F
                                                            SHA-256:869CCA656BE88E4E7481C75737C3656BAB6924AD1751505815AC719C59269842
                                                            SHA-512:9047ABE673259699C7A548BC7B5636DD646DD382C751B796522F65404162AB1B0BB022FD274653921E5B23C847EE248AEF6749E15ED2CFC1DCE35BBA294D8251
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Niue) {.. {-9223372036854775808 -40780 0 LMT}.. {-543069620 -40800 0 -1120}.. {-173623200 -39600 0 -11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5139
                                                            Entropy (8bit):3.65794255179185
                                                            Encrypted:false
                                                            SSDEEP:48:K/yg8hZbeS07HbbYTqge+gDrWnAxhejtB0e+Pwn1UVimqNQrKvyXrStkCDv:K/y7hNeS07sq0Erk10lINQrKvyXrwv
                                                            MD5:E19700A894AA64715D14F501D8D2FA98
                                                            SHA1:57CFC96E2EBB985720DB290F59181860AF2AC1AA
                                                            SHA-256:5D16C3EF1DB996C1B8E33AD884C33946F77DA872F35F41EC3BD5B288F43CC9AF
                                                            SHA-512:E11EAF2A7B217CDBEECB57635184F04171F0DB088FCC4702AA8D40A3A5453904592F5869849913E2EB02DC5941C84203A76D270E8930B0B691A3B9C39B78BF30
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Norfolk) {.. {-9223372036854775808 40312 0 LMT}.. {-2177493112 40320 0 +1112}.. {-599656320 41400 0 +1130}.. {152029800 45000 1 +1230}.. {162916200 41400 0 +1130}.. {1443882600 39600 0 +11}.. {1561899600 39600 0 +12}.. {1570287600 43200 1 +12}.. {1586012400 39600 0 +12}.. {1601737200 43200 1 +12}.. {1617462000 39600 0 +12}.. {1633186800 43200 1 +12}.. {1648911600 39600 0 +12}.. {1664636400 43200 1 +12}.. {1680361200 39600 0 +12}.. {1696086000 43200 1 +12}.. {1712415600 39600 0 +12}.. {1728140400 43200 1 +12}.. {1743865200 39600 0 +12}.. {1759590000 43200 1 +12}.. {1775314800 39600 0 +12}.. {1791039600 43200 1 +12}.. {1806764400 39600 0 +12}.. {1822489200 43200 1 +12}.. {1838214000 39600 0 +12}.. {1853938800 43200 1 +12}.. {1869663600 39600 0 +12}.. {1885993200 43200 1 +12}.. {1901718000 39600 0 +12}.. {1917442800 43200 1 +12}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):326
                                                            Entropy (8bit):4.531117764974758
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9eg/JcSDm2OHTYoHgnX2czO/FxgV62JFy:MB86JcGmdHTYCgX2czUjgM2ny
                                                            MD5:2F1E92A11DF44C72DC305C13111DEA35
                                                            SHA1:847F551C3D6C75CD2D0D6D87FCF3294CA8DD90B2
                                                            SHA-256:238683C027D2319C33D975A837E9FC9D24DD53B1A67108EDBF7ABDF0DB050881
                                                            SHA-512:E35D8C71AFDBB9A7507E873925001AEDE3734B1D235F509D19952E85279CBCC233A73412EA1F79CB534A45D36FEAA8AFDA98D9964DC93C7892B318F4AFC9A076
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Noumea) {.. {-9223372036854775808 39948 0 LMT}.. {-1829387148 39600 0 +11}.. {250002000 43200 1 +11}.. {257342400 39600 0 +11}.. {281451600 43200 1 +11}.. {288878400 39600 0 +11}.. {849366000 43200 1 +11}.. {857228400 39600 0 +11}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.985607855830399
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHurKeTFfXMXGm2OH2ivkeoHvUPi1TsYoHsdfWTVvvVFv:SlSWB9eg/XecDm2OH23eoHvWieYoHiWB
                                                            MD5:E86D90DAA694B0EAC42F8C01346BC95B
                                                            SHA1:CD29DEFC291C939296E86DC7EF5D0654D85285E8
                                                            SHA-256:CCA96640AB3BC707224FA86D9AF66F9D53A204A97B370B2785BA8208688BF8B6
                                                            SHA-512:937BA420061E3781F831779B458E914A0FC465C4B41796F8B7CB1E548822F5777A6450FC6002AB13EBC5C9F54E374D3ED731D05B2B302B95359BE34094E5062B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pago_Pago) {.. {-9223372036854775808 45432 0 LMT}.. {-2445424632 -40968 0 LMT}.. {-1861879032 -39600 0 SST}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.919381181565273
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHugEZF3fMXGm2OHKvkeoHucRbgnJnoHvmdQ4+vScFAy:SlSWB9eg/Xg2PDm2OHK8eoHTWJnoHvmi
                                                            MD5:2E6C7EC61C7E29A147475C223B163F6B
                                                            SHA1:3A98D3441335224E7EBC0648990BCA1DE3BDF5C6
                                                            SHA-256:97DE6C2C717BFEAD00F83B5D39D654C32CEE580226F5F084484EBAD57BBCE7FF
                                                            SHA-512:5868C43966DDEBA8EC4BBBB29CDFDDFF0C7B01FD4D579FF655F3363029059F969B39C9221190672B6A2F7938583594AA0B103FC2A7ED573E2BC1C3A1623DE8DD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Palau) {.. {-9223372036854775808 -54124 0 LMT}.. {-3944624276 32276 0 LMT}.. {-2177485076 32400 0 +09}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.809907977056877
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuQTWLMbNMXGm2OHUVFvoHvmXUlgloWkcyf/vGpn:SlSWB9eg/XQyLMJDm2OHUVVoHvmXUKm2
                                                            MD5:3F4987676F9C461895EDF9985AD22E06
                                                            SHA1:A96E470209010B837EF5BB3AC93BAE74BF2CCF64
                                                            SHA-256:5D363729A986E24C79F4B817CC88D2B22ACCCE3ADD20138D51C4422C4297AD6F
                                                            SHA-512:988FB98EFD3F57F5D66A932CC6B9D0387E9B0951FC590E08DAF19ACF5E4F39BC1B25265F16E14930BCF394902F5F0EF507E0E91C98902DFB10FA16D716091AB0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pitcairn) {.. {-9223372036854775808 -31220 0 LMT}.. {-2177421580 -30600 0 -0830}.. {893665800 -28800 0 -08}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.7682565894416005
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3ycaJHNPHAIgObaJHa6N/XyopJHYn:MByMdaJyiaJrtCopJ4n
                                                            MD5:1B418E3A4239AAFE1E15B57FFF913FA1
                                                            SHA1:0E278FCC058DE1B3F4715771819F14568A6C10BB
                                                            SHA-256:F744CD8337C5C72023D61F348DD03F48824F817D62F54ACC6A23DDD8B0F9EDC4
                                                            SHA-512:8E3E10B41CF64A07411B272C0BCA6DC7AA9FFBF625B31075651603B7D0A52A719F7174A67593BFDE45725C243D347D01560B2BC7813C2ABD2F4BF4B1BAD57E56
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Guadalcanal)]} {.. LoadTimeZoneFile Pacific/Guadalcanal..}..set TZData(:Pacific/Pohnpei) $TZData(:Pacific/Guadalcanal)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):200
                                                            Entropy (8bit):4.742862539020017
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3ycaJHNPHAIgObaJHa6N/X3HpBJHYn:MByMdaJyiaJrtHpBJ4n
                                                            MD5:514C399D990C87271812440A4B19FB21
                                                            SHA1:E1512482D10C8984DCD69C883F07C412E144081A
                                                            SHA-256:5BB11553F711BD591617F657A9D1811CC3E3FB46374F6867316A7C8F6B3765D9
                                                            SHA-512:DB227134822EA73407B6C0259FF7413D4961B558F3018BFF51E4E426DDB2DF581DCF7A6DE9E4890CE35F785BC3D07CC880DA883C93D73FFB249F403701BD8023
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Guadalcanal)]} {.. LoadTimeZoneFile Pacific/Guadalcanal..}..set TZData(:Pacific/Ponape) $TZData(:Pacific/Guadalcanal)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):190
                                                            Entropy (8bit):4.945354510868153
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuwKXI3SMXGm2OHwdvoHvZUeQTnoo3v/vnqMVVMUMy:SlSWB9eg/X/43SDm2OHwdvoHvZZQTnoQ
                                                            MD5:2CFB7C2A3D26D7AF0F6AE32ADD81C364
                                                            SHA1:80C96E50D23A9A9531E4EE33744CF445C054B901
                                                            SHA-256:124C137B091D9D54D5E0579131485428FAAE040ACC978D20D6A8C8E4DE9889AA
                                                            SHA-512:A215FF5A69BD3E786BD3F8C952C8593396402EFA85005F5342093028617A6862EAE8BFD7B6D5737F90D90897AB62CF785544A4157A222AE4D0F70797FFBEC2CB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Port_Moresby) {.. {-9223372036854775808 35320 0 LMT}.. {-2840176120 35312 0 PMMT}.. {-2366790512 36000 0 +10}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):969
                                                            Entropy (8bit):3.943959457262612
                                                            Encrypted:false
                                                            SSDEEP:12:MB86VrjmdHI5Cvn9HCFkN00hjNFq++UE+q0hwA+A7VxVnDEFn:IeZv8w0MNFq+xE+uAtx1c
                                                            MD5:64AD3A103F4D145C48484BF8FACF41C2
                                                            SHA1:40C00CFA56C87E506C254A93A164D7227DFF3BD5
                                                            SHA-256:5AB006A686E564E30C94884FF8A9D728AEC74681DA8772E9722B6FE203630B5D
                                                            SHA-512:D1088C3B673B5456A8706B69BE4D7AB18615EE53A82BF4ABE76E86700837E6BAD0BD79C13EDA9B04776B08A95B835BA755AA565F86E45BFE507E8783896C1EE2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Rarotonga) {.. {-9223372036854775808 48056 0 LMT}.. {-2209555256 -38344 0 LMT}.. {-543072056 -37800 0 -1030}.. {279714600 -34200 0 -10}.. {289387800 -36000 0 -10}.. {309952800 -34200 1 -10}.. {320837400 -36000 0 -10}.. {341402400 -34200 1 -10}.. {352287000 -36000 0 -10}.. {372852000 -34200 1 -10}.. {384341400 -36000 0 -10}.. {404906400 -34200 1 -10}.. {415791000 -36000 0 -10}.. {436356000 -34200 1 -10}.. {447240600 -36000 0 -10}.. {467805600 -34200 1 -10}.. {478690200 -36000 0 -10}.. {499255200 -34200 1 -10}.. {510139800 -36000 0 -10}.. {530704800 -34200 1 -10}.. {541589400 -36000 0 -10}.. {562154400 -34200 1 -10}.. {573643800 -36000 0 -10}.. {594208800 -34200 1 -10}.. {605093400 -36000 0 -10}.. {625658400 -34200 1 -10}.. {636543000 -36000 0 -10}.. {657108000 -34200 1 -10}.. {667992600 -36000 0 -10}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):4.854594370903023
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG5RFeyXHAIgObT5RV5RL/nUDHtluKpUDH5Rgn:SlSWB9vsM3ycdeSHAIgOb7N/vKbn
                                                            MD5:EFC985F07B24BEDA22993C9D0EA7E022
                                                            SHA1:6D05D12925621F1D05999A5DCC81B8C6F4D18945
                                                            SHA-256:4F6A1C20A11E186012466091CD4B3C09D89D35E7560F93874DEC2D7F99365589
                                                            SHA-512:5FB4D8784D2EB8AEF660D6CBC7C403561EE5874BEC0439762F3688C64830B52B1F557B467CA65B64B1210E82F385E134BF676F3CA443FB480702A2C90B3C3757
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Guam)]} {.. LoadTimeZoneFile Pacific/Guam..}..set TZData(:Pacific/Saipan) $TZData(:Pacific/Guam)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.78073436515702
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHthA5nUDHurK:SlSWB9vsM3yciemHAIgObiecN/NXevn
                                                            MD5:8E335F5D0A2082BB673E7FEB56167A89
                                                            SHA1:EF37235922D4477AC9B3D9576888CDE41E700741
                                                            SHA-256:98D06302EFC18FAD7751F7E5A059FE4ABAFBC361FDC365FE1EB576209D92C658
                                                            SHA-512:2572D99EE8BAF264B8A2EF3D7647D33A387EE83E036F9E7BDB21F64C2FCB43317AF9C899C8CDD822A2A5A207EF17504E71B217370473ED95AE925BBA2CFA90F9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):154
                                                            Entropy (8bit):4.946903999617555
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqhFPMXGm2OHl/oeoHsdNqRU7vV:SlSWB9eg/TTPDm2OHloeoH4qRW9
                                                            MD5:341B0F535043051A91A21297BFA39DC0
                                                            SHA1:6AD9177FC237503E6D36DE5408790A68D5D36E2C
                                                            SHA-256:440A87DDB4F304DCBEAED1B0DE8F6058840E597918B688E0782F584DA03B1BBC
                                                            SHA-512:D97D399A0F1B4347F8AE5F15E43A8787697339AB0EFB4E1106C790528FFC529ADC5B44B231D95449D39DB464D84A5DDF7B61E7D190E3E2B0091D1EC204B530A2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tahiti) {.. {-9223372036854775808 -35896 0 LMT}.. {-1806674504 -36000 0 -10}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):152
                                                            Entropy (8bit):4.969953728206455
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqQ3fMXGm2OHyyFpoeoHvmciRrWFN0UIoAov:SlSWB9eg/T+Dm2OHyyFGeoHvmbu0YAov
                                                            MD5:AA67FBBB6A02F5B30486C54E3A5C11D7
                                                            SHA1:C64FD3654A47A0ECDD681B8A4D9B621AC6D97DBE
                                                            SHA-256:91AA5DA8D5D1E72B1F561D0AEAB4B07E02EDD4EB95AE8C9F1C503C820460599F
                                                            SHA-512:FC170904098011C091622A263CA554CEE952D64888D3573EB324E0A262E1A0C0885C059429F0FFF9219FEB8F1B6B97EC34661DD8DD547124D0C6C0A1C8EE24B7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tarawa) {.. {-9223372036854775808 41524 0 LMT}.. {-2177494324 43200 0 +12}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):451
                                                            Entropy (8bit):4.343299747430587
                                                            Encrypted:false
                                                            SSDEEP:12:MB86PmdHmCdC/V7XZXw8Ut2rbUtGiAUtb4bUtqVy:iemn/VbKeOSy
                                                            MD5:87CFDA2399A8126117E5BFC018B06518
                                                            SHA1:6291611BCFB34293F9C20BA77170A13C1502C2ED
                                                            SHA-256:ECC9D2E7AD7B5E5D6599CF442941595C99C4D69E802A4DDB4DA321898CDDE91D
                                                            SHA-512:846FE07FEB82EC5F87FAE137D23074934246DBB7C7EE30F44F6C5373183B5FD2211B58E5CF1AB9A47938D282CA322FBDE80B58054FE6517CDC549992439F19A8
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tongatapu) {.. {-9223372036854775808 44352 0 LMT}.. {-767189952 44400 0 +1220}.. {-284041200 46800 0 +13}.. {915102000 46800 0 +13}.. {939214800 50400 1 +13}.. {953384400 46800 0 +13}.. {973342800 50400 1 +13}.. {980596800 46800 0 +13}.. {1004792400 50400 1 +13}.. {1012046400 46800 0 +13}.. {1478350800 50400 1 +13}.. {1484398800 46800 0 +13}..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.903352083734246
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/TAOA/4pv:MByMdNXiU5trv
                                                            MD5:443F5FFA58C5DB1F02695C5B76DF4F5E
                                                            SHA1:115AFE9C3EB36F836E2DF95AF42C43EA5C21C1E6
                                                            SHA-256:323A858946A2E8EC67C28176977D646C0A0F6DC8B48F9C4A3F8E7112C9B1B71D
                                                            SHA-512:33717F3423CE06D827445FEA85BE8A989712CF8C06C54A17B9610A4DAD50BF64CAE80DE15AB12AB0610CD6B5582A897DD9C543098108543FA3E6273AAD9467DE
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Pacific/Truk) $TZData(:Pacific/Port_Moresby)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):183
                                                            Entropy (8bit):4.771810884789573
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGqhyXHAIgObTq0vFvRL/nUDHpbhpUDHqNn:SlSWB9vsM3ycmhSHAIgObmSN/0h9Nn
                                                            MD5:992D44D728747D79E1F7EF47E3CB2EF2
                                                            SHA1:8F05E8DA2A2A45F04B9B89BB34F0B7833B56A261
                                                            SHA-256:B6041BC18B595E38953632ACAD1D25F7394BF7C759A72FCCD81AF637F8016373
                                                            SHA-512:C59D360941240C8B11D892A930B6CFE141B1A55007483683AF400B1A0C98EF0BBBE7EF595EF6BA73A6EECB8E3D0658A681CF3203E5E32DE80DD61EDB9C6CBDB0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Tarawa)]} {.. LoadTimeZoneFile Pacific/Tarawa..}..set TZData(:Pacific/Wake) $TZData(:Pacific/Tarawa)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.752883303864462
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGqhyXHAIgObTq0vFvRL/nUDHpEsppUDHqNn:SlSWB9vsM3ycmhSHAIgObmSN/t+9Nn
                                                            MD5:862ADA129322E53235ED5099A72FE8EE
                                                            SHA1:7DAB7BF451CF0FE483EA512C0C733B090FF22EFF
                                                            SHA-256:9601B749413D591D820AFAD431B3C30E577ACAB000EA11EC03DEB36EF0738DC3
                                                            SHA-512:D9C94BE2F08220E49A336A5760DBF43FCB889ADA95E29117AE5E237E33E9EE50BD32203D2743346A21354AF3F1ADDA43A2953FB55205B6FA998A6294CC57F063
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Tarawa)]} {.. LoadTimeZoneFile Pacific/Tarawa..}..set TZData(:Pacific/Wallis) $TZData(:Pacific/Tarawa)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):200
                                                            Entropy (8bit):4.896778032757086
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/eP/4pv:MByMdNXiU5teev
                                                            MD5:343CCAC12AEB0DD78FC60405DF938729
                                                            SHA1:B7B4DF0178DEEC2BA6F23AF5CD896CF16CEAF224
                                                            SHA-256:16CF9FAB116E5E1732B4B601DA919798985A0C15803F0964844C7040894C5DBA
                                                            SHA-512:041609C63E95322460A31AC83BCC4F8F90B8D44B2740A5CF7E37F66CCD9F928416D74D313370516D7B1780DF2C9C9A78B7069CE2DA6BFFE88C46FB47CE1A4CB2
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Pacific/Yap) $TZData(:Pacific/Port_Moresby)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):174
                                                            Entropy (8bit):4.940195299412468
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVqEGIV5XHAIgoqpEGYvWARL/nSi67x/yQa0EGIy:SlSWB9vsM3ymc4HAIgocVAN/27x6qF
                                                            MD5:E6AA2F6A05B57AA9B4AEF8E98552EEB2
                                                            SHA1:22470C204152702D8826CA52299E942F572C85ED
                                                            SHA-256:C27E1179B55BF0C7DB6F1C334C0C20C4AFA4DBB84DB6F46244B118F7EAB9C76E
                                                            SHA-512:B28A264907C32F848D356FB0F5776C2CE819DCB6BC08A5E2DCD4FA455EE1616966E816748079C7A55485BABFFB292D567E6F958168F945889E33A267B0E7EDA9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Warsaw)]} {.. LoadTimeZoneFile Europe/Warsaw..}..set TZData(:Poland) $TZData(:Europe/Warsaw)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.9353841548970205
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxMvLS3vXHAIgoqyMvLL6RL/nM24h8QavMvLBn:SlSWB9vsM3ymvMv2PHAIgovMvH6N/e8i
                                                            MD5:7D7BD6E40D3ADCA04754255D69B5CC9D
                                                            SHA1:EE32167B450DE7B0F1A15199795AEF9524BE623B
                                                            SHA-256:EFD666F3062D52C5D0B4F83B1A206E6840C1EAEC356CD77A0A71C7EDFA78C964
                                                            SHA-512:6056AAF078316A89079D19555F0BAEFB4C1CDBAA5426A8BEE76E0BFA5C69A5DAAFD199DEF978ABD67287AE1B80F754B7845EAFD5CC0995FE10E44D1F34D5435C
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Lisbon)]} {.. LoadTimeZoneFile Europe/Lisbon..}..set TZData(:Portugal) $TZData(:Europe/Lisbon)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):165
                                                            Entropy (8bit):4.795776391333205
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qMveyXHAIgNqBLFARL/lOr4WFKfMy:SlSWB9vsM3yKMveSHAIgcBJAN/S4wKfB
                                                            MD5:C5AE3A1DAD32C870651C74E367F604CF
                                                            SHA1:9FF81383C43D98441841E182BC783381EF565204
                                                            SHA-256:9AEC39777013B23D63D0509EBB2F01D57A2C1592264DBB19CE2C61C7D7DDD8DE
                                                            SHA-512:3A7217ED885011972262B71DB7F5D7E4C9C6E82B4BEEF0718BCB9452E49FDBDD5ED78564156577AB09150140B862E1944B4B739BCE0C50E63667050C35329503
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Taipei)]} {.. LoadTimeZoneFile Asia/Taipei..}..set TZData(:ROC) $TZData(:Asia/Taipei)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):162
                                                            Entropy (8bit):4.900717350092823
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ZQckovXHAIgNtvQMHRL/lmFeWFKKQ7:SlSWB9vsM3yJJHAIgbHN/pwKv
                                                            MD5:59E4C80F97FAFC92987B08BFA03B5EE5
                                                            SHA1:4F86FCE17A51C3789DEB887BE01A1A0E6EA3D2DE
                                                            SHA-256:63153B40225270ADB7CD248788CA9F18C6DEBAF222B3165BBAB633337592DF44
                                                            SHA-512:9FCC0F747096775D0FB8DD252A73E6F47C16BF2D7DB0C3FBDFD206EE57393276FB40F65C1441296AE2AC115CFEE11098474DF3FEF8EE1FABE139427A8991F052
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Seoul)]} {.. LoadTimeZoneFile Asia/Seoul..}..set TZData(:ROK) $TZData(:Asia/Seoul)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.85623787837429
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq801c3vXHAIgNtK1tyHRL/kZ8O5h4WFKf1z:SlSWB9vsM3yUgHAIgWv6N/kth4wKf9
                                                            MD5:5EABBAAF3B29B5DFF9E54136F7ABC654
                                                            SHA1:44615F03264012D97512F9AB386413DD72BE1090
                                                            SHA-256:B9443FB17F0128DDB9F2DF657DC5D2DF176F64C61B0D02B272E5DFB108537678
                                                            SHA-512:B930D637A1E69E0847ADDEAB013B2C25BC27EBB9CDF20B9CDDFDAC111E9F26BB5EBC83194E845ACC3E1B9A08C386C94FCC4FDE32292EB558E3F7463832BB38B9
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Singapore)]} {.. LoadTimeZoneFile Asia/Singapore..}..set TZData(:Singapore) $TZData(:Asia/Singapore)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):201
                                                            Entropy (8bit):4.996391010176349
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3y7p5oeSHAIgppON/kjx+90ppv:JByMYbpwt8+90b
                                                            MD5:1AC81E2C60D528A6C5BF2E6867146813
                                                            SHA1:73D2D24FE6D56CA34ABF11B9A95DC22F809C5158
                                                            SHA-256:978C4E5256057CE7374AD7929605090FC749B55558495BD0112FB0BB743FA9C2
                                                            SHA-512:DB2673FB54C1308BBEB298A186F9130FB9090CE33B958C82D62B9BD88EE39BAB9A1BE40645547BA4167FD475892A323CF8EBA16C97F6FDF5693F1BF7A313FE9A
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:SystemV/AST4) $TZData(:America/Puerto_Rico)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.9470542553730255
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/kRDwh4IAcGE2NEOyn:SlSNJB9vsM3y7UEOXHAIgpUEqA6N/k+H
                                                            MD5:2AB4B896957F26B114A990F69989F3FB
                                                            SHA1:8048C99F5EE02C021F311709B30EB28D650D884D
                                                            SHA-256:0114C111F5BCD838A28F2E16E01ECB79D8AFC8CBF639A672889ED0D692FC6CDC
                                                            SHA-512:353744359CD94B1E8184A8B83F762459C69D3AEEA43DA638C1F4CC34E01E9D86C2EBCF7F7BFD059CB23B64051510D1C4556A49D180F8A92DE8449139194DCDC9
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:SystemV/AST4ADT) $TZData(:America/Halifax)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.957831162100758
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/kR/eIAcGEsAzEpv:SlSNJB9vsM3y7hzi2HAIgphznN/kc90q
                                                            MD5:3EC0B09EAB848821D48849673B24401C
                                                            SHA1:41599CBA78E124A7DA9744D2B4EA8CDC10008E0B
                                                            SHA-256:30428B85B37898AD98B65BE5B6A8BD599331D9A1B49605FC6521464228E32F8F
                                                            SHA-512:9A3303B3338C01B281A40BB48B93C446ADB92BBDC45371667F09EDA92F9EE2AEC60CE8E98CE15C0112B823799C76AEF14895B15DC997DA506494D75BBE58D662
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:SystemV/CST6) $TZData(:America/Regina)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.975428048518589
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx096yXHAIg20961yHRL/kRwx/h4IAcGE967:SlSNJB9vsM3y796SHAIgp9616N/kyxpQ
                                                            MD5:D85CCC5EFAA1ED549D02F09A38A53C68
                                                            SHA1:642ED571E4C6F60A953D42DA4F756F2262E4E709
                                                            SHA-256:44BEF7D4660A9A873EB762E3FDC651D31D97893545DE643FA1B2D05991C090A1
                                                            SHA-512:3CC6A14A17EA4833958A7D444073D6C2709FD61BF54387E5C362151E9143F795B2432B621080DD53E0FC9BDD7C58F406E046E3D0A2BBA4132D99E7C705E6D645
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:SystemV/CST6CDT) $TZData(:America/Chicago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):4.928128138328689
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3y73G7JHAIgp3GZRN/kkp4903G8:JByMY3G7Kp3GntVp4903G8
                                                            MD5:506D15E2F37F501F5A592154142A5296
                                                            SHA1:5ACA12E0BA0FFF9734ED978A9C60AAA9D1E05A59
                                                            SHA-256:798F92E5DDA65818C887750016D19E6EE9445ADFE0FCB7ACB11281293A09C2C7
                                                            SHA-512:2EE08D39461CAD3492BE88B421BA463B4CEB8497F036518794BCF605F477057FEA218A9DFBB6335A28A5120750EA06AED9D2EA84CD0007D34CDE562DCD79CC0C
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indianapolis)]} {.. LoadTimeZoneFile America/Indianapolis..}..set TZData(:SystemV/EST5) $TZData(:America/Indianapolis)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):195
                                                            Entropy (8bit):5.113680059406992
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3y71RHAIgp1aAN/krp4901Yn:JByMY4pltw+90q
                                                            MD5:AAD8EF3067E97785D4052B80F5C4ACE1
                                                            SHA1:3EF0A06FCC41119F4A60A32CED0E5A1E0E8B4300
                                                            SHA-256:D159140114A13C69F073CFE9AD0B67D713E8811CBFF773A3D1681FC38EA0E699
                                                            SHA-512:A8774ADF6818D85476A6C147A45E55B338F413CD9B61BF9FDB0CB7A335C0CE8F8C6D1970783FEFECC2CE18388DF91304CB295BD4DFD29FB538D74F6A414A441D
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:SystemV/EST5EDT) $TZData(:America/New_York)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):193
                                                            Entropy (8bit):4.9733028894475195
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3yc6e8SHAIgOb6eKAN/kQmrheo:JByMdniinbtRTo
                                                            MD5:458061B3F3C8F06C61B5726393A26BA2
                                                            SHA1:E894F5615654D1110C9964B8F6A54C048442D8EB
                                                            SHA-256:BF62C8650BBA258000F62F16B0C7CBB66F4FD63F8CFDAF54273BB88A02A6C8D6
                                                            SHA-512:6A161A7AE44CBF8CE4C704C94456A5B714AAF2A3FAF30731254C9FE056F9DDF207119D516CC6A4C44AE76EC078F5C59F5EC6DD6701FAA3A36F061AF3953B7C7D
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:SystemV/HST10) $TZData(:Pacific/Honolulu)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.999038624718282
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/kRgFfh4IAcGEuto:SlSNJB9vsM3y7OBHAIgpONYyHN/kch4y
                                                            MD5:B06AB4998A57446FC4D5A5B986BCA0A9
                                                            SHA1:5E4A28466383CBAB2067B9B6D22882CF6D83C3FB
                                                            SHA-256:FEBE49FAE260E5595B6F1B21A0A3458D8A50ACA72F4551BF10C1EDB2758E0304
                                                            SHA-512:9E44174C4E348E1B768039585BA6393FD001B606E111092EEC57C75210A1E87BF3C72728321945D584CA60D4C848D88EB8B2F82CB88F38F90224A43FDCFEA9AA
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:SystemV/MST7) $TZData(:America/Phoenix)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.956231227702093
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/kRMMFfh4IAcGE6RB:SlSNJB9vsM3y7+SPHAIgp+ON/kD490+B
                                                            MD5:5D3C1ADB8AC4EAC9E9A31734CD6884BD
                                                            SHA1:535B024EA088B9B192BE4206CBDD56BC5B163762
                                                            SHA-256:64556A7B20E425C79375C2A7CCF72B2B5223A7DE4FF4C99A5C039DB3456C63F6
                                                            SHA-512:FB799A42880613752AD6010D7B4E97ACCF7F6AE281D9A37057F6423AEF2607B608DB2AC52176F1653D8B2D086223C9658B101E73125F0FF7D6D9E8CD876EEC53
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:SystemV/MST7MDT) $TZData(:America/Denver)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):192
                                                            Entropy (8bit):4.831981174214766
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQGuQTWLM4YkovXHAIgObTuQTWLovFvHRL/kRQB5nv:SlSNJB9vsM3yciQyLM4YJHAIgObiQyLQ
                                                            MD5:B568B46A0207800D9C022BAB1E48709B
                                                            SHA1:71CE3F0E75E440D5BBA219BCBB92AF9C1F5A7466
                                                            SHA-256:0B8227AFC94082C985E8E125DF83E5EFADE7CD9CA399800D7B8E8B2BEAE22C7D
                                                            SHA-512:5067AAD0CD02EBDECA6980F9C7CCC80D076C34D6463C5B6B19B678D76B5E69C1C3639D046F56FE9D6255CBEA49189EDD735F66AD9EE2CB0389BE020E7ED3AD50
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pitcairn)]} {.. LoadTimeZoneFile Pacific/Pitcairn..}..set TZData(:SystemV/PST8) $TZData(:Pacific/Pitcairn)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):204
                                                            Entropy (8bit):5.003766957083974
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3y7DvPHAIgp5N/kQ1p490Dy:JByMY8p5th090W
                                                            MD5:7E587175CA0F938C47FA920D787C57BD
                                                            SHA1:C3F7D8576C0AC74D6B70F4363EE2C174FADC70B0
                                                            SHA-256:D51D9549835E9C058F836C8952932CB53C10F7F194CD87452E9B13494D1C54C9
                                                            SHA-512:4460686AAA470F07A6DB1F8957FA4DB600E116273497F46E8A2D3FDECF622122DF753556B78C39FA2ADFDB2AF3C3ABB3C330ADA79B35C6A3CD8C498A0319CEE6
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:SystemV/PST8PDT) $TZData(:America/Los_Angeles)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.9524733332469095
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQG5hB5WXHAIgObT5hByY6RL/kRKlUDH5hBpvn:SlSNJB9vsM3ycT2HAIgOboN/kNv
                                                            MD5:5970A466367825D72D9672293FCD4656
                                                            SHA1:1A736D61A6797295EEC8C094AED432171E98578E
                                                            SHA-256:55710EFDED5B5830B2F3A2A072037C5251E1766F318707ED7CD5EB03037FED43
                                                            SHA-512:1F2A1B2A7D0A3E410652546C174D9EC18C91C9327F11C384A0AA1EB12D7EFE85C4D53CA3C2A6C347C0068A4CE92A3138EB17232B0DEC88D52465C5DEDEEE6827
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Gambier)]} {.. LoadTimeZoneFile Pacific/Gambier..}..set TZData(:SystemV/YST9) $TZData(:Pacific/Gambier)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):198
                                                            Entropy (8bit):4.994125896811442
                                                            Encrypted:false
                                                            SSDEEP:6:SlSNJB9vsM3y7/9EtDSHAIgp/9Ef6N/kB490/9E9v:JByMY/947p/9XtN90/9s
                                                            MD5:560B18DFB138DAF821CFDAE017B94473
                                                            SHA1:0BB0312C742CC0097DF033656AE3D10723035C30
                                                            SHA-256:DA20018DE301F879E4F026405C69FA0370EB10184FE1C84A4F1504079D5DAFA1
                                                            SHA-512:B1D4EAD5F549E319DAD55EE67DAFD732E755164748C08633AA8F07C280B2CF617380D6F886304142D0E4D50026E63678DACFBE2DC809F780BA4CFF35A90DE906
                                                            Malicious:false
                                                            Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:SystemV/YST9YDT) $TZData(:America/Anchorage)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):180
                                                            Entropy (8bit):4.9295990493611495
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/jCl1yQaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/SymKv
                                                            MD5:1FABF2DFD4BFD0184AE22ED76F7569E5
                                                            SHA1:5859266B26357B4FCADD7EC65847667631E303EB
                                                            SHA-256:8471A5575B9D9E47412D851A18A26C4405480540AABC8DAED5F81BE0C714C07C
                                                            SHA-512:1DCBECEF6D1F923E6C9CEA70CB10F1FF4E453265966AA88FBC8739E93EF40F8A16AAD85AF4ECC5CC1E52F22F49E5D3F4EE01A97DE2302FC4FBC063FE814F3851
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Turkey) $TZData(:Europe/Istanbul)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):153
                                                            Entropy (8bit):4.844017562912325
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iGMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iP8RX
                                                            MD5:DA060D2F397C978E0842631B4EC73376
                                                            SHA1:649BC85430B04662BE079C0AAD43DF5D5D499D28
                                                            SHA-256:356A9BB6F831971C295CF4DCE0F0CDC9EDF94FD686CA3D3195E5F031A0B67CBA
                                                            SHA-512:3359BFC6F0837D2DA9D72DA8053773CE0C1A1B1A47C33163BF38965E2104F57BC147F9EEC228A3591B75BF1BA93285AB83E8427E8E2E697AB18501DC017B6E6A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UCT) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):189
                                                            Entropy (8bit):4.911775112130145
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/VXEtDovXHAIg20/VXEfovRL/iOGl0IAcGE/VXEN:SlSWB9vsM3y7/9EtDSHAIgp/9Ef6N/i4
                                                            MD5:4379C0BF618649AA07CC4BDAC75F62EF
                                                            SHA1:7813B54BF2BD0C40A39CA9A29CC50C6D034880A3
                                                            SHA-256:CED56F09D68BE00555219594C7B2F3E7EFE8323201FB3E2AA0E1FA9A6467D5AF
                                                            SHA-512:AC822061F5C9743120A66E11C02B199253A40460A87F78DC154B0BDD91E410EDDA581E889F5D2A74670939034F39A7F6C7E814E038A1371DAB71EF79A8911AE7
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:US/Alaska) $TZData(:America/Anchorage)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):176
                                                            Entropy (8bit):4.8886795125313585
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/iObMEIB/4IAcGE/y2:SlSWB9vsM3y7/yrHAIgp/yH0AN/itE8h
                                                            MD5:AB14CF1840CBDA2B326660DBD51273B4
                                                            SHA1:78144B3A2C75568307E4E86AE3B01EA7F541B011
                                                            SHA-256:A4F1398CF84D0AE09BF19288770756622D1710CCBFBFE79E0D3239497731287D
                                                            SHA-512:557A3ED9D1401E76291DC41524A1FD04AFF0829CEF66E103CEF9D10CD751F04FDEB6B7C0490302C71297F53AA8DC42930649AD274215D5DF068BCDE837E73756
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:US/Aleutian) $TZData(:America/Adak)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.9334626069754455
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/iQMfQfBx+IAcGEB:SlSWB9vsM3y7OBHAIgpONYyHN/iZfQfl
                                                            MD5:30ED80335BE37C7CBA672C33FDE23490
                                                            SHA1:B627E86F023FE02A5590FE8D55FF41946BE6D24B
                                                            SHA-256:9503403F231BA33415A5F2F0FDD3771CE7FF78534CE83C16A8DB5BC333B4AD8A
                                                            SHA-512:C1352612EC0B4FF2F6F279CDB6008D7E9DA7F94F0009EFD959AD3092393150ECA83A09E72C724E1A4BFC3A057B9218D54A87FFA1102E2D9BF058B78AC0A0B1AB
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:US/Arizona) $TZData(:America/Phoenix)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):184
                                                            Entropy (8bit):4.90255068822036
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx096yXHAIg20961yHRL/ibXgox/h4IAcGE967:SlSWB9vsM3y796SHAIgp9616N/iB490+
                                                            MD5:7770A6B85B2FE73BCCE9D803E0200F23
                                                            SHA1:784AD1082FF1569961C2AC44F6D6F7605FBBE766
                                                            SHA-256:B6AC9FAE0AB69D58ECFD6B9A84F3C6D3E1A594E40CEEC94E2A0A7855781E173A
                                                            SHA-512:EEE79D37D77E6B80B91E8F30CE48B107371F6A58F0C91785E3C74EF210AE1011D0EB913113F1873BE6099B0BE1260410F0C74650446CB377F8FDB5505A44F266
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:US/Central) $TZData(:America/Chicago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):228
                                                            Entropy (8bit):4.7645631776966715
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/i3E0903GK8:MByMY3GK7Kp3GKnti3t903GK8
                                                            MD5:96828B6BA17CA96723794F4B3744B494
                                                            SHA1:C3A824A925AEFE2A13A0E65548078D9842C2C7D7
                                                            SHA-256:5D86F8D36598516FB2342A18A87DB2701BABD265B0671CC9321C48DB22C7ECA5
                                                            SHA-512:2A27A455787DEAC3EC78A2784FB989DAB178E9D6DD7721CD3F5D3337231A3C651994B964D6CE040B7858E0127D7F70C0C48CB0D553D5B725B649C828288224B5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:US/East-Indiana) $TZData(:America/Indiana/Indianapolis)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):187
                                                            Entropy (8bit):5.0345860115708785
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wAy0vfXHAIg20wAyGWARL/i37oxp4IAcGEwAy0yn:SlSWB9vsM3y71RHAIgp1aAN/i37oxp4P
                                                            MD5:375DB249106C5D351CA0E84848835EDB
                                                            SHA1:ECC5C0C9DA68773B94C9013F4F1A8800D511CC4C
                                                            SHA-256:2FFCAD8CBEF5ECDC74DB3EE773E4B18ABC8EFA9C09C4EA8F3A45A08BADAF91A9
                                                            SHA-512:21550743BF4E1A79754F76AB201F0EB6BA6B265F43855901640054316A4A32A5D01D266B2441E4A6415720715A2ABD367D82E3D40949A7A66BE9F8366E47A8DD
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:US/Eastern) $TZData(:America/New_York)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):186
                                                            Entropy (8bit):4.88075715646936
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG2fWGYFeyXHAIgObT2fWKARL/ioMN75nUDH2fWWv:SlSWB9vsM3yc6e8SHAIgOb6eKAN/ioER
                                                            MD5:C0475756CFEC302F737967468804846E
                                                            SHA1:85C13CA0A908C69B8BBB6040FC502AFF96B8F8C7
                                                            SHA-256:529BB43EFDA6C1584FEAEA789B590CEF1397E33457AB3845F3101B1FC126E0FB
                                                            SHA-512:D3FF374443344E8438D50803872E8A8EA077B2299B38C1BD155386B4D2C6008BBD0C0B0B26DE9680812D4AFC9A187B644BDCCB04C23880337228BCEC06D5D61B
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:US/Hawaii) $TZData(:Pacific/Honolulu)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):206
                                                            Entropy (8bit):4.87340978435866
                                                            Encrypted:false
                                                            SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/iGIfh4903GKT:MByMY3GKDp3GKItiBfh4903GKT
                                                            MD5:00AAFD60A0B1146274981FAB6336AFD9
                                                            SHA1:20AD47ED52874202585C90FE362663F060E064D3
                                                            SHA-256:5827B6A6D50CF0FB75D6BA6E36282591AD25E1F0BE636DCFC5D09BDA29A107FD
                                                            SHA-512:61113AB72B7D671D7B429106709E73DB57D5B8A382680BA37A54126C7F54BC2D6B47A2584177CE6B434793546DA7EB9B8B7DF9163816DBFC67C83D9930D6A158
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:US/Indiana-Starke) $TZData(:America/Indiana/Knox)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):185
                                                            Entropy (8bit):4.83459089067994
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06FQGFfXHAIg206FQJARL/iHaMCELMr4IAcGE6FQB:SlSWB9vsM3y74PFPHAIgp4KAN/iHaMHs
                                                            MD5:D955A5A943B203DC4B87A91ED196B82A
                                                            SHA1:C7ACC48AB2033C372C60C741F68B12FFAEA147DE
                                                            SHA-256:B4E4269C4FEBFEFF26750B297A590226C0A6872519A6BFDE36F6DC3F6F756349
                                                            SHA-512:445DC9A50487A4BA0A7F79078441696DCAA31F9988E5B515B5A827AC9275776B22DE303040900C1726EB99CABA8AD09E57AA674F798EA3FDEBC580E4B87D9439
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Detroit)]} {.. LoadTimeZoneFile America/Detroit..}..set TZData(:US/Michigan) $TZData(:America/Detroit)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):182
                                                            Entropy (8bit):4.892777905787396
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/iBOlLo/4IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/iBY8/49Z
                                                            MD5:E53EDD55E6448C624DD03A8A100EF5AF
                                                            SHA1:1D266553CAFA23A3375CFAF7AFE6636553CC7B70
                                                            SHA-256:3763BF520D3C97148C34DCFBDF70DEC2636D4E38241555900C058EFEE3BD1256
                                                            SHA-512:B7FCF01DBB4231F30FEFA77C339B2CD7D984D6E6182F3BD15D6B64AC9525994E7CBF90C3F1F520FD22B54E19831B3CBAE1C22F04F60244C0C60A1809942422A4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:US/Mountain) $TZData(:America/Denver)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):196
                                                            Entropy (8bit):4.932311644026309
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0ydJg4o3vXHAIg20ydJPyHRL/iP+e2IAcGEydJgov:SlSWB9vsM3y7DvPHAIgp5N/ip290Dy
                                                            MD5:37AF94FAB52D80AF32C766644892E36D
                                                            SHA1:03CE96A3B3EBFC16C9ED192DD2127FB265A7ED49
                                                            SHA-256:54E5F126D4E7CC13555841A61FF66C0350621C089F475638A393930B3FB4918C
                                                            SHA-512:405A7F414FA0864111E5E9F06FCA675BF4EF11FE0F82F5438416273BEF820A030A50E4D43E4E522ED79C08C0C243E9DD3692971DC912C9ADFB1BEABEB935CDDC
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:US/Pacific) $TZData(:America/Los_Angeles)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):188
                                                            Entropy (8bit):4.838968615416201
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/i6A5nUDHurKeTyn:SlSWB9vsM3yciemHAIgObiecN/idXevn
                                                            MD5:509CF35F5F7C9567FD19CC5C137DC070
                                                            SHA1:AA5F27D36BC617A6A4107E3CA0CB0C10A71A1D9E
                                                            SHA-256:E51FC51C65FFEAB514D7636271157EE8941BDACF602CBC380F5D60B5FA674E87
                                                            SHA-512:E23633A16F11015F3FE2F4E675B5A60B4FDC61F8CF152FDB9BA7ED4C213B8897117721A78C5470296DAFB0FD4F0DDC019DD0DB8C28C1F1B2BE0D3A289F53D5B3
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:US/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):153
                                                            Entropy (8bit):4.844017562912325
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iLB5h8RFB:SlSWB9vsM3yzTHAIgm6N/iLfh8RX
                                                            MD5:3402C8784654C24F7E956731866B833F
                                                            SHA1:C34F3CCA074A50E6564B8C78683C8763B37A3002
                                                            SHA-256:DEE28FF84E3FC495ED3547D5E5E9FAFDACC36A67329E747D434248ED45BF1755
                                                            SHA-512:FBA2840B0FA0F084EE9840BCF56E497F8A7ABF509FA10FA66FB26BA3D80079C4F9A363577A453CD68557080EAF9DD7F1F7B5AF957B64BDA2A897B1E08C85DD19
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UTC) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):159
                                                            Entropy (8bit):4.879221007428352
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iL7DJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iL7VMr8RX
                                                            MD5:5F24A249884C241D1E03D758C2641675
                                                            SHA1:63AAC15A68659006F8A14FEC3F2A66B55A8AC398
                                                            SHA-256:B7B0B82F471D64704E1D6F84646E6B7B2BD9CAB793FAD00F9C9B0595143C0AB7
                                                            SHA-512:A7AB5E26A2C23BA296942D7C524C6EE6708A9A38CDD88022EA92E2180BC3CCFE930758FC20A24A0D271AD70733EB924B0E530FBF83CC0FC49EAD411B28503CC0
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Universal) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):172
                                                            Entropy (8bit):4.999171213761279
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVwTwWXHAIgoqzTbNOARL/gIuyQauTgvn:SlSWB9vsM3ymSHAIgoXAN/gXy5n
                                                            MD5:5444E85070CA2E7A52D38D6D53216B88
                                                            SHA1:0F9A4FB1156312EBD0B9C81DA2164E89D21878E1
                                                            SHA-256:F7DA75B585F45AB501B2889E272FF47B1C4A1D668E40AED7463EB0E8054028C2
                                                            SHA-512:BBC94F98C84641392D3A4B67C152E92EDB3011DA329319ADB2485DBEAFD44DED328D80FBCA89E58687E1F0EB6BED8580BBB0075CA42284B6206A8641D76F2DE5
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Moscow)]} {.. LoadTimeZoneFile Europe/Moscow..}..set TZData(:W-SU) $TZData(:Europe/Moscow)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6945
                                                            Entropy (8bit):3.7806395604065135
                                                            Encrypted:false
                                                            SSDEEP:96:v6PgDGfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:rQbkIaFF1w0us4qE3+sSGjT
                                                            MD5:1EC38B05B53ECF2DD3A90164C4693934
                                                            SHA1:00900F0ADDB7526C63C67CA1662C038E95A79245
                                                            SHA-256:7E6E2369C19DD19A41BE27BB8AD8DF5BE8B0096ED045C8B2C2D2F0916D494079
                                                            SHA-512:47A8DAAB1B891FF09A94AF01B6673213392F70C6C1EE53D95A59D6E238FD06B0E80FA21C7279A9ADA891F5CA5B86E4D6B696EE8CFE14BFEF0ACCC9759AF1419A
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:WET) {.. {-9223372036854775808 0 0 WET}.. {228877200 3600 1 WEST}.. {243997200 0 0 WET}.. {260326800 3600 1 WEST}.. {276051600 0 0 WET}.. {291776400 3600 1 WEST}.. {307501200 0 0 WET}.. {323830800 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):154
                                                            Entropy (8bit):4.8800842076244715
                                                            Encrypted:false
                                                            SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/taFBURFB:SlSWB9vsM3yzTHAIgm6N/YFaRX
                                                            MD5:DDB6F69CA4F0EF6A708481F53F95EAB9
                                                            SHA1:A63E900A9257E9D73B4BB4BACBA8133C3D1DC41B
                                                            SHA-256:A06E8CCCF97CC8FB545DFDB4C89B5E5C8EDF0360547BDC1823B4AC47B1556C31
                                                            SHA-512:C8EA1039BE001F5EF52662B28DBF46D02E4848F08F05923850DEA1994732037B4C8D6030B742D97FA4276AF5FEE3F17C47C7DDA4F44DD23244F9976A076D5CC4
                                                            Malicious:false
                                                            Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Zulu) $TZData(:Etc/UTC)..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5051
                                                            Entropy (8bit):4.840016819053602
                                                            Encrypted:false
                                                            SSDEEP:96:HgT4Wi5uhdFQpmuldFQofsGP3R1hF9Dl19arB0E9Dl1YoaEhHe2Gu/q1ZFyJRpqz:8K5ULoxvR197ABr971h5GIqrmbqIc+bq
                                                            MD5:BB07BBA7F99F6BB56135429BED589136
                                                            SHA1:47593D5EFFC8618B07C2C3C838C8752072ACB318
                                                            SHA-256:128A314521EA5671569E265968057DA0C5A420F126AD02C4A2DB7EFC736620E9
                                                            SHA-512:ADDD960D09119F06A454A7510BF12DEA67BB97AF931887276B8683338CC794B36BE1B7DEF3A02E016C7E009F6F6E96C0DCECB068839CFDE5B2B3EFDEB1C5A073
                                                            Malicious:false
                                                            Preview:# word.tcl --..#..# This file defines various procedures for computing word boundaries in..# strings. This file is primarily needed so Tk text and entry widgets behave..# properly for different platforms...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998 Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# The following variables are used to determine which characters are..# interpreted as white space.....if {$::tcl_platform(platform) eq "windows"} {.. # Windows style - any but a Unicode space char.. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\S}.. }.. if {![info exists ::tcl_nonwordchars]} {...set ::tcl_nonwordchars {\s}.. }..} else {.. # Motif style - any Unicode word char (number, letter, or underscore).. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\w}.. }.. if {![info exists ::tcl_nonwordchar
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8806
                                                            Entropy (8bit):4.863085192885279
                                                            Encrypted:false
                                                            SSDEEP:192:RpwYLapGk1BlM4UBIHpJFVUXUziMJ5Kxyk55qxUr7Vdk5vNR:RuYfvMdOXyj+01f
                                                            MD5:C5E9A2E32AE83A79DF422D1145B692DF
                                                            SHA1:08350F930FB97A95970122920C91FB9CED8329E9
                                                            SHA-256:8822365EE279BEBF7A36CFDEDBA1114762F894781F4635170CC5D85FF5B17923
                                                            SHA-512:71420E15A3D63329560074F6FFAD42CB464401284BC29D0DC8E34D83F8F77079F26BB4C5703E656A48E6931C3DBF6B873756FB212D0860483E0301B29EDE1212
                                                            Malicious:false
                                                            Preview:# bgerror.tcl --..#..#.Implementation of the bgerror procedure. It posts a dialog box with..#.the error message and gives the user a chance to see a more detailed..#.stack trace, and possible do something more interesting with that..#.trace (like save it to a log). This is adapted from work done by..#.Donal K. Fellows...#..# Copyright (c) 1998-2000 by Ajuba Solutions...# Copyright (c) 2007 by ActiveState Software Inc...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::dialog::error {.. namespace import -force ::tk::msgcat::*.. namespace export bgerror.. option add *ErrorDialog.function.text [mc "Save To Log"] \...widgetDefault.. option add *ErrorDialog.function.command [namespace code SaveToLog].. option add *ErrorDialog*Label.font TkCaptionFont widgetDefault.. if {[tk windowingsystem] eq "aqua"} {...option add *ErrorDialog*background systemAlertBackgroundActi
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):21612
                                                            Entropy (8bit):4.947590677310969
                                                            Encrypted:false
                                                            SSDEEP:384:Tv7cBCAsj9oqlFFSsB3VfRt+lMpWaNwJgzCHarc6gAsj9oqlFFSsB3VlRtYlMpBz:TvweHBBTfIZxHBnZWqbJPBFIaVlCj26+
                                                            MD5:AEB53F7F1506CDFDFE557F54A76060CE
                                                            SHA1:EBB3666EE444B91A0D335DA19C8333F73B71933B
                                                            SHA-256:1F5DD8D81B26F16E772E92FD2A22ACCB785004D0ED3447E54F87005D9C6A07A5
                                                            SHA-512:ACDAD4DF988DF6B2290FC9622E8EACCC31787FECDC98DCCA38519CB762339D4D3FB344AE504B8C7918D6F414F4AD05D15E828DF7F7F68F363BEC54B11C9B7C43
                                                            Malicious:false
                                                            Preview:# button.tcl --..#..# This file defines the default bindings for Tk label, button,..# checkbutton, and radiobutton widgets and provides procedures..# that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 2002 ActiveState Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for buttons...#-------------------------------------------------------------------------....if {[tk windowingsystem] eq "aqua"} {.... bind Radiobutton <Enter> {...tk::ButtonEnter %W.. }.. bind Radiobutton <1> {...tk::ButtonDown %W.. }.. bind Radiobutton <ButtonRelease-1> {...tk::ButtonUp %W.. }.. bind Checkbutton <Enter> {...tk::ButtonEnter %W
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Nim source code, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10009
                                                            Entropy (8bit):4.804060725528893
                                                            Encrypted:false
                                                            SSDEEP:192:HKOdkMpU9YUp8UIhMYYicln9Die0luVZS3pIp5Y3sF1P8Bg8p6trIOzvKsOiCLt+:HyMm9J8wPx70lu+4C8Fygq6tohef+0Uk
                                                            MD5:95975F4BB026E7302CBE9A4F48BC8EA4
                                                            SHA1:AD775025B2B2CB8192D851CEFF66B4F3141BDBB4
                                                            SHA-256:0EB33BC583823E5F10172C04B73B07EE36A17F1A5E2662548F2F3A13C7517FE7
                                                            SHA-512:0A6F350D7840354D6939EADC53979179A9E1DA256183CC0BD38777694A0B830DEF162F2F5FE592BD722C354BEFFF2546ED60E05939C71ACFD8D8F7C09B50027E
                                                            Malicious:false
                                                            Preview:# choosedir.tcl --..#..#.Choose directory dialog implementation for Unix/Mac...#..# Copyright (c) 1998-2000 by Scriptics Corporation...# All rights reserved.....# Make sure the tk::dialog namespace, in which all dialogs should live, exists..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}....# Make the chooseDir namespace inside the dialog namespace..namespace eval ::tk::dialog::file::chooseDir {.. namespace import -force ::tk::msgcat::*..}....# ::tk::dialog::file::chooseDir:: --..#..#.Implements the TK directory selection dialog...#..# Arguments:..#.args..Options parsed by the procedure...#..proc ::tk::dialog::file::chooseDir:: {args} {.. variable ::tk::Priv.. set dataName __tk_choosedir.. upvar ::tk::dialog::file::$dataName data.. Config $dataName $args.... if {$data(-parent) eq "."} {.. set w .$dataName.. } else {.. set w $data(-parent).$dataName.. }.... # (re)create the dialog box if necessary.. #.. if {![winfo exis
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):22039
                                                            Entropy (8bit):5.031583640145799
                                                            Encrypted:false
                                                            SSDEEP:384:lJGidpe3JQDUd6hgp6EQstzQf+a9DPbC43/H//cO802UeeVnZmM6BA0kyVJv9Qpu:Gep6JCwQDPb7PaRCzTdMAe
                                                            MD5:084E0D1FF7730CD92FAA97D18C2F2F09
                                                            SHA1:86EC3B4E6ECF4E9A00387EE69B1C524E71EBE059
                                                            SHA-256:D8D500875E78B21FC1F5F4196218715116474EC834B6E52022A18F885D4645B2
                                                            SHA-512:94C364FA1B8D00775DA3F7459CBEF63504C306CC2908F0FF84E2553986B3D5DA617B7CDC49D3000E4E7638E57C3D7D74C312214FED7DC2B80191FBB0FE318EB4
                                                            Malicious:false
                                                            Preview:# clrpick.tcl --..#..#.Color selection dialog for platforms that do not support a..#.standard color selection dialog...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# ToDo:..#..#.(1): Find out how many free colors are left in the colormap and..#. don't allocate too many colors...#.(2): Implement HSV color selection...#....# Make sure namespaces exist..namespace eval ::tk {}..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::color {.. namespace import ::tk::msgcat::*..}....# ::tk::dialog::color:: --..#..#.Create a color dialog and let the user choose a color. This function..#.should not be called directly. It is called by the tk_chooseColor..#.function when a native color selector widget does not exist..#..proc ::tk::dialog::color:: {args} {.. variable ::tk::Priv.. set dataName __tk__color.. upvar ::tk::dialog::color::$da
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8690
                                                            Entropy (8bit):5.098389551322902
                                                            Encrypted:false
                                                            SSDEEP:192:u4R7+/gFw/MEN55fO7eyjt4bjC+gR8e3vwLln/+LVtUw0tXK4jA:u4l+/gFeMI55Xyjt4bjC+gOe3Ih/+LV1
                                                            MD5:ABF277E4F62423F4345B6AD65640B8C2
                                                            SHA1:E66A4E37D51C7827C9ACA449A42E0966AACBC8C8
                                                            SHA-256:C7DA292CCF5F413E599C3491C331FFD58CF273F8477FACB097E6F36CF1F32A08
                                                            SHA-512:AA9F75D7C5C915B5FCD2F454856D080D186AB9BA149DC139FEAF7F4AC3DC51E6769E138E3B1BE45B3FEC3AE744189DE44DB2B748F0628FF13E4E733B9CD68BD5
                                                            Malicious:false
                                                            Preview:# comdlg.tcl --..#..#.Some functions needed for the common dialog boxes. Probably need to go..#.in a different file...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# tclParseConfigSpec --..#..#.Parses a list of "-option value" pairs. If all options and..#.values are legal, the values are stored in..#.$data($option). Otherwise an error message is returned. When..#.an error happens, the data() array may have been partially..#.modified, but all the modified members of the data(0 array are..#.guaranteed to have valid values. This is different than..#.Tk_ConfigureWidget() which does not modify the value of a..#.widget record if any error occurs...#..# Arguments:..#..# w = widget record to modify. Must be the pathname of a widget...#..# specs = {..# {-commandlineswitch resourceName ResourceClass defaultValue verifier}..# {....}..# }..#..# flags
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):33348
                                                            Entropy (8bit):4.996041902501109
                                                            Encrypted:false
                                                            SSDEEP:384:jMpwGU6OGEJemVueuR3fitsHI76Su6qKNjGCy1HyOnmTTRV+po2mBh6S5mDjbHqC:jMpdUDGEJpC6+oVeKNPjnD2jVfV/
                                                            MD5:410FE75A44BF8E1E0D2FEF923EB0D181
                                                            SHA1:95B73F3C861F5E7F2AD2B48048016E81B2EA6AD6
                                                            SHA-256:4B1527F6572DB1ED6DE66C194F687419FD78C381928E7B1F523C6A06CD755E9E
                                                            SHA-512:267925AEF36E69D803C7A23A6CAB7C81925AC9B6379D61B796A3BB933AB624F57F5B65BA34ECFCC0C6995DC2CB8662A31F3A9ADF760924199D14071BD60321C5
                                                            Malicious:false
                                                            Preview:# console.tcl --..#..# This code constructs the console window for an application. It..# can be used by non-unix systems that do not have built-in support..# for shells...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 2007-2008 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# TODO: history - remember partially written command....namespace eval ::tk::console {.. variable blinkTime 500 ; # msecs to blink braced range for.. variable blinkRange 1 ; # enable blinking of the entire braced range.. variable magicKeys 1 ; # enable brace matching and proc/var recognition.. variable maxLines 600 ; # maximum # of lines buffered in console.. variable showMatches 1 ; # show multiple expand matches.. variable useFontchooser [llength [info command ::tk::fontchooser]
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5988
                                                            Entropy (8bit):4.829498876074983
                                                            Encrypted:false
                                                            SSDEEP:96:qFR55woFFEciKwKClFEOTIhDHWyzaoj9zza7v0J7:qL55jiKwKCzTIhDbzaojhSG7
                                                            MD5:B2B3AA971D42FDBF92F13B45111EE1D3
                                                            SHA1:A74F2C2707463D6E209D0E0C96D75083AC6920A5
                                                            SHA-256:1C977052C1D8293CC5FE4198A538BECA9BC821AF85E76E4EEFBFB75B33CE8BED
                                                            SHA-512:146F658DA3E6E9176FA51C9836D7C1DCFC14E148A26B224155F6493C195A7FB20C2DC4EE21994E5A193B8DA8561C75374E830304F94F0C844E52AD829F6810D5
                                                            Malicious:false
                                                            Preview:# dialog.tcl --..#..# This file defines the procedure tk_dialog, which creates a dialog..# box containing a bitmap, a message, and one or more buttons...#..# Copyright (c) 1992-1993 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#..# ::tk_dialog:..#..# This procedure displays a dialog box, waits for a button in the dialog..# to be invoked, then returns the index of the selected button. If the..# dialog somehow gets destroyed, -1 is returned...#..# Arguments:..# w -..Window to use for dialog top-level...# title -.Title to display in dialog's decorative frame...# text -.Message to display in dialog...# bitmap -.Bitmap to display in dialog (empty string means none)...# default -.Index of button that is to display the default ring..#..(-1 means none)...# args -.One or more strings to display in buttons
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):18942
                                                            Entropy (8bit):4.977853953260254
                                                            Encrypted:false
                                                            SSDEEP:384:mDfyPIlBk3yrt8qLjtpa+qh+rA4rsWRWrrMUtCPnsKAN3Pp64ZnCD:mDfyPIlBk3yJ8mtpaplcpwo
                                                            MD5:CE819200E8CD36E4458B4CF47CFE9107
                                                            SHA1:D04357D9E236F83BB0D2F5DB97E9EE228C34EC80
                                                            SHA-256:6AC78F764434F932D37E8183AA6DB5D04EB1848B774C92F7ABC243ECB7D4A59B
                                                            SHA-512:6576612C380AB04FA75724C72108A2F386D7F75C9DB7A082445778F675E268D0594280A7644AA9FF3AC3D29026327B84A0990EE0C7A9F94BBAC3AE63CF91E1DE
                                                            Malicious:false
                                                            Preview:# entry.tcl --..#..# This file defines the default bindings for Tk entry widgets and provides..# procedures that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#...start dragging out a selection)...# pressX -..X-coordinate at which the mouse button was pressed...# selectMode -..The style of selection currently underway:..#...char, word
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5035
                                                            Entropy (8bit):4.819523401259934
                                                            Encrypted:false
                                                            SSDEEP:96:J3MRZZ7HWb/6OgRKjtS6Mn9GRZZ7HWb2Y6aO6R5nh76SMoB2kd82KtTpsi2D0DSn:CRZdPul1RZdFaRf0XoB2gZKZpsi2pn
                                                            MD5:63B219BE9AFF1DE7DE2BAF0E941CAE38
                                                            SHA1:A2FEBB31380E12FF01E6F641FE8B4F815941462F
                                                            SHA-256:8872F236D7E824AEC0ACD4BACC00FDD7EC9BC5534814ECF2160610C10647B7C5
                                                            SHA-512:057700F8FDE4B7C3D7AB7CEFD6C531060BF2B1B3B727CAD6A37ECD42EBC557765D94B83ADD438BD5AFA1F6F919D80AE755A8D98918981167B871F31AD42FDF5E
                                                            Malicious:false
                                                            Preview:# focus.tcl --..#..# This file defines several procedures for managing the input..# focus...#..# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_focusNext --..# This procedure returns the name of the next window after "w" in..# "focus order" (the window that should receive the focus next if..# Tab is typed in w). "Next" is defined by a pre-order search..# of a top-level and its non-top-level descendants, with the stacking..# order determining the order of siblings. The "-takefocus" options..# on windows determine whether or not they should be skipped...#..# Arguments:..# w -..Name of a window.....proc ::tk_focusNext w {.. set cur $w.. while {1} {.....# Descend to just before the first child of the current widget......set parent $cur...set children [winfo children $cur]...set i -1.....# Look for the next sibling that isn't a top-leve
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):18292
                                                            Entropy (8bit):4.724158138062491
                                                            Encrypted:false
                                                            SSDEEP:384:NoRqdguMCeor/4VxgU80QNxWHKVozN5EaKdhsbyM:NoRqdguMCeor/4VxgUnQN0KSDEk
                                                            MD5:48B77259261D1B0BE6BA1253D55F93E3
                                                            SHA1:345BB0F09DF3DA9D87EDBF68E860A10C8819146D
                                                            SHA-256:901F70BB14A197495575D3BD2BF11E8654F9490E7E16D8DCA8057C5393FF2093
                                                            SHA-512:FAFF122ACF9510F51AE8C7731C9BDE817E58ECD914A6C17C944195E507071BCB0CE0BE70D86FB65C35B308B9615DE3AE352DE352FE175EAB46F3932FFDB8BBE0
                                                            Malicious:false
                                                            Preview:# fontchooser.tcl -..#..#.A themeable Tk font selection dialog. See TIP #324...#..# Copyright (C) 2008 Keith Vetter..# Copyright (C) 2008 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::fontchooser {.. variable S.... set S(W) .__tk__fontchooser.. set S(fonts) [lsort -dictionary -unique [font families]].. set S(styles) [list \.. [::msgcat::mc Regular] \.. [::msgcat::mc Italic] \.. [::msgcat::mc Bold] \.. [::msgcat::mc {Bold Italic}] \.. ].. set S(sizes) {8 9 10 11 12 14 16 18 20 22 24 26 28 36 48 72}.. set S(strike) 0.. set S(under) 0.. set S(first) 1.. set S(-parent) ... set S(-title) {}.. set S(-command) "".. set S(-font) TkDefaultFont.. set S(bad) [list ]..}....proc ::tk::fontchooser::Canonical {} {.. variable S.... foreach style $S(styles
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):17456
                                                            Entropy (8bit):4.9606603722465135
                                                            Encrypted:false
                                                            SSDEEP:384:FNP8nO9Wo8k5NfQH8EsOy8WMdtafNCvHshPOw7jW:FNf8uNfQH89Z8WMdA1vDW
                                                            MD5:F538719BB6B5B6CBE451A13DF9009B7D
                                                            SHA1:CBA1CFFCA6E78EB4B1701ABB4C73020D82163685
                                                            SHA-256:541647A1D4D91FFB8EE93D53B0017E5C3D3FA943373BB8490761D25B7A2CA330
                                                            SHA-512:AA5EBCB5364B2FE131317C471AE51F3F709CD1ED49AC843127739C211B9AFA690F011E89E397028A3BCC97EE04BAB91FB936D9A40C9246F125F9E8AC69795D1C
                                                            Malicious:false
                                                            Preview:# iconlist.tcl..#..#.Implements the icon-list megawidget used in the "Tk" standard file..#.selection dialog boxes...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...# Copyright (c) 2009 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# API Summary:..#.tk::IconList <path> ?<option> <value>? .....#.<path> add <imageName> <itemList>..#.<path> cget <option>..#.<path> configure ?<option>? ?<value>? .....#.<path> deleteall..#.<path> destroy..#.<path> get <itemIndex>..#.<path> index <index>..#.<path> invoke..#.<path> see <index>..#.<path> selection anchor ?<int>?..#.<path> selection clear <first> ?<last>?..#.<path> selection get..#.<path> selection includes <item>..#.<path> selection set <first> ?<last>?.....package require Tk....::tk::Megawidget create ::tk::IconList ::tk::FocusableWidget {.. variable w canvas sbar accel accelCB fill font index \...itemList itemsPerColumn list
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11037
                                                            Entropy (8bit):6.048349526382653
                                                            Encrypted:false
                                                            SSDEEP:192:0nEPytJLl1S47T3YqN5/vkJpnhXqBB4aw2rqZiygTtYTpOq/pc75Mk:xqLz7F5KTqBBLuZ1gTSsqhk
                                                            MD5:995A0A8F7D0861C268AEAD5FC95A42EA
                                                            SHA1:21E121CF85E1C4984454237A646E58EC3C725A72
                                                            SHA-256:1264940E62B9A37967925418E9D0DC0BEFD369E8C181B9BAB3D1607E3CC14B85
                                                            SHA-512:DB7F5E0BC7D5C5F750E396E645F50A3E0CDE61C9E687ADD0A40D0C1AA304DDFBCEEB9F33AD201560C6E2B051F2EDED07B41C43D00F14EE435CDEEE73B56B93C7
                                                            Malicious:false
                                                            Preview:# icons.tcl --..#..#.A set of stock icons for use in Tk dialogs. The icons used here..#.were provided by the Tango Desktop project which provides a..#.unified set of high quality icons licensed under the..#.Creative Commons Attribution Share-Alike license..#.(https://creativecommons.org/licenses/by-sa/3.0/)..#..#.See http://tango.freedesktop.org/Tango_Desktop_Project..#..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::icons {}....image create photo ::tk::icons::warning -data {.. iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABHNCSVQICAgIfAhkiAAABSZJREFU.. WIXll1toVEcYgL+Zc87u2Yu7MYmrWRuTJuvdiMuqiJd4yYKXgMQKVkSjFR80kFIVJfWCWlvpg4h9.. 8sXGWGof8iKNICYSo6JgkCBEJRG8ImYThNrNxmaTeM7pQ5IlJkabi0/9YZhhZv7///4z/8zPgf+7.. KCNRLgdlJijXwRyuDTlcxV9hbzv8nQmxMjg+XDtiOEplkG9PSfkztGmTgmFQd+FCVzwa3fYN/PHZ.. AcpBaReicW5xcbb64IEQqko8Lc26d/58cxS+/BY6hmJvyEfQBoUpwWCmW1FErKaGWHU13uRk4QkE.. UtxQNFR7QwIoB4eiKD9PWbVKbb10CZmaCqmpxCormRYO26QQx85B0mcD+AeK0
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):329
                                                            Entropy (8bit):4.3973643486226655
                                                            Encrypted:false
                                                            SSDEEP:6:nVxpJFBmHdeA1xNZgk0dIf3Ju4dFi6/XWrWhr3W7FxmVFraazmVAJFKyVQR7icr8:nj5Bqf1fZgp6A4FDG6dm7FUGAJVVMRmn
                                                            MD5:921245A21F7E783997DC7B859AF1B65B
                                                            SHA1:2EFE3C8F70CF18621006890BF21CC097770D140D
                                                            SHA-256:C6DB098EBD8A622164D37D4AB0A8C205DB1A83AC3065D5CDE3CB5FB61925D283
                                                            SHA-512:CAD823FF3D13A64C00825961E75B5133690556FB1F622834F8B1DF316A9E75BABB63B9F5148DAE7B1391123B4C8D55B4B8B2EB6F8E6E1DA9DE02A5BD7AC0FD6F
                                                            Malicious:false
                                                            Preview:README - images directory....This directory includes images for the Tcl Logo and the Tcl Powered..Logo. Please feel free to use the Tcl Powered Logo on any of your..products that employ the use of Tcl or Tk. The Tcl logo may also be..used to promote Tcl in your product documentation, web site or other..places you so desire...
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                            Category:dropped
                                                            Size (bytes):34991
                                                            Entropy (8bit):5.248845410801251
                                                            Encrypted:false
                                                            SSDEEP:768:0YrY6a0v4uIqYMEKjodQKOfRXMLcSqDGpfTKFVm3AsanMEDzzBHWzaw7XUbTJjoB:0YrY6aeIqYMEKjouzfRXMLcSqDGpfTKo
                                                            MD5:23C4EDED40DEC065F99E6653AEE1BB31
                                                            SHA1:3175E261BE198731DEDB07264CCB84C8DEDF7967
                                                            SHA-256:76207D8DFDE189A29DC0E76ADB7EAAA606B96BC6C1C831F34D1C85B1C5B51DD3
                                                            SHA-512:BA139A64BE72BB681040924C4294E2726BA5AB243E805E60A854D2D23E154705E2431D1AB2DE732BFA393747FD30D8A5C913895CBE1463DBF50CC23CAE5B0454
                                                            Malicious:false
                                                            Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL/TK LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:58 PM)..%%BoundingBox: 251 331 371 512..%%HiResBoundingBox: 251.3386 331.5616 370.5213 511.775..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%DocumentCustomColors: (TCL RED)..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 90 576 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe Illustrator
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 68 x 100
                                                            Category:dropped
                                                            Size (bytes):2341
                                                            Entropy (8bit):6.9734417899888665
                                                            Encrypted:false
                                                            SSDEEP:48:qF/mIXn3l7+ejbL/4nZEsKPKer1OPQqVRqJbPpRRKOv/UVO47f:81nHL4T0KorxvRKkc847f
                                                            MD5:FF04B357B7AB0A8B573C10C6DA945D6A
                                                            SHA1:BCB73D8AF2628463A1B955581999C77F09F805B8
                                                            SHA-256:72F6B34D3C8F424FF0A290A793FCFBF34FD5630A916CD02E0A5DDA0144B5957F
                                                            SHA-512:10DFE631C5FC24CF239D817EEFA14329946E26ED6BCFC1B517E2F9AF81807977428BA2539AAA653A89A372257D494E8136FD6ABBC4F727E6B199400DE05ACCD5
                                                            Malicious:false
                                                            Preview:GIF89aD.d...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....D.d........H......*\...z..Ht@Q...92.p...z.$.@@.E..u.Y.2..0c..q.cB.,[..... ..1..qbM.2~*].....s...S.@.L.j..#..\......h..........].D(..m......@.Z....oO...3=.c...G".(..pL...q]..%....[...#...+...X.h....^.....
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 43 x 64
                                                            Category:dropped
                                                            Size (bytes):1670
                                                            Entropy (8bit):6.326462043862671
                                                            Encrypted:false
                                                            SSDEEP:48:PF/mIXn3l7+ejbL/4xsgq4sNC6JYp6s/pmp76F:/1nHL404raM/op2
                                                            MD5:B226CC3DA70AAB2EBB8DFFD0C953933D
                                                            SHA1:EA52219A37A140FD98AEA66EA54685DD8158D9B1
                                                            SHA-256:138C240382304F350383B02ED56C69103A9431C0544EB1EC5DCD7DEC7A555DD9
                                                            SHA-512:3D043F41B887D54CCADBF9E40E48D7FFF99B02B6FAF6B1DD0C6C6FEF0F8A17630252D371DE3C60D3EFBA80A974A0670AF3747E634C59BDFBC78544D878D498D4
                                                            Malicious:false
                                                            Preview:GIF89a+.@...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....+.@........H. .z..(tp......@...92....#. A.......C.\.%...)Z..1a.8s..W/..@....3..C...y$.GW.....5.FU..j..;.F(Pc+W.-..X.D-[.*g....F..`.:mkT...Lw...A/.....u.7p..a..9P.....q2..Xg..G....3}AKv.\.d..yL.>..1.#
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 354 x 520
                                                            Category:dropped
                                                            Size (bytes):11000
                                                            Entropy (8bit):7.88559092427108
                                                            Encrypted:false
                                                            SSDEEP:192:d+nY6zludc/We/yXy9JHBUoIMSapQdrGlapzmyNMK1vbXkgMmgFW/KxIq3NhZe:YnY6p4c/OCHyowaGUaCcMK1vbXNwFW/l
                                                            MD5:45D9B00C4CF82CC53723B00D876B5E7E
                                                            SHA1:DDD10E798AF209EFCE022E97448E5EE11CEB5621
                                                            SHA-256:0F404764D07A6AE2EF9E1E0E8EAAC278B7D488D61CF1C084146F2F33B485F2ED
                                                            SHA-512:6E89DACF2077E1307DA05C16EF8FDE26E92566086346085BE10A7FD88658B9CDC87A3EC4D17504AF57D5967861B1652FA476B2DDD4D9C6BCFED9C60BB2B03B6F
                                                            Malicious:false
                                                            Preview:GIF89ab.................f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....b..........H......*\....#J.H....3j.... '.;p....(.8X..^.0c.I...z8O.\.....:....$..Fu<8`...P.>%I.gO.C.h-..+.`....@..h....dJ.?...K...H.,U.._.#...g..[.*^.x.....J.L.!.'........=+eZ..i..ynF.8...].y|..m.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 87a, 120 x 181
                                                            Category:dropped
                                                            Size (bytes):3889
                                                            Entropy (8bit):7.425138719078912
                                                            Encrypted:false
                                                            SSDEEP:48:9qqbIh+cE4C8ric/jxK5mxsFBu3/0GIJ6Qap1Y5uMiR8pw5rB/SgijDb+TOh:hy+mnZ7xK5IsTwDQmkdiiG5rB/BE+6h
                                                            MD5:BD12B645A9B0036A9C24298CD7A81E5A
                                                            SHA1:13488E4F28676F1E0CE383F80D13510F07198B99
                                                            SHA-256:4D0BD3228AB4CC3E5159F4337BE969EC7B7334E265C99B7633E3DAF3C3FCFB62
                                                            SHA-512:F62C996857CA6AD28C9C938E0F12106E0DF5A20D1B4B0B0D17F6294A112359BA82268961F2A054BD040B5FE4057F712206D02F2E668675BBCF6DA59A4DA0A1BB
                                                            Malicious:false
                                                            Preview:GIF87ax............................................................................z.....{..o.....m..b...`{.X....vy...hk.Um.N...I`.D..Z^.LP.?R.;!....?C.5C.3#.l..,6.*&.15...`..#(.If.y.....l...._..#/...Hm.>_.y..4R.k..#6..._......w..*K.^.."<.....G{.w..3_."C.Q..F....v..!K...v.2m.)_.[..!R.u.1t.g..)f. X.O..E..1z.g. _.Z..D..:..0..Z.. f.D..0..'z..m.N..C../.z.svC.q/.m.ze7.\..P..I..1%.,...............................................................................................................................................................................................................................................................................................................................................................................................,....x..........H.......D..!...7.PAQ...._l8.... C.<.a...*.x....0q.. ..M.%.<.HBe.@.....Q..7..XC..P..<z3..X...P.jA.%'@.J.lV.......R.,..+....t....7h.....(..a...+^.'..7..L.....V...s..$....a.....8`.9..}K......
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                            Category:dropped
                                                            Size (bytes):29706
                                                            Entropy (8bit):5.33387357427899
                                                            Encrypted:false
                                                            SSDEEP:768:0warY6a0v4uIqYMEKjodQKOfRtMLcSqDGpf88KFVmlhEtOI/eE7U0a1:03rY6aeIqYMEKjouzfRtMLcSqDGpfbKc
                                                            MD5:4AE11820D4D592D02CDE458E6F8CE518
                                                            SHA1:A2E8D3D6191B336D43E48A65C3AE6485B07D93C6
                                                            SHA-256:87FD9E46DBB5F2BF1529AFB411182C9FB9C58E23D830C66A233AF0C256BB8EFF
                                                            SHA-512:E0AD4ED570D414BF00931B0F5BBB61FEF981ABDB22ECC42F8E9841905D38874CDFE38F22EDB17ACD0F7539B2932F9C4A865FA73A49BB1458CE05EE10A78BE357
                                                            Malicious:false
                                                            Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL PWRD LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:59 PM)..%%BoundingBox: 242 302 377 513..%%HiResBoundingBox: 242.0523 302.5199 376.3322 512.5323..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (PANTONE Warm Red CV)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 102 564 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe I
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 64 x 100
                                                            Category:dropped
                                                            Size (bytes):1615
                                                            Entropy (8bit):7.461273815456419
                                                            Encrypted:false
                                                            SSDEEP:48:aE45BzojC3r1WAQ+HT2gAdKhPFZ/ObchgB8:V5Gb1WN+yfcObmgW
                                                            MD5:DBFAE61191B9FADD4041F4637963D84F
                                                            SHA1:BD971E71AE805C2C2E51DD544D006E92363B6C0C
                                                            SHA-256:BCC0E6458249433E8CBA6C58122B7C0EFA9557CBC8FB5F9392EED5D2579FC70B
                                                            SHA-512:ACEAD81CC1102284ED7D9187398304F21B8287019EB98B0C4EC7398DD8B5BA8E7D19CAA891AA9E7C22017B73D734110096C8A7B41A070191223B5543C39E87AF
                                                            Malicious:false
                                                            Preview:GIF89a@.d.............................f.................f...ff.f3.f..33.3.........f..ff.f3.33.3.f..f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....@.d....@.pH,..E.... ..(...H$..v..j....K....q..5L......^).3.Y7..r..u.v|g..om...\iHl..p...`G..\~....fn[q...P.g.Z.l....y...\.l......f.Z.g...%%....e...e...)....O.f..e. ....O..qf..%..(.H.u..]..&....#4.......@.).....u!.M..2. ..PJ..#..T..a.....P.Gi... <Hb....x..z.3.X.O..f.........].Bt..lB.Q.r...9pP....&...L. ..,`[.....E6.Q.....?.#L......|g........N....[.._........."4......b....G6.........m.zI].....I.@.......I.9...glew...2.B..c>./..2....x.....<...{...7;.....y.I.....4G.Qj0..7..%.W.V...?!..[...X..=..k.h..[Q<.....0.B....(P.x.,.......8O*Z.8P!.$....u.c..Ea!..eC....CB.. .H..E..#..C..E...z..&.Nu........c.0..#.T.M.U........l.p @..s.|..pf!..&.......8.#.8.....*..J>. .t..h6(........#..0.A...*!..)...x..u.Z....*%..H.....*.......`......|.....1.......&.....T*...f.l...
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 97 x 150
                                                            Category:dropped
                                                            Size (bytes):2489
                                                            Entropy (8bit):7.708754027741608
                                                            Encrypted:false
                                                            SSDEEP:48:/Ev7JJ+3uvz/Hwbcp7igaIwjBui7qFxIIOdJXcI+Ks:M9oWz/7pZAV7qPIImJXtXs
                                                            MD5:711F4E22670FC5798E4F84250C0D0EAA
                                                            SHA1:1A1582650E218B0BE6FFDEFFD64D27F4B9A9870F
                                                            SHA-256:5FC25C30AEE76477F1C4E922931CC806823DF059525583FF5705705D9E913C1C
                                                            SHA-512:220C36010208A87D0F674DA06D6F5B4D6101D196544ABCB4EE32378C46C781589DB1CE7C7DFE6471A8D8E388EE6A279DB237B18AF1EB9130FF9D0222578F1589
                                                            Malicious:false
                                                            Preview:GIF89aa...............................f.................f...ff.f3.f..33.3............f..ff.f3.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....a......@.pH,...r.l:..TB.T..V..z..H.j..h...&.......t"....F...d..gN~Y...g....}..r....g.....o...g.......Y.w..W......N....Z....W....f...tL.~.f....New............W.M.r.........O.q........W-./i.*...`..z..F9.../9..-.......$6..G..S...........zB.,nw.64...e4.......HOt......f.....)..OX..C.eU.(.Qh.....T..<Q.Y.P.L.YxT....2........ji..3.^)zz..O.a..6 ...TZ........^...7.....>|P.....w$...k.ZF.\R.u....F.]Z.--(v+)[Y....=.!.W..+.]..]._.....&..../Ap...j...!..b.:...{.^.=.`...U.....@Hf..\?.(..Lq@.........0..L...a...&.!.....]#..]G \..q...A.H.X[...(.W......,...1a..B...W(.t.8.AdG.)..(P=...Uu.u..A.KM\...'r.R./.W..d2a.0..G...?...B......#H........1Q.0...R....%+...0.I..{.<......QV.tz'.yn.E.p..0i.I.g......L....%....K...A.l.ph.Q.1e...Z....g..2e...smU&d;.J..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 113 x 175
                                                            Category:dropped
                                                            Size (bytes):2981
                                                            Entropy (8bit):7.758793907956808
                                                            Encrypted:false
                                                            SSDEEP:48:AmEwM8ioQoHJQBTThKVI7G78NLL120GFBBFXJRxlu+BmO/5lNqm7Eq:B57QoHJQt4II8BZ+jxluZO/5lNqm7Eq
                                                            MD5:DA5FB10F4215E9A1F4B162257972F9F3
                                                            SHA1:8DB7FB453B79B8F2B4E67AC30A4BA5B5BDDEBD3B
                                                            SHA-256:62866E95501C436B329A15432355743C6EFD64A37CFB65BCECE465AB63ECF240
                                                            SHA-512:990CF306F04A536E4F92257A07DA2D120877C00573BD0F7B17466D74E797D827F6C127E2BEAADB734A529254595918C3A5F54FDBD859BC325A162C8CD8F6F5BE
                                                            Malicious:false
                                                            Preview:GIF89aq...............................f.................f...ff.f3.f..33.3............f..ff.f3.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3................................................................!.. -dl-.!.......,....q......@.pH,...r.l:....A}H...v..R......D.VF..,%M....^.....fyzU.P..f...i.....t..Uqe..N..Z..i......~....g......u.....g......\...h.....P...h.....Q..g....Z..h......]......\...M...[..s...c2.+R.$. ......#.....)v..4....MO.b.....9......[.M.........h'..<-..=.....HQD....D?.~......W7. ..V.W0..l....*0p}..KP?c.\@KW.S(..M..B.....-q...S2...*.,..P.{....F..._MAn ....i.Y3............zh.y.j@...a876...ui.i..;K.........p...`.,}w....tv.m...Y..........;.;.e).e&.......-.NC.*4..(........*..F........[,w....f......E....h..a3.T.^.........)...C.N8.h\T...+&.z....g]H..B..#.t6..Z.....j.-..N......TI....A........M?..Q&V'...Mb.f.x...h.$r.U .9..Ci. ].4.Zb..@...X....%..<..b)V!........Y)x......T.....h.p.d..h..(........]@.**J.M.U.Jf...Y.:....F..g:..d..6q.-..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 130 x 200
                                                            Category:dropped
                                                            Size (bytes):3491
                                                            Entropy (8bit):7.790611381196208
                                                            Encrypted:false
                                                            SSDEEP:96:ROGuxkQ9mcV7RXcECEtqCa+6GK8WseNXhewFIp9ZmL4u:ROGwpVOEbqCrWsUhtIk4u
                                                            MD5:A5E4284D75C457F7A33587E7CE0D1D99
                                                            SHA1:FA98A0FD8910DF2EFB14EDAEC038B4E391FEAB3C
                                                            SHA-256:BAD9116386343F4A4C394BDB87146E49F674F687D52BB847BD9E8198FDA382CC
                                                            SHA-512:4448664925D1C1D9269567905D044BBA48163745646344E08203FCEF5BA1524BA7E03A8903A53DAF7D73FE0D9D820CC9063D4DA2AA1E08EFBF58524B1D69D359
                                                            Malicious:false
                                                            Preview:GIF89a................................f.................f...ff.f3.f..33.3............f..ff.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,...........@.pH,...r.l:..T..F$XIe..V$.x..V.Z.z..F.pxd~..........{....o....l..{.b...hi[}P.k...y.....y.f.._R.\...............m.....y.....x......^.Q...j.....\S.....^.......l......]...[.......).....{....7...`..<...`..">..i.?/..@............>..Z.z@....0B..r...j.V.I.@..;%R...*...J.p.A.t.*..$A*...>`.....@g5BP.A..p.x.............q..8...... ...(.Q..#..@...F..YSK..M..#o.....D.m..-.....k}...BT..V......'.....`.d..~;..9+..6...<b.eZ..y^0]0..I...=.6.....}.0<.Z...M...Y1*35.e.....b...U0F~.-.HT......l2.s.q`-....y...e....dPZ....~.zT.M.... "r.E/k. ...*..Lj@'........Pcd&.(..mxF_w.."K..x!..--Y`..A.....Be.jH.A..\..j.....du#.....]^...>......].i.FMO..].9n1",Y...F...EW.9.....0TY.T...Cv!i`%...Hz@.]..U.!Y...#Dv&pi.z(.mn.A....@Q.0.%...&.4.v.cw(.`cd'|..M9..."...,*.......
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 48 x 75
                                                            Category:dropped
                                                            Size (bytes):1171
                                                            Entropy (8bit):7.289201491091023
                                                            Encrypted:false
                                                            SSDEEP:24:DOfHIzP8hqiF+oyPOmp3XHhPBlMVvG0ffWLpfc:DGoPM+o0OmZXHhOv5WRc
                                                            MD5:7013CFC23ED23BFF3BDA4952266FA7F4
                                                            SHA1:E5B1DED49095332236439538ECD9DD0B1FD4934B
                                                            SHA-256:462A8FF8FD051A8100E8C6C086F497E4056ACE5B20B44791F4AAB964B010A448
                                                            SHA-512:A887A5EC33B82E4DE412564E86632D9A984E8498F02D8FE081CC4AC091A68DF6CC1A82F4BF99906CFB6EA9D0EF47ADAC2D1B0778DCB997FB24E62FC7A6D77D41
                                                            Malicious:false
                                                            Preview:GIF89a0.K.............................f.................f...ff.f3.f..33.3.........f..ff.f3.3f.33.3.f..ff.ff.f3ff333f.3f.33.33f.3......................................................................!.. -dl-.!.......,....0.K....@.pH,...GD.<:..%SR.Z......<.V.$l.....z......:.. .|v[D..f...z.W.G.Vr...NgsU.yl..qU..`.......`fe`.......Fg....(.&...g.Y.. .."..q.V.$.'.Ez.W....y...Y.U...(#Xrf.........Xux.U..........(U.4...X....G.B..t..1S...R..Y. ...l ..".>.h......,%K....A.....<s....#..8.iK.....a.y$h..DQh.PE)....6.....MyL.qzF..... ."..Y0..a......2..*t..Ma..b...M..R.....\..st..=....Q......,>s`....Qt.,..B.R.....!.$..%.....(...s...B.T...`,".h(. D....8..dC..\Q.p.......x.#A.....:..du..(D.XV......7....S.#n8a....2`...f.:G,...==(......`!..$...t....b..../N|...f..J.x... P&.|.d._!N...].1w.3D.0!....@o&H...N.B.J....pz8..w.i....=r.............@5.-!.......H."..[.j.AB<..p....h...V.D..6.h...ab1F.g...I !.V~.H..V.........:.G..|c...,.....TD5..c[.W.....LC.....FJ..71[..lH.M.....8.:$......
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:GIF image data, version 89a, 100 x 100
                                                            Category:dropped
                                                            Size (bytes):5473
                                                            Entropy (8bit):7.754239979431754
                                                            Encrypted:false
                                                            SSDEEP:96:+EqG96vSGfyJZ26G6U1LI7nTD2enhjc+2VBnOqcUERVIim:+46KcyJI6G6uU7/LhjlkhQR7m
                                                            MD5:048AFE69735F6974D2CA7384B879820C
                                                            SHA1:267A9520C4390221DCE50177E789A4EBD590F484
                                                            SHA-256:E538F8F4934CA6E1CE29416D292171F28E67DA6C72ED9D236BA42F37445EA41E
                                                            SHA-512:201DA67A52DADA3AE7C533DE49D3C08A9465F7AA12317A0AE90A8C9C04AA69A85EC00AF2D0069023CD255DDA8768977C03C73516E4848376250E8D0D53D232CB
                                                            Malicious:false
                                                            Preview:GIF89ad.d...................RJJ...B99.......RBB..B11ZBB!....R991!!...)....{{B!!R)).JJ.ss.ZZ.BB.kk.RR.JJ.BB9...JJR!!.ZZ.BB.11.99.{s.sk.kc.cZ.ZR.JB.ZR.JB.JB.RJ.B9.91.B9...{.JB.91.B9.B9.1){)!.)!.9)..ZR.JB{91.cR{1).ZJ.ZJ.RB.J9.B1.B1.9).1!....{B9.{k.scc1).kZZ)!c)!.9).B1.9).9).1!.1!.1!.B).9!.9!.1..).....{.sZ1)R)!.B1.B1.ZBR!..9).ZB.9).R9.R9.1!.J1.J1.B).B).9!.9!.1..1..).....sZ.J9.ZB.cJJ!.{1!.B).9!{)..9!.J).B!.B!.9..R1).kJ)!.B1{9).R9.cB.Z9.Z9.B).Z9.B).R1.9!.R1.J).J).B!.1..9....{.s.J9.{Z.ZB.sR.kJk1!.cB.cB.R1.R).1..B!.J!.B.....R91.J1).c.kJ.J).Z1.B!.B!..9!..{R.sJ.Z9.R1{9!..s.R9.Z...J91Z9){B)...............B91..1)!..............................RJR............B)1......R19........BJ.9B..{..s{......!.......,....d.d.@............0@PHa....*.p...7.8.y...C.s6Z.%Q.#s.`:B.N....4jd.K.0..|y....F@.......1~ ......'Y.B"C&R.V.R.4$k.3...D.......Ef*Y3..M........BDV._.....\..).]..>s..$H\%y0WL...d.......D..'..v..1Kz.Zp$;S
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2307
                                                            Entropy (8bit):5.135743409565932
                                                            Encrypted:false
                                                            SSDEEP:48:XU/zAcKT6yOCaDBfsHLk32s3J5w83KDyP1BXy3JQz7yuC:XNc+92sg3A8uyDXy3JQnDC
                                                            MD5:F090D9B312C16489289FD39813412164
                                                            SHA1:1BEC6668F6549771DADC67D153B89B8F77DCD4B9
                                                            SHA-256:0D1E4405F6273F091732764ED89B57066BE63CE64869BE6C71EA337DC4F2F9B5
                                                            SHA-512:57B323589C5A8D9CBB224416731D8CE65C4B94146DF15CE30885DF63B1D0B3F709093B65390A911F84F20B7C5DE3C0AF9B4D7D531742BE046EDA6E8C3432EF6E
                                                            Malicious:false
                                                            Preview:This software is copyrighted by the Regents of the University of..California, Sun Microsystems, Inc., Scriptics Corporation, ActiveState..Corporation, Apple Inc. and other parties. The following terms apply to..all files associated with the software unless explicitly disclaimed in..individual files.....The authors hereby grant permission to use, copy, modify, distribute,..and license this software and its documentation for any purpose, provided..that existing copyright notices are retained in all copies and that this..notice is included verbatim in any distributions. No written agreement,..license, or royalty fee is required for any of the authorized uses...Modifications to this software may be copyrighted by their authors..and need not follow the licensing terms described here, provided that..the new terms are clearly indicated on the first page of each file where..they apply.....IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY..FOR DIRECT, INDIRECT, SPECIAL, INCI
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):15255
                                                            Entropy (8bit):4.9510475386072095
                                                            Encrypted:false
                                                            SSDEEP:384:apDYV5Yupn5OcckwBv3HCpg2J8JvJBfWeZhXkz+WkHGowv:aPPkevB2JuvJ9D3XmSc
                                                            MD5:804E6DCE549B2E541986C0CE9E75E2D1
                                                            SHA1:C44EE09421F127CF7F4070A9508F22709D06D043
                                                            SHA-256:47C75F9F8348BF8F2C086C57B97B73741218100CA38D10B8ABDF2051C95B9801
                                                            SHA-512:029426C4F659848772E6BB1D8182EB03D2B43ADF68FCFCC1EA1C2CC7C883685DEDA3FFFDA7E071912B9BDA616AD7AF2E1CB48CE359700C1A22E1E53E81CAE34B
                                                            Malicious:false
                                                            Preview:# listbox.tcl --..#..# This file defines the default bindings for Tk listbox widgets..# and provides procedures that help in implementing those bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....#--------------------------------------------------------------------------..# tk::Priv elements used in this file:..#..# afterId -..Token returned by "after" for autoscanning...# listboxPrev -.The last element to be selected or deselected..#...during a selection operation...# listboxSelection -.All of the items that were selected before the..#...current selection operation (such as a mouse..#...drag) started; used to cancel an operation...#--------------------------------------------------------------------------....#--------------
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9862
                                                            Entropy (8bit):4.786615174847384
                                                            Encrypted:false
                                                            SSDEEP:192:mvEEVwjVwqOpOLbkVAg/vyKEZ25YbKZbwrmQ:mvEEVwJwpALPgnyx25YGZkr3
                                                            MD5:D83ED6AC2912900040530528A0237AB3
                                                            SHA1:2D18E42A8B96C3D71C1C6701010FDF75C1E6D5D8
                                                            SHA-256:848258B946C002E2696CA3815A1589C8120AF5CC41FBC11BBD9A3F5754CC21AF
                                                            SHA-512:00B4CD0D58029FC37820C163A4AE1DEAD22FB5C767BDC118659EACE26D449C362189611DFB3FAB1AC129FABFEC2CE853EA2C10D418FAE5AEB91DDC9330FF782D
                                                            Malicious:false
                                                            Preview:# megawidget.tcl..#..#.Basic megawidget support classes. Experimental for any use other than..#.the ::tk::IconList megawdget, which is itself only designed for use in..#.the Unix file dialogs...#..# Copyright (c) 2009-2010 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....package require Tk.....::oo::class create ::tk::Megawidget {.. superclass ::oo::class.. method unknown {w args} {...if {[string match .* $w]} {... [self] create $w {*}$args... return $w...}...next $w {*}$args.. }.. unexport new unknown.. self method create {name superclasses body} {...next $name [list \....superclass ::tk::MegawidgetClass {*}$superclasses]\;$body.. }..}....::oo::class create ::tk::MegawidgetClass {.. variable w hull options IdleCallbacks.. constructor args {...# Extract the "widget name" from the object name...set w [namespace tail [self]].....# Configure things...
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):40215
                                                            Entropy (8bit):4.920242375381158
                                                            Encrypted:false
                                                            SSDEEP:768:NKJsOtO4IzOQj4+Abqqzilh5QU4Vjj9eCcYyq4xYpKgnP:NKJsOtiOQEzilh5Glj9eCcYf4s
                                                            MD5:994CBD4038EEEF9991F7D6086904166F
                                                            SHA1:24C05D55E80DDC36FD207EEB7C0FA262573D67D2
                                                            SHA-256:AE4EE8400174C798337B9C60867CBC94F811B249EBE6DEA21EC6F960BCF5F8CB
                                                            SHA-512:D1A9C8C89025B305AF52F1510B3D4D2A3C556847D345844367FF34C89B917F1646DE81F08994EA1697F8F8526D9FD2602F9AC440B52097CAB5951901DBBD6EBD
                                                            Malicious:false
                                                            Preview:# menu.tcl --..#..# This file defines the default bindings for Tk menus and menubuttons...# It also implements keyboard traversal of menus and implements a few..# other utility procedures related to menus...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# cursor -..Saves the -cursor option for the posted menubutton...# focus -..Saves the focus during a menu selection operation...#...Focus gets restored here when the menu is unposted...# grabGlobal -..Used in conjunction with tk::Priv(oldGrab): if..#...tk::Priv(oldGrab) is non
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):30840
                                                            Entropy (8bit):5.142909056222569
                                                            Encrypted:false
                                                            SSDEEP:768:+c4g8rSnBGzHsGK83Ch0x/0kmSq6O4+rNfPCpM2sEmqKys3pCJxi5dEaY:+c4g8OnBGzBK83Ch0x/0FSq6OnrGM2h3
                                                            MD5:983C7B78F1A0EBACAB8006D391A01FCD
                                                            SHA1:7EA37474EA039ED7A37BFDD7D76EAE673E666283
                                                            SHA-256:C5BDCA3ABA671F03DC4624AB5FD260490F5002491D6C619142CCF5A1A744528A
                                                            SHA-512:A006EF9B7213E572F6FC540D1512A52C52FEC44E3A07846DE09662AE32B7191C5CF639798531847B39E4076BF9DD6314B6F5373065C04F4FEF221185B39C3117
                                                            Malicious:false
                                                            Preview:# mkpsenc.tcl --..#..# This file generates the postscript prolog used by Tk.....namespace eval ::tk {.. # Creates Postscript encoding vector for ISO-8859-1 (could theoretically.. # handle any 8-bit encoding, but Tk never generates characters outside.. # ASCII)... #.. proc CreatePostscriptEncoding {} {...variable psglyphs...# Now check for known. Even if it is known, it can be other than we...# need. GhostScript seems to be happy with such approach...set result "\[\n"...for {set i 0} {$i<256} {incr i 8} {... for {set j 0} {$j<8} {incr j} {....set enc [encoding convertfrom "iso8859-1" \.....[format %c [expr {$i+$j}]]]....catch {.... set hexcode {}.... set hexcode [format %04X [scan $enc %c]]....}....if {[info exists psglyphs($hexcode)]} {.... append result "/$psglyphs($hexcode)"....} else {.... append result "/space"....}... }... append result "\n"...}...append result "\]"...return $result.. }.... # List of adobe glyph names. Converted from glyph
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:xbm image (32x, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):16786
                                                            Entropy (8bit):4.717927930017041
                                                            Encrypted:false
                                                            SSDEEP:192:+haZOxBpK8uxGe4V88/wxY3Fxqipz4zz4zxxFzxT4OcErDxqdRRZeuC/Vj2CoopC:+hRWRG3FFjvsfCoopwITHzLHFHHAABs
                                                            MD5:217087AB6B2A8F9D7252E311D69C3769
                                                            SHA1:09AEB2BC5B7C7F4AB3DE4211D786C519AE0970F6
                                                            SHA-256:A07E3A3809CED3C6C9C1E171DCA5AD1F28357734CD41B2B9DD9F58085B3D2842
                                                            SHA-512:6E57633C924BFC16D380C014C20DD24D5727E70D4843FCEC4D7995B4DB21941EA8F2A5FD6E5386DF3364B6905D4D66B2B9595DC8FC70CFF40A2D49A92A1B6FBA
                                                            Malicious:false
                                                            Preview:# msgbox.tcl --..#..#.Implements messageboxes for platforms that do not have native..#.messagebox support...#..# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# Ensure existence of ::tk::dialog namespace..#..namespace eval ::tk::dialog {}....image create bitmap ::tk::dialog::b1 -foreground black \..-data "#define b1_width 32\n#define b1_height 32..static unsigned char q1_bits[] = {.. 0x00, 0xf8, 0x1f, 0x00, 0x00, 0x07, 0xe0, 0x00, 0xc0, 0x00, 0x00, 0x03,.. 0x20, 0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x08, 0x08, 0x00, 0x00, 0x10,.. 0x04, 0x00, 0x00, 0x20, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x04, 0x00,
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4235
                                                            Entropy (8bit):4.789130604359491
                                                            Encrypted:false
                                                            SSDEEP:48:nlw9Twd+j3gLhokqwX+hTnJgNanPNcgRhgP+5QPwJJENL:nlw9TjjwI3hTnJgNaRhgP75L
                                                            MD5:5A8B46B85DCCBF74E2B5B820E1A7B9D1
                                                            SHA1:980F4FC5BABA82BA0FE02F9BD03A23DF6D565BB1
                                                            SHA-256:4DFFBEEDBF0D66D84B13088016D1A782CEAAD4DED27BE1E38842F8969C0E533F
                                                            SHA-512:2D81FC06CF3C20E4F6314BD13AF81FDE38A9B06510584C84C6A0C8C36314F980F77D02BD8056E7EE5DE599A0620E0C0349124147334B9C141145270046B19D90
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset cs "&Abort" "&P\u0159eru\u0161it".. ::msgcat::mcset cs "&About..." "&O programu...".. ::msgcat::mcset cs "All Files" "V\u0161echny soubory".. ::msgcat::mcset cs "Application Error" "Chyba programu".. ::msgcat::mcset cs "Bold Italic".. ::msgcat::mcset cs "&Blue" "&Modr\341".. ::msgcat::mcset cs "Cancel" "Zru\u0161it".. ::msgcat::mcset cs "&Cancel" "&Zru\u0161it".. ::msgcat::mcset cs "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nemohu zm\u011bnit atku\341ln\355 adres\341\u0159 na \"%1\$s\".\nP\u0159\355stup odm\355tnut.".. ::msgcat::mcset cs "Choose Directory" "V\375b\u011br adres\341\u0159e".. ::msgcat::mcset cs "Cl&ear" "Sma&zat".. ::msgcat::mcset cs "&Clear Console" "&Smazat konzolu".. ::msgcat::mcset cs "Color" "Barva".. ::msgcat::mcset cs "Console" "Konzole".. ::msgcat::mcset cs "&Copy" "&Kop\355rovat".. ::msgcat::mcset cs "Cu&t" "V&y\u0159\355znout".. ::msgcat::mcset cs "&
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3987
                                                            Entropy (8bit):4.651948695787255
                                                            Encrypted:false
                                                            SSDEEP:48:nRZ2uDMr05sIEzs2KkrT+XuTKN0FjDDP9:nRZzDy4kBKkrT+QpP9
                                                            MD5:227B0F255F854460E8E5146ED7A17B85
                                                            SHA1:99A080CAD631F21963C51A5B254BDAD3724DC866
                                                            SHA-256:FEEF8F8AD33BB3362C845A25D6ED273C398051047D899B31790474614C7AFD2D
                                                            SHA-512:36A4B48831316CC29686CC76DA00110EB078EC56F55A960D11AE427AA3D913C340C1E3805BF2AD40C1A8A92FC6587DA5D2C245E7501289FC3E228BE14FE49598
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset da "&Abort" "&Afbryd".. ::msgcat::mcset da "&About..." "&Om...".. ::msgcat::mcset da "All Files" "Alle filer".. ::msgcat::mcset da "Application Error" "Programfejl".. ::msgcat::mcset da "&Blue" "&Bl\u00E5".. ::msgcat::mcset da "Cancel" "Annuller".. ::msgcat::mcset da "&Cancel" "&Annuller".. ::msgcat::mcset da "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ikke skifte til katalog \"%1\$s\".\nIngen rettigheder.".. ::msgcat::mcset da "Choose Directory" "V\u00E6lg katalog".. ::msgcat::mcset da "Cl&ear" "&Ryd".. ::msgcat::mcset da "&Clear Console" "&Ryd konsolen".. ::msgcat::mcset da "Color" "Farve".. ::msgcat::mcset da "Console" "Konsol".. ::msgcat::mcset da "&Copy" "&Kopier".. ::msgcat::mcset da "Cu&t" "Kli&p".. ::msgcat::mcset da "&Delete" "&Slet".. ::msgcat::mcset da "Details >>" "Detailer".. ::msgcat::mcset da "Directory \"%1\$s\" does not exist." "Katalog \"%1\$s\" finde
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4914
                                                            Entropy (8bit):4.6221938909259475
                                                            Encrypted:false
                                                            SSDEEP:96:nxLEpatioUqGBLbz4ME/XKKVN9R7S/0oYr9:epY3MkXKKxRu2r9
                                                            MD5:2203F65BCDA61BC15AEAC4F868C6D94A
                                                            SHA1:C4CC3975679D23892406E4E8971359A0775B1B86
                                                            SHA-256:C0F574B14068A049E93421C73873D750C98DE28B7B77AA42FE72CBE0270A4186
                                                            SHA-512:79F134FDAD3B12524D43BF9F59D3C04CAE30A95F591A51B82C8DF7CC8563BEA5D464AEECC457D9F60C04365E30459C447ED537AFC832BA25E1815DE06C2B81E5
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset de "&Abort" "&Abbruch".. ::msgcat::mcset de "&About..." "&\u00dcber...".. ::msgcat::mcset de "All Files" "Alle Dateien".. ::msgcat::mcset de "Application Error" "Applikationsfehler".. ::msgcat::mcset de "&Apply" "&Anwenden".. ::msgcat::mcset de "Bold" "Fett".. ::msgcat::mcset de "Bold Italic" "Fett kursiv".. ::msgcat::mcset de "&Blue" "&Blau".. ::msgcat::mcset de "Cancel" "Abbruch".. ::msgcat::mcset de "&Cancel" "&Abbruch".. ::msgcat::mcset de "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kann nicht in das Verzeichnis \"%1\$s\" wechseln.\nKeine Rechte vorhanden.".. ::msgcat::mcset de "Choose Directory" "W\u00e4hle Verzeichnis".. ::msgcat::mcset de "Cl&ear" "&R\u00fccksetzen".. ::msgcat::mcset de "&Clear Console" "&Konsole l\u00f6schen".. ::msgcat::mcset de "Color" "Farbe".. ::msgcat::mcset de "Console" "Konsole".. ::msgcat::mcset de "&Copy" "&Kopieren".. ::msgcat::mcset de "
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with very long lines (355), with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8784
                                                            Entropy (8bit):4.334043617395095
                                                            Encrypted:false
                                                            SSDEEP:48:tVj/F+oxBHbkI8+xTqFt2zPJ0k63fRGIUvPXrfBNnzc+zIF7meUOT7GC8MO07S0g:fj9+AHlLoozHn7fBFrMVmehCAGb
                                                            MD5:780F863903BBDAA6C371EC0D3C7E6D59
                                                            SHA1:DF5D435E132BEE4C076A7FC577C8C275A8B68CD5
                                                            SHA-256:3F6F155864FE59A341BFD869735E54DD21CEE21BBD038433D9B271AD77BA3F7E
                                                            SHA-512:091965EE912513AE1943BE840A2E757188FBA6F760F7C47BE80D06313D59B051F183E3A29D4B1CEDE1F9E54CA3CA23D75FF2C3A3672A4E71FB56F0FA76F7FA0D
                                                            Malicious:false
                                                            Preview:## Messages for the Greek (Hellenic - "el") language...## Please report any changes/suggestions to:..## petasis@iit.demokritos.gr....namespace eval ::tk {.. ::msgcat::mcset el "&Abort" "\u03a4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03cc\u03c2".. ::msgcat::mcset el "About..." "\u03a3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac...".. ::msgcat::mcset el "All Files" "\u038c\u03bb\u03b1 \u03c4\u03b1 \u0391\u03c1\u03c7\u03b5\u03af\u03b1".. ::msgcat::mcset el "Application Error" "\u039b\u03ac\u03b8\u03bf\u03c2 \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae\u03c2".. ::msgcat::mcset el "&Blue" "\u039c\u03c0\u03bb\u03b5".. ::msgcat::mcset el "&Cancel" "\u0391\u03ba\u03cd\u03c1\u03c9\u03c3\u03b7".. ::msgcat::mcset el \.."Cannot change to the directory \"%1\$s\".\nPermission denied." \.."\u0394\u03b5\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03ae \u03b7 \u03b1\u03bb\u03bb\u03b1\u03b3\u
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3377
                                                            Entropy (8bit):4.279601088621442
                                                            Encrypted:false
                                                            SSDEEP:24:sQ7dw5bO0V3gqmCNyoKJ6iwp/uvENv4SKEcET2hsHFjr:n7dwNOc3RmOKJQcvEl4SK1ET2hYFjr
                                                            MD5:D48CFC9EC779085E8F6AAA7B1C40C89A
                                                            SHA1:0CF6253BFF39F40CA0991F9B06D3394BFEA21ED2
                                                            SHA-256:4A33B44B2E220E28EAAE7FAC407CAFE43D97C270DA58FA5F3B699A1760BFB2A4
                                                            SHA-512:C00EC0CFB48ABE621EF625C51952BCF177CE3BC7F0DEC5276EF84C9A97C7E014806B106EA8DEE202C43F8DD54ED7261A8D899E3EE12E3F37A90C387D864463AE
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset en "&Abort".. ::msgcat::mcset en "&About...".. ::msgcat::mcset en "All Files".. ::msgcat::mcset en "Application Error".. ::msgcat::mcset en "&Apply".. ::msgcat::mcset en "Bold".. ::msgcat::mcset en "Bold Italic".. ::msgcat::mcset en "&Blue".. ::msgcat::mcset en "Cancel".. ::msgcat::mcset en "&Cancel".. ::msgcat::mcset en "Cannot change to the directory \"%1\$s\".\nPermission denied.".. ::msgcat::mcset en "Choose Directory".. ::msgcat::mcset en "Cl&ear".. ::msgcat::mcset en "&Clear Console".. ::msgcat::mcset en "Color".. ::msgcat::mcset en "Console".. ::msgcat::mcset en "&Copy".. ::msgcat::mcset en "Cu&t".. ::msgcat::mcset en "&Delete".. ::msgcat::mcset en "Details >>".. ::msgcat::mcset en "Directory \"%1\$s\" does not exist.".. ::msgcat::mcset en "&Directory:".. ::msgcat::mcset en "&Edit".. ::msgcat::mcset en "Effects".. ::msgcat::mcset en "Error: %1\$s".. ::msgcat::mcs
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):66
                                                            Entropy (8bit):4.262228832346611
                                                            Encrypted:false
                                                            SSDEEP:3:fEGp6fRyv//mGoW8vMKEQXyVn:sooyv//xoQOOn
                                                            MD5:3D41FC47CD9936F817EF9645D73A77ED
                                                            SHA1:E62BBE094B71CAF4A389DE3ECD84D2EEFBA33827
                                                            SHA-256:01238293356E82F1D298896491F8B299BB7DC9C34F299C9E756254C736DA612B
                                                            SHA-512:B92582C32C4D7CD9DE6571CBB6B93DD693A8B5A80645468E2D02B80C339BE2B95D5B4878A0DA9AFFE9E2F98A6C38AAE9CC1FF2440146D0ED128FE8C9A92EECDB
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset en_gb Color Colour..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4035
                                                            Entropy (8bit):4.614759526381991
                                                            Encrypted:false
                                                            SSDEEP:48:n6oXunu4/LQmI+nl0WemQ+uISIKk/2nibN5My/uXcFSZHBohy:n6oXuu4jJtlPemVuISIKkuniJS1Gy
                                                            MD5:3704A08985B0AA3C521FDF9C2DA59D97
                                                            SHA1:3F1E42C5697504B4DEE1EE314CD361B4203BF686
                                                            SHA-256:84B117857674A2426290946053A61316C5C8C6808F2C6EDF0ECC5C4A9C5C72AC
                                                            SHA-512:99FE97B10B1CA59DDA0385161E7C05F7D22424B6B1FB844138921EF94B2E9809D73EBC0062897D0DDE040CF92C96A6E4916CC9F3F02442AE2C4162858434B6BA
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset eo "&Abort" "&\u0108esigu".. ::msgcat::mcset eo "&About..." "Pri...".. ::msgcat::mcset eo "All Files" "\u0108iuj dosieroj".. ::msgcat::mcset eo "Application Error" "Aplikoeraro".. ::msgcat::mcset eo "&Blue" "&Blua".. ::msgcat::mcset eo "Cancel" "Rezignu".. ::msgcat::mcset eo "&Cancel" "&Rezignu".. ::msgcat::mcset eo "Cannot change to the directory \"%1\$s\".\nPermission denied." "Neeble \u015dan\u011di al dosierujo \"%1\$s\".\nVi ne rajtas tion.".. ::msgcat::mcset eo "Choose Directory" "Elektu Dosierujon".. ::msgcat::mcset eo "Cl&ear" "&Vakigu".. ::msgcat::mcset eo "&Clear Console" "&Vakigu konzolon".. ::msgcat::mcset eo "Color" "Koloro".. ::msgcat::mcset eo "Console" "Konzolo".. ::msgcat::mcset eo "&Copy" "&Kopiu".. ::msgcat::mcset eo "Cu&t" "&Eltondu".. ::msgcat::mcset eo "&Delete" "&Forigu".. ::msgcat::mcset eo "Details >>" "Detaloj >>".. ::msgcat::mcset eo "Directory \"%1\$s\" does not exi
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4024
                                                            Entropy (8bit):4.536517819515934
                                                            Encrypted:false
                                                            SSDEEP:48:nN0T1Lt8ZYSih/aiik148aFscyTzoixccUTqjcg60Dx/H5:nN0BLSQUXy/o8re055
                                                            MD5:4765F3C055742530E4644771EBC6C69F
                                                            SHA1:8BEA722AC00522DEAA5B380AEEF4CA57D7A271BD
                                                            SHA-256:D2842B80F1B521EFF2D2656A69274B5F2A8F4F5831AF2E8EE73E3C37389F981F
                                                            SHA-512:9CA247F22797A1A1FCA42B5CDABF58262ED95EECDDD321CEB1440A60A4375923E0F511238F360D159EB5EED6F82CBBE0B8907A07CC77DB831BF97082932CD0FD
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset es "&Abort" "&Abortar".. ::msgcat::mcset es "&About..." "&Acerca de ...".. ::msgcat::mcset es "All Files" "Todos los archivos".. ::msgcat::mcset es "Application Error" "Error de la aplicaci\u00f3n".. ::msgcat::mcset es "&Blue" "&Azul".. ::msgcat::mcset es "Cancel" "Cancelar".. ::msgcat::mcset es "&Cancel" "&Cancelar".. ::msgcat::mcset es "Cannot change to the directory \"%1\$s\".\nPermission denied." "No es posible acceder al directorio \"%1\$s\".\nPermiso denegado.".. ::msgcat::mcset es "Choose Directory" "Elegir directorio".. ::msgcat::mcset es "Cl&ear" "&Borrar".. ::msgcat::mcset es "&Clear Console" "&Borrar consola".. ::msgcat::mcset es "Color".. ::msgcat::mcset es "Console" "Consola".. ::msgcat::mcset es "&Copy" "&Copiar".. ::msgcat::mcset es "Cu&t" "Cor&tar".. ::msgcat::mcset es "&Delete" "&Borrar".. ::msgcat::mcset es "Details >>" "Detalles >>".. ::msgcat::mcset es "Directory \"%1\$s\"
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4693
                                                            Entropy (8bit):4.640083757706223
                                                            Encrypted:false
                                                            SSDEEP:48:najdLGoC0TXwqTwPRNQXfdHzAIX169ZZv6CpvgIPJupuupw6kWVVxn6/9Yv:nWdLGo2WiMn4t5pvbxuPtx6F6
                                                            MD5:BD795A1D95446BEE7AEB16FB6E346271
                                                            SHA1:38469DBD386C35B90EBE0A0FE2CE9F1AB5A5444A
                                                            SHA-256:893BEDCDAED4602898D988E6248B8BB0857DD66C06194B45F31340CA03D82369
                                                            SHA-512:B9BDDECB1DE2025C6C4027BF6228A14D5F573F5859ED3444298809266F06E6203F72004D589314C6529A2E198039355B4FD6160F87DA8F97B55E9F841B6C3F5A
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset fi "&Abort" "&Keskeyt\u00e4".. ::msgcat::mcset fi "&About..." "&Tietoja...".. ::msgcat::mcset fi "All Files" "Kaikki tiedostot".. ::msgcat::mcset fi "Application Error" "Ohjelmavirhe".. ::msgcat::mcset fi "&Apply" "K\u00e4&yt\u00e4".. ::msgcat::mcset fi "Bold" "Lihavoitu".. ::msgcat::mcset fi "Bold Italic" "Lihavoitu, kursivoitu".. ::msgcat::mcset fi "&Blue" "&Sininen".. ::msgcat::mcset fi "Cancel" "Peruuta".. ::msgcat::mcset fi "&Cancel" "&Peruuta".. ::msgcat::mcset fi "Cannot change to the directory \"%1\$s\".\nPermission denied." "Ei voitu vaihtaa hakemistoon \"%1\$s\".\nLupa ev\u00e4tty.".. ::msgcat::mcset fi "Choose Directory" "Valitse hakemisto".. ::msgcat::mcset fi "Cl&ear" "&Tyhjenn\u00e4".. ::msgcat::mcset fi "&Clear Console" "&Tyhjenn\u00e4 konsoli".. ::msgcat::mcset fi "Color" "V\u00e4ri".. ::msgcat::mcset fi "Console" "Konsoli".. ::msgcat::mcset fi "&Copy" "K&opioi".. ::msgcat::mcs
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3877
                                                            Entropy (8bit):4.630737553723335
                                                            Encrypted:false
                                                            SSDEEP:48:nByEWs/3lHFB9FamsIfSAzZ2eaISAxh0BRc3jC:nByEWaRNzsSSWonMAv
                                                            MD5:E279E5FFF03E1B8E9063ABC8A499A6BD
                                                            SHA1:80910911F6B4830BA4DCBA9A9EAD12C9F802DDC9
                                                            SHA-256:3F2CEB4A33695AB6B56E27F61A4C60C029935BB026497D99CB2C246BCB4A63C4
                                                            SHA-512:8333388E421AC3F342317BEBE352809B0B190EF8B044A0BAE2FE4051974D86008BAFDCB7098E9DC39A8D9E1E08FB87F54B9D3388AF2D0185FF913DB6788C5AB5
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset fr "&Abort" "&Annuler".. ::msgcat::mcset fr "About..." "\u00c0 propos...".. ::msgcat::mcset fr "All Files" "Tous les fichiers".. ::msgcat::mcset fr "Application Error" "Erreur d'application".. ::msgcat::mcset fr "&Blue" "&Bleu".. ::msgcat::mcset fr "Cancel" "Annuler".. ::msgcat::mcset fr "&Cancel" "&Annuler".. ::msgcat::mcset fr "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossible d'acc\u00e9der au r\u00e9pertoire \"%1\$s\".\nPermission refus\u00e9e.".. ::msgcat::mcset fr "Choose Directory" "Choisir r\u00e9pertoire".. ::msgcat::mcset fr "Cl&ear" "Effacer".. ::msgcat::mcset fr "Color" "Couleur".. ::msgcat::mcset fr "Console".. ::msgcat::mcset fr "Copy" "Copier".. ::msgcat::mcset fr "Cu&t" "Couper".. ::msgcat::mcset fr "Delete" "Effacer".. ::msgcat::mcset fr "Details >>" "D\u00e9tails >>".. ::msgcat::mcset fr "Directory \"%1\$s\" does not exist." "Le r\u00e9pertoire \"%1\$s\"
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4678
                                                            Entropy (8bit):4.7955991577265245
                                                            Encrypted:false
                                                            SSDEEP:96:nkCEz2TTrKmA17fzq/Hj+pUva+fQR/a5a/Thn5kU:kTqM17u/8NiMrhb
                                                            MD5:4F1610E0C73DAE668E3F9D9235631152
                                                            SHA1:63EE54A6C1A69B798C65C999D5F80A7AB252B6D8
                                                            SHA-256:E063AD7CA93F37728A65E4CD7C0433950F22607D307949F6CB056446AFEAA4FE
                                                            SHA-512:37F4B8A9CD020A77591C09AF40FBC2FA82107B2596D31B5F30CE6ECAA225417CF7A5C62FB7A93539B0D7E930D0A44F9BF2EE6BE113F831B0A72B229444672AFD
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset hu "&Abort" "&Megszak\u00edt\u00e1s".. ::msgcat::mcset hu "&About..." "N\u00e9vjegy...".. ::msgcat::mcset hu "All Files" "Minden f\u00e1jl".. ::msgcat::mcset hu "Application Error" "Alkalmaz\u00e1s hiba".. ::msgcat::mcset hu "&Blue" "&K\u00e9k".. ::msgcat::mcset hu "Cancel" "M\u00e9gsem".. ::msgcat::mcset hu "&Cancel" "M\u00e9g&sem".. ::msgcat::mcset hu "Cannot change to the directory \"%1\$s\".\nPermission denied." "A k\u00f6nyvt\u00e1rv\u00e1lt\u00e1s nem siker\u00fclt: \"%1\$s\".\nHozz\u00e1f\u00e9r\u00e9s megtagadva.".. ::msgcat::mcset hu "Choose Directory" "K\u00f6nyvt\u00e1r kiv\u00e1laszt\u00e1sa".. ::msgcat::mcset hu "Cl&ear" "T\u00f6rl\u00e9s".. ::msgcat::mcset hu "&Clear Console" "&T\u00f6rl\u00e9s Konzol".. ::msgcat::mcset hu "Color" "Sz\u00edn".. ::msgcat::mcset hu "Console" "Konzol".. ::msgcat::mcset hu "&Copy" "&M\u00e1sol\u00e1s".. ::msgcat::mcset hu "Cu&t" "&Kiv\u00e1g\u00e1s".. ::ms
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3765
                                                            Entropy (8bit):4.49679862548805
                                                            Encrypted:false
                                                            SSDEEP:48:nmU4xnonTjwUE5Xs6ZrT8BpXAg+Wr+u92C8t7mU9nUSs:nZ4FonFE58HBpXjr+fBJs
                                                            MD5:B74C54666A5A431A782DB691B4CA3315
                                                            SHA1:2BC63982C14BBA8A4C451CE31540181F40CE2216
                                                            SHA-256:806930F283FD097195C7850E3486B3815D1564529B4F8E5FA6D26F3175183BC1
                                                            SHA-512:8120E2FFD14E0A992E254796ADDC0DC995C921BE31688C0995D7A36FE82609D78791FEF73EAF5B14E2F0D40AD256AB8DAAA07C18E6950362B28E40B71E47C0B6
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset it "&Abort" "&Interrompi".. ::msgcat::mcset it "&About..." "Informazioni...".. ::msgcat::mcset it "All Files" "Tutti i file".. ::msgcat::mcset it "Application Error" "Errore dell' applicazione".. ::msgcat::mcset it "&Blue" "&Blu".. ::msgcat::mcset it "Cancel" "Annulla".. ::msgcat::mcset it "&Cancel" "&Annulla".. ::msgcat::mcset it "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossibile accedere alla directory \"%1\$s\".\nPermesso negato.".. ::msgcat::mcset it "Choose Directory" "Scegli una directory".. ::msgcat::mcset it "Cl&ear" "Azzera".. ::msgcat::mcset it "&Clear Console" "Azzera Console".. ::msgcat::mcset it "Color" "Colore".. ::msgcat::mcset it "Console".. ::msgcat::mcset it "&Copy" "Copia".. ::msgcat::mcset it "Cu&t" "Taglia".. ::msgcat::mcset it "Delete" "Cancella".. ::msgcat::mcset it "Details >>" "Dettagli >>".. ::msgcat::mcset it "Directory \"%1\$s\" does not ex
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4557
                                                            Entropy (8bit):4.524344068436489
                                                            Encrypted:false
                                                            SSDEEP:48:nucQswBju0x0M4U2z9KSSOzZL5KhWTqGGIrlxXvhYbL/ZO5NT+T4kiLzzdDf1SDM:nLGa0x0Mp2KSHKSv2bL/ZO5u6nRfAXU9
                                                            MD5:E56229BAC5A8ABB90C4DD8EE3F9FF9F8
                                                            SHA1:7527D6C3C6C84BFF0E683FFA86A21C58458EB55D
                                                            SHA-256:0914FBA42361227D14FA281E8A9CBF57C16200B4DA1E61CC3402EF0113A512C7
                                                            SHA-512:13649DDB06DB4BA9E39BEAF828211086A519444DA9AB5CBDD1B88B29208388189A5141F75AD94B56A348EDDE534FFADE8B19B557CB988EA4ECC9A84B135D36C1
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset nl "&Abort" "&Afbreken".. ::msgcat::mcset nl "&About..." "Over...".. ::msgcat::mcset nl "All Files" "Alle Bestanden".. ::msgcat::mcset nl "Application Error" "Toepassingsfout".. ::msgcat::mcset nl "&Apply" "Toepassen".. ::msgcat::mcset nl "Bold" "Vet".. ::msgcat::mcset nl "Bold Italic" "Vet Cursief".. ::msgcat::mcset nl "&Blue" "&Blauw".. ::msgcat::mcset nl "Cancel" "Annuleren".. ::msgcat::mcset nl "&Cancel" "&Annuleren".. ::msgcat::mcset nl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan niet naar map \"%1\$s\" gaan.\nU heeft hiervoor geen toestemming.".. ::msgcat::mcset nl "Choose Directory" "Kies map".. ::msgcat::mcset nl "Cl&ear" "Wissen".. ::msgcat::mcset nl "&Clear Console" "&Wis Console".. ::msgcat::mcset nl "Color" "Kleur".. ::msgcat::mcset nl "Console".. ::msgcat::mcset nl "&Copy" "Kopi\u00ebren".. ::msgcat::mcset nl "Cu&t" "Knippen".. ::msgcat::mcset nl "&Dele
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4932
                                                            Entropy (8bit):4.799369674927008
                                                            Encrypted:false
                                                            SSDEEP:48:nXra9E310fwNCeVsvSmy6MZv8lWBTDGdZ3tojTyrEQmAUCIx4wBxZ:n7a9Q0fyw5MQWgP3uoZChB3
                                                            MD5:8CFA2E38822303FDCB55AE3277F0B81B
                                                            SHA1:447F28A5064FCEA019C60B3F9B6D50CD43C2D0E3
                                                            SHA-256:EACEB1F08DE0863CCF726881E07FE5B135EA09646C5253E0CBF7DDB987EB0D92
                                                            SHA-512:E38BA9059AFF55C2B22A4AE24D6A76149C76DBA8BF8646AE81D6E07D7ED490D0605034B29D9AC848E6685C8EC26A3DBE5B2EAF462B14D96376E80076FBE7082A
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset pl "&Abort" "&Przerwij".. ::msgcat::mcset pl "&About..." "O programie...".. ::msgcat::mcset pl "All Files" "Wszystkie pliki".. ::msgcat::mcset pl "Application Error" "B\u0142\u0105d w programie".. ::msgcat::mcset pl "&Apply" "Zastosuj".. ::msgcat::mcset pl "Bold" "Pogrubienie".. ::msgcat::mcset pl "Bold Italic" "Pogrubiona kursywa".. ::msgcat::mcset pl "&Blue" "&Niebieski".. ::msgcat::mcset pl "Cancel" "Anuluj".. ::msgcat::mcset pl "&Cancel" "&Anuluj".. ::msgcat::mcset pl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nie mo\u017cna otworzy\u0107 katalogu \"%1\$s\".\nOdmowa dost\u0119pu.".. ::msgcat::mcset pl "Choose Directory" "Wybierz katalog".. ::msgcat::mcset pl "Cl&ear" "&Wyczy\u015b\u0107".. ::msgcat::mcset pl "&Clear Console" "&Wyczy\u015b\u0107 konsol\u0119".. ::msgcat::mcset pl "Color" "Kolor".. ::msgcat::mcset pl "Console" "Konsola".. ::msgcat::mcset pl "&Copy" "&Kopiu
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3987
                                                            Entropy (8bit):4.63232183429232
                                                            Encrypted:false
                                                            SSDEEP:48:nHOT1mM5qHHxiBHb3joTjtcp2UqMxweo6VvilCMKKXx9vjM:nHOT1mMQnwB/otcUUpGX6VPVoLjM
                                                            MD5:4018686F2A8E299D86BDB1478BC97896
                                                            SHA1:0EECE3D57F2EA5EECE8157B06F3AFB97E1F2551A
                                                            SHA-256:D687F71F0432BB0D02EFDF576E526D2C19D4136F76C41A3224A2F034168F3F34
                                                            SHA-512:4D730068B2A21E1D6004205B10A9D0D5EE9683FEB03B6FB673E8B9B94ED6BE468086A52DFE97C4DBF35A07CBB2C5E276DF0952A06C78E029D53D796CB6FCC8DF
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset pt "&Abort" "&Abortar".. ::msgcat::mcset pt "About..." "Sobre ...".. ::msgcat::mcset pt "All Files" "Todos os arquivos".. ::msgcat::mcset pt "Application Error" "Erro de aplica\u00e7\u00e3o".. ::msgcat::mcset pt "&Blue" "&Azul".. ::msgcat::mcset pt "Cancel" "Cancelar".. ::msgcat::mcset pt "&Cancel" "&Cancelar".. ::msgcat::mcset pt "Cannot change to the directory \"%1\$s\".\nPermission denied." "N\u00e3o foi poss\u00edvel mudar para o diret\u00f3rio \"%1\$s\".\nPermiss\u00e3o negada.".. ::msgcat::mcset pt "Choose Directory" "Escolha um diret\u00f3rio".. ::msgcat::mcset pt "Cl&ear" "Apagar".. ::msgcat::mcset pt "&Clear Console" "Apagar Console".. ::msgcat::mcset pt "Color" "Cor".. ::msgcat::mcset pt "Console".. ::msgcat::mcset pt "&Copy" "Copiar".. ::msgcat::mcset pt "Cu&t" "Recortar".. ::msgcat::mcset pt "&Delete" "Excluir".. ::msgcat::mcset pt "Details >>" "Detalhes >>".. ::msgcat::mcset pt "D
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8620
                                                            Entropy (8bit):4.477728981060218
                                                            Encrypted:false
                                                            SSDEEP:96:n9MEBGkFKT4YHCDhxqEMk0yOC2xXLtSRoxwKl9zFAWx2yuV9cDcwRjnWNQuNFNfO:T0rm8IONoRkN1w+jRQ/FoxrRHRJP
                                                            MD5:C69A904A57FDC95520086E9DDFED362C
                                                            SHA1:F0220602ABE91FE563E5AA6A4EA4AB43818C0CFC
                                                            SHA-256:F0D310A2EE9C0AF928D822CBB39BCBE54FB2C1C95EE8167DFFD55EDC1B2FE040
                                                            SHA-512:808B82F29B7BA06AF5AE44C6C23EC8DD743E93B391F060C7586D6D3FF26C97294BD11AD215848EBA422491BD50C4509330DD24C83134C7A384E81304133CAADB
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset ru "&Abort" "&\u041e\u0442\u043c\u0435\u043d\u0438\u0442\u044c".. ::msgcat::mcset ru "&About..." "\u041f\u0440\u043e...".. ::msgcat::mcset ru "All Files" "\u0412\u0441\u0435 \u0444\u0430\u0439\u043b\u044b".. ::msgcat::mcset ru "Application Error" "\u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435".. ::msgcat::mcset ru "&Apply" "&\u041f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c".. ::msgcat::mcset ru "Bold" "Bold".. ::msgcat::mcset ru "Bold Italic" "Bold Italic".. ::msgcat::mcset ru "&Blue" " &\u0413\u043e\u043b\u0443\u0431\u043e\u0439".. ::msgcat::mcset ru "Cancel" "\u041e\u0442\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "&Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "Cannot change to the directory \"%1\$s\".\nPermission denied." \....."\u041d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u0432 \u043a\u043
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3908
                                                            Entropy (8bit):4.658068191079967
                                                            Encrypted:false
                                                            SSDEEP:48:nT8A5cbwKmtI1sE9xt6BDyepTr2iiK/yGqXZlBp9:nD5cb2extDepTCnVpJ9
                                                            MD5:1D085A672A6FCDECEF5D7D876E4C74A3
                                                            SHA1:1A40C03F15A6926359CA3E5C0A809485CAD28AEE
                                                            SHA-256:A6821A13D34FB31F1827294B82C4BF9586BB255CA14F78C3ACE11181F42EF211
                                                            SHA-512:981EDEEF5E4C915BB8F10044096B412D1855CAD08F98A448C6C0A49A54222945EBD102DDCB9525535E0FB19313C319155FA59384605B2C36CC8B4A58693D57E7
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset sv "&Abort" "&Avsluta".. ::msgcat::mcset sv "&About..." "&Om...".. ::msgcat::mcset sv "All Files" "Samtliga filer".. ::msgcat::mcset sv "Application Error" "Programfel".. ::msgcat::mcset sv "&Blue" "&Bl\u00e5".. ::msgcat::mcset sv "Cancel" "Avbryt".. ::msgcat::mcset sv "&Cancel" "&Avbryt".. ::msgcat::mcset sv "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ej n\u00e5 mappen \"%1\$s\".\nSaknar r\u00e4ttigheter.".. ::msgcat::mcset sv "Choose Directory" "V\u00e4lj mapp".. ::msgcat::mcset sv "Cl&ear" "&Radera".. ::msgcat::mcset sv "&Clear Console" "&Radera konsollen".. ::msgcat::mcset sv "Color" "F\u00e4rg".. ::msgcat::mcset sv "Console" "Konsoll".. ::msgcat::mcset sv "&Copy" "&Kopiera".. ::msgcat::mcset sv "Cu&t" "Klipp u&t".. ::msgcat::mcset sv "&Delete" "&Radera".. ::msgcat::mcset sv "Details >>" "Detaljer >>".. ::msgcat::mcset sv "Directory \"%1\$s\" does not exist." "Mapp
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4948
                                                            Entropy (8bit):5.318834981738548
                                                            Encrypted:false
                                                            SSDEEP:48:nnIoT3wHqLHQslojYhOvZSVGNUpi6Z40qBAE9A+uiTrBsyqCgnPLz:nnIoT3wHU/osIAwNILi0HE2oV6CgPLz
                                                            MD5:3CB2966C9F24425075635FE24BE413FD
                                                            SHA1:87E9C83723AAE890E3582DFAB2BB059E6564E0A3
                                                            SHA-256:FD33A3408B054C297A9263B9B695CD629818BC9A882321AE8AC9E4C01AC07CC8
                                                            SHA-512:05C4970E6628934663334B5AC5749A55961D99517CF7FFBF262CD49AE2464DD9E6A52295735124266BD9CF055C506111E283B495F054E7EFDF17E392FB16261F
                                                            Malicious:false
                                                            Preview:namespace eval ::tk {.. ::msgcat::mcset zh_cn "&Abort" "&..".. ::msgcat::mcset zh_cn "&About..." "&....".. ::msgcat::mcset zh_cn "All Files" "....".. ::msgcat::mcset zh_cn "Application Error" "......".. ::msgcat::mcset zh_cn "&Apply" "&..".. ::msgcat::mcset zh_cn "Bold" "..".. ::msgcat::mcset zh_cn "Bold Italic" "....".. ::msgcat::mcset zh_cn "&Blue" "&..".. ::msgcat::mcset zh_cn "Cancel" "..".. ::msgcat::mcset zh_cn "&Cancel" "&..".. ::msgcat::mcset zh_cn "Cannot change to the directory \"%1\$s\".\nPermission denied." "...... \"%1\$s\".\n......".. ::msgcat::mcset zh_cn "Choose Directory" ".....".. ::msgcat::mcset zh_cn "Cl&ear" ".&.".. ::msgcat::mcset zh_cn "&Clear Console" "&....".. ::msgcat::mcset zh_cn "Color" "..".. ::msgcat::mcset zh_cn "Console" "..".. ::msgcat::mcset zh_cn "&Copy" "&..".. ::msgcat::mcset zh
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5772
                                                            Entropy (8bit):5.038729016734604
                                                            Encrypted:false
                                                            SSDEEP:96:onzxtm7EMgdMjwPqeuAmz9LD1kFIQETZqoIK/RLf7w:ozxtm7qUwi79l0sZqoBJLDw
                                                            MD5:FC9E03823BEB08DAF7681C09D106DF7D
                                                            SHA1:7D06FC8F98140E0FFAA2571BD522FC772E58DE54
                                                            SHA-256:540EEECBA17207A56290BAFFDAE882BBD4F88364791204AD5D14C7BEDD022CCC
                                                            SHA-512:2B5BAD311A703A0FE2ED67ACE311BAD4C767BCD23DFC3D9ABDF5C3604146A6A15D6BD13A14BDEFCDB2B602C708AACFAB404E96FCBA7C546AD0DAECD4BE2EB34A
                                                            Malicious:false
                                                            Preview:# obsolete.tcl --..#..# This file contains obsolete procedures that people really shouldn't..# be using anymore, but which are kept around for backward compatibility...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# The procedures below are here strictly for backward compatibility with..# Tk version 3.6 and earlier. The procedures are no longer needed, so..# they are no-ops. You should not use these procedures anymore, since..# they may be removed in some future release.....proc tk_menuBar args {}..proc tk_bindForTraversal args {}....# ::tk::classic::restore --..#..# Restore the pre-8.5 (Tk classic) look as the widget defaults for classic..# Tk widgets...#..# The value following an 'option add' call is the new 8.5 value...#..namespace eval ::tk::classic {.. # This may need t
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1629
                                                            Entropy (8bit):4.784780799273752
                                                            Encrypted:false
                                                            SSDEEP:48:g2hBuOrlkBytcqYXRE5fvvXq1EhJPqOj6Wf0cVlN:gQ6q4E5HCqhBqOhcaD
                                                            MD5:9B7A8FD2C6B538FF31BDC380452C6DE3
                                                            SHA1:3F915BFE85CED9F6C7E9A352718770E9F14F098E
                                                            SHA-256:40CA505C9784B0767D4854485C5C311829594A4FCBDFD7251E60E6BB7EA74FD1
                                                            SHA-512:43937152B844BE1E597E99DA1270E54AB1D572AE89CB759E6D41C18C9C8044CCC15A6925F9C5AF617AE9EC1404E78C2733231F4D5C6CFE4D23C546387B1FC328
                                                            Malicious:false
                                                            Preview:# optMenu.tcl --..#..# This file defines the procedure tk_optionMenu, which creates..# an option button and its associated menu...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_optionMenu --..# This procedure creates an option button named $w and an associated..# menu. Together they provide the functionality of Motif option menus:..# they can be used to select one of many values, and the current value..# appears in the global variable varName, as well as in the text of..# the option menubutton. The name of the menu is returned as the..# procedure's result, so that the caller can use it to change configuration..# options on the menu or otherwise manipulate it...#..# Arguments:..# w -...The name to use for the menubutton...# varName -..Global variable to hold the currently
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8418
                                                            Entropy (8bit):4.964814946573677
                                                            Encrypted:false
                                                            SSDEEP:192:HWh/x+hFMyTA/CTzxFoUuliRLDm8pQrQlENPyF3o48M6C:HWL+MyTA/CTzvAiRqyEw3ok
                                                            MD5:4CE08A10CD9AE941654B8C679DF669F3
                                                            SHA1:F1288BABCA698FD18C3BD221E6AE6C02F2975AAE
                                                            SHA-256:849B4C57E4644E51BEAEAEB3AE59B7FF067E582ECD10F1B2CAF6B6E72F11F506
                                                            SHA-512:0F37539DA3540E9B1DA7B0377E3BBB359B71DB4271D63BC9501E95931B4E609E8CB91DC2F7B08A6452598D4A0D58C6A2034049A215000EEF0F93A9963D003632
                                                            Malicious:false
                                                            Preview:# palette.tcl --..#..# This file contains procedures that change the color palette used..# by Tk...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_setPalette --..# Changes the default color scheme for a Tk application by setting..# default colors in the option database and by modifying all of the..# color options for existing widgets that have the default value...#..# Arguments:..# The arguments consist of either a single color name, which..# will be used as the new background color (all other colors will..# be computed from this) or an even number of values consisting of..# option names and values. The name for an option is the one used..# for the option database, such as activeForeground, not -activeforeground.....proc ::tk_setPalette {args} {.. if {[winfo depth .] == 1} {...# Just return on monochrome displays, otherwise errors
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5370
                                                            Entropy (8bit):4.979530133775421
                                                            Encrypted:false
                                                            SSDEEP:96:ssAXzkTQ9w5fLQYkJLZkRXKUXfwyZTq2sz8j2Em3YKhrYK:jAXgE0DQpJLGR6UXfpqnzG3m3YKhrYK
                                                            MD5:286C01A1B12261BC47F5659FD1627ABD
                                                            SHA1:4CA36795CAB6DFE0BBBA30BB88A2AB71A0896642
                                                            SHA-256:AA4F87E41AC8297F51150F2A9F787607690D01793456B93F0939C54D394731F9
                                                            SHA-512:D54D5A89B7408A9724A1CA1387F6473BDAD33885194B2EC5A524C7853A297FD65CE2A57F571C51DB718F6A00DCE845DE8CF5F51698F926E54ED72CDC81BCFE54
                                                            Malicious:false
                                                            Preview:# panedwindow.tcl --..#..# This file defines the default bindings for Tk panedwindow widgets and..# provides procedures that help in implementing those bindings.....bind Panedwindow <Button-1> { ::tk::panedwindow::MarkSash %W %x %y 1 }..bind Panedwindow <Button-2> { ::tk::panedwindow::MarkSash %W %x %y 0 }....bind Panedwindow <B1-Motion> { ::tk::panedwindow::DragSash %W %x %y 1 }..bind Panedwindow <B2-Motion> { ::tk::panedwindow::DragSash %W %x %y 0 }....bind Panedwindow <ButtonRelease-1> {::tk::panedwindow::ReleaseSash %W 1}..bind Panedwindow <ButtonRelease-2> {::tk::panedwindow::ReleaseSash %W 0}....bind Panedwindow <Motion> { ::tk::panedwindow::Motion %W %x %y }....bind Panedwindow <Leave> { ::tk::panedwindow::Leave %W }....# Initialize namespace..namespace eval ::tk::panedwindow {}....# ::tk::panedwindow::MarkSash --..#..# Handle marking the correct sash for possible dragging..#..# Arguments:..# w..the widget..# x..widget local x coord..# y..widget local y coord..# proxy.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):376
                                                            Entropy (8bit):5.040809246948068
                                                            Encrypted:false
                                                            SSDEEP:6:CsUgabAOgjDnzJNBc6ynID/cL4RpncleXN17MQ9PZBIQ08hof7MQ9PZBIQei:lGbyntNO6LYZliZBIUhkZBIFi
                                                            MD5:2DE9606B1F945CDB29C891A20A681351
                                                            SHA1:3856C58B73E7EB5E1313A3E50090DB1798CA0F03
                                                            SHA-256:1390F260EA7AF5B0779549FA29615530FF9E3BC202806D2024AC644B1FAC5DBC
                                                            SHA-512:03DE591BD1E9325EFFEBF90C7206F6813A9AC9726B44C386055F878CD893C62EE5D6C709A299EF2368B67E139BFEE2DC9F35010F4E57C55399F5A82E2FABAB17
                                                            Malicious:false
                                                            Preview:if {![package vsatisfies [package provide Tcl] 8.6.0]} return..if {($::tcl_platform(platform) eq "unix") && ([info exists ::env(DISPLAY)]...|| ([info exists ::argv] && ("-display" in $::argv)))} {.. package ifneeded Tk 8.6.14 [list load [file join $dir .. .. bin libtk8.6.dll]]..} else {.. package ifneeded Tk 8.6.14 [list load [file join $dir .. .. bin tk86t.dll]]..}..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):7632
                                                            Entropy (8bit):4.891666209090638
                                                            Encrypted:false
                                                            SSDEEP:192:Eet0t8bm9Z+Yjo+j/YKOtOUOtk8XKUal320:EetG8biZZs+bIAUoxX0d
                                                            MD5:21A3AC11146EC26784C0E729D8D644D0
                                                            SHA1:C7E0918E8692C42C1D1DD1BBCBFFF22A85979B69
                                                            SHA-256:579701605669AADFFBCDB7E3545C68442495428EE6E93C2D3A3133583BCD3D33
                                                            SHA-512:724ED83B989AD9033BEC4211EE50E4C9E85B51054C518CDF7E02D0ED0416F636B9F38C0B0D29F8F4F7F465B77C7D2E01D0918D2C2C3FEC4C7739EA982302FA2E
                                                            Malicious:false
                                                            Preview:# safetk.tcl --..#..# Support procs to use Tk in safe interpreters...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# see safetk.n for documentation....#..#..# Note: It is now ok to let untrusted code being executed..# between the creation of the interp and the actual loading..# of Tk in that interp because the C side Tk_Init will..# now look up the parent interp and ask its safe::TkInit..# for the actual parameters to use for it's initialization (if allowed),..# not relying on the child state...#....# We use opt (optional arguments parsing)..package require opt 0.4.1;....namespace eval ::safe {.... # counter for safe toplevels.. variable tkSafeId 0..}....#..# tkInterpInit : prepare the child interpreter for tk loading..# most of the real job is done by loadTk..# returns the child name (tkInterpInit
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8693
                                                            Entropy (8bit):4.968450834020619
                                                            Encrypted:false
                                                            SSDEEP:96:GSusE8YOdpO4aDtao+QYa6t2jooB6ajpaqa5xQGmLGKOC9dLrVx:KsbYQO48t+QYa+NkFjpagGmKKX9dLrVx
                                                            MD5:D45202D3D2D052D4C6BFE8D1322AAB39
                                                            SHA1:8CDF184AC2E9299B2B2A107A64E9D1803AA298DE
                                                            SHA-256:0747A387FDD1B2C7135ECEAE7B392ED52E1D1EBF3FFA90FEBE886DBC0981EB74
                                                            SHA-512:27B005F955BAE00D15C4492E7BD3EBDC5EE3BF9C164C418198B4BD185709C8810AA6CF76CBCC07EEB4C1D20F8C76EF8DF8B219563C18B88C94954C910BFF575D
                                                            Malicious:false
                                                            Preview:# scale.tcl --..#..# This file defines the default bindings for Tk scale widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for entries...#-------------------------------------------------------------------------....# Standard Motif bindings:....bind Scale <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. tk::ScaleActivate %W %x %y..}..bind Scale <Motion> {.. tk::ScaleActivate %W %x %y..}..bind Scale <Leave> {.. if {$tk_strictMotif} {...%W configure -activebackground
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):13188
                                                            Entropy (8bit):5.063842571848725
                                                            Encrypted:false
                                                            SSDEEP:192:Gf7RV8ei32PHKT8H2wwucyRlXn+kl1nBKp4nu5FCyK:2mei3qHKT8WPurnXn+I1nBg4nu5MyK
                                                            MD5:5249CD1E97E48E3D6DEC15E70B9D7792
                                                            SHA1:612E021BA25B5E512A0DFD48B6E77FC72894A6B9
                                                            SHA-256:EEC90404F702D3CFBFAEC0F13BF5ED1EBEB736BEE12D7E69770181A25401C61F
                                                            SHA-512:E4E0AB15EB9B3118C30CD2FF8E5AF87C549EAA9B640FFD809A928D96B4ADDEFB9D25EFDD1090FBD0019129CDF355BB2F277BC7194001BA1D2ED4A581110CEAFC
                                                            Malicious:false
                                                            Preview:# scrlbar.tcl --..#..# This file defines the default bindings for Tk scrollbar widgets...# It also provides procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for scrollbars...#-------------------------------------------------------------------------....# Standard Motif bindings:..if {[tk windowingsystem] eq "x11" || [tk windowingsystem] eq "aqua"} {....bind Scrollbar <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. %W activate [%W identify %x %y]..}..bind Scrollbar <Motion> {.. %W activate [%
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):16543
                                                            Entropy (8bit):5.034958189335699
                                                            Encrypted:false
                                                            SSDEEP:384:IMpfyeKu9TzD0E8+9T1wqBaQKpiqQr7E32fnzXfWJU:IMpfyeKu9Tx8WODTp2zPP
                                                            MD5:EAA36F0AA69AE19DDBDD0448FBAD9D4D
                                                            SHA1:EB0ADB4F4D937BAC2F17480ADAF6F948262E754D
                                                            SHA-256:747889C3086C917A34554A9DC495BC0C08A03FD3A5828353ED2A64B97F376835
                                                            SHA-512:C8368F19EC6842ED67073B9FC9C9274107E643324CB23B28C54DF63FB720F63B043281B30DBEA053D08481B0442A87465F715A8AA0711B01CE83FF7B9F8A4F4C
                                                            Malicious:false
                                                            Preview:# spinbox.tcl --..#..# This file defines the default bindings for Tk spinbox widgets and provides..# procedures that help in implementing those bindings. The spinbox builds..# off the entry widget, so it can reuse Entry bindings and procedures...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1999-2000 Jeffrey Hobbs..# Copyright (c) 2000 Ajuba Solutions..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#.
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):20523
                                                            Entropy (8bit):4.786929402401609
                                                            Encrypted:false
                                                            SSDEEP:384:eeVL0UI9Ms++J7VT/hc+ISyNsATbOan/uW/UFQ1gs1gxtKZufe2SvdJcmq/YbhEB:eeF0UI9Ms++J7VT/hc+ISyCATbOan2W+
                                                            MD5:9378397DD3DCA9DFB181F6F512B15631
                                                            SHA1:4F95DD6B658B6A912725DC7D6226F8414020D6C7
                                                            SHA-256:B04B1A675572E6FCD12C5FE82C4FD0930395548436FF93D848BF340AE202E7E3
                                                            SHA-512:D28CC3C8F3D0B1B2371CBD9EE29AC6881BABD8A07C762FF8F3284449998EE44FA44752CC8AB0DE47A3492776CE1D13BC8EA18CFDBDF710639D2D62D02CB917A9
                                                            Malicious:false
                                                            Preview:# Tcl autoload index file, version 2.0..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(::tk::dialog::error::Return) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Details) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::SaveToLog) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Destroy) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::ButtonInvoke) [list source [file join $dir button.tcl]]..set auto_index(::tk::ButtonAutoInvoke) [list sou
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4625
                                                            Entropy (8bit):4.751120784854044
                                                            Encrypted:false
                                                            SSDEEP:96:wfQXIqAv6iEw6dNrKVlPBnXWASbvs8DjXKpQQkK2tTsZf9:wf+IqI6iE43PJYbvs8DjXKpsK2tIZ9
                                                            MD5:0512EE07E0A8071971CFBB654C69C145
                                                            SHA1:44F6E2990D5C67ADF5958D1FE5CD6AB6B43FD095
                                                            SHA-256:04B284915DA1940758D0FD73BBB9CBBC9967BBAA5E5A9DB9947F7E8FEDD0DF96
                                                            SHA-512:3B98B094647A7848B45698EDBBA87F1B3A21CBF720C6402F7CD9D49003DCF627C2C23D2EC21703CB808846E7DA44E5DD41830B1EBC4C0DC08CD0F3117C1C59EF
                                                            Malicious:false
                                                            Preview:# tearoff.tcl --..#..# This file contains procedures that implement tear-off menus...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk::TearoffMenu --..# Given the name of a menu, this procedure creates a torn-off menu..# that is identical to the given menu (including nested submenus)...# The new torn-off menu exists as a toplevel window managed by the..# window manager. The return value is the name of the new menu...# The window is created at the point specified by x and y..#..# Arguments:..# w -...The menu to be torn-off (duplicated)...# x -...x coordinate where window is created..# y -...y coordinate where window is created....proc ::tk::TearOffMenu {w {x 0} {y 0}} {.. # Find a unique name to use for the torn-off menu. Find the first.. # ancestor of w that is a
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):35183
                                                            Entropy (8bit):4.9567627831293395
                                                            Encrypted:false
                                                            SSDEEP:768:Rp4LaQDlOrqquMwIMyv4Et8rvJLgmTGXs1bYMeNnnZl8n6KRD:RYK8rymTGs1b0xncn6KR
                                                            MD5:016613531555C4F30F670DAB58F10B3D
                                                            SHA1:3AFC8AA3E10950D79D1003B0810F2E0DC2135EB9
                                                            SHA-256:F7ECC5AE6EB297C79AAD5CFC200B29C4E72409641FA369C5CDBBA30AE41E982A
                                                            SHA-512:C5D071FC8CB68C5985E74AB7E90367E9261B291474689C37ABD7F921716053E9D5E9446A45C5E91F3BB927589270E818E22E2D675ACBE04E0627ECD5D532BC05
                                                            Malicious:false
                                                            Preview:# text.tcl --..#..# This file defines the default bindings for Tk text widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of ::tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# char -..Character position on the line; kept in order..#...to allow moving up or down past short lines while..#...still remembering the desired position...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button we
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):24322
                                                            Entropy (8bit):5.137715953500608
                                                            Encrypted:false
                                                            SSDEEP:384:NIyxt+WaB9USY15gSgC3DbTbXLXKr3aIIXyDAbK2LMGgtewT+3oFQRyH5bAy59HU:NIItNe9USZbeXysm7GgteoFQRYMESL
                                                            MD5:2261CB7D57C972C2418CD222B83265F7
                                                            SHA1:A62466C2A678D341B6BD03BE8BE45C7AB84CC14E
                                                            SHA-256:AEA1F1F01E2DF0CCCD8C2010C4035DEEA297424A9174383E5EE016EB25484E5A
                                                            SHA-512:92CF1BD11E6B819E69BCCB237865092ABCEE95383F9158C9FE10AAB0D48888279D9AD4CF51B567DB214D99960E8FB21899085E3D77F1A297DBCAFA38F0CB322A
                                                            Malicious:false
                                                            Preview:# tk.tcl --..#..# Initialization script normally executed in the interpreter for each Tk-based..# application. Arranges class bindings for widgets...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....# Verify that we have Tk binary and script components from the same release..package require -exact Tk 8.6.14.....# Create a ::tk namespace..namespace eval ::tk {.. # Set up the msgcat commands.. namespace eval msgcat {...namespace export mc mcmax.. if {[interp issafe] || [catch {package require msgcat}]} {.. # The msgcat package is not available. Supply our own.. # minimal replacement... proc mc {src args} {.. return [format $src {*}$args].. }.. proc mc
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):39606
                                                            Entropy (8bit):5.185943230848209
                                                            Encrypted:false
                                                            SSDEEP:768:+oj+Aq49cn9tJNgDt0/vsKulXgo65Eh6pQb:+6+ZT/ggEdio65Ehdb
                                                            MD5:57D60D17CD3EF211D18BF4F82586DDCB
                                                            SHA1:0A7415EA599725F81118F4B833C4FA1D601D7BA6
                                                            SHA-256:BAF1ED7B617FB64CA097E81059454783C4D922999E19000CF2953CC09C8F4505
                                                            SHA-512:D3279D24885CB0C4E72FA0C3783FAB215A32DC591E367C5640A3FDB1AED33933504DDDAABCE98455B485B68BCA3C75A97249EAC40ABEEE945B9ABAAB7974EE0D
                                                            Malicious:false
                                                            Preview:# tkfbox.tcl --..#..#.Implements the "TK" standard file selection dialog box. This dialog..#.box is used on the Unix platforms whenever the tk_strictMotif flag is..#.not set...#..#.The "TK" standard file selection dialog box is similar to the file..#.selection dialog box on Win95(TM). The user can navigate the..#.directories by clicking on the folder icons or by selecting the..#."Directory" option menu. The user can select files by clicking on the..#.file icons or by entering a filename in the "Filename:" entry...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {.. namespace import -force ::tk::msgcat::*.. variable showHiddenBtn 0.. variable showHiddenVar 1.... # Create the images if they did not already exist... if {![info exists ::tk::Priv(updirImage)]} {...s
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3713
                                                            Entropy (8bit):4.915055696129498
                                                            Encrypted:false
                                                            SSDEEP:48:InrWdo3L7Fe5qusQGdrMNnQbfIxEOxE0kFgG0FgGouox9FrGVuwg3kNcT+z5UlEr:UWdsOBn/1i+pqxwNjKs
                                                            MD5:01F28512E10ACBDDF93AE2BB29E343BC
                                                            SHA1:C9CF23D6315218B464061F011E4A9DC8516C8F1F
                                                            SHA-256:AE0437FB4E0EBD31322E4EACA626C12ABDE602DA483BB39D0C5EE1BC00AB0AF4
                                                            SHA-512:FE3BAE36DDB67F6D7A90B7A91B6EC1A009CF26C0167C46635E5A9CEAEC9083E59DDF74447BF6F60399657EE9604A2314B170F78A921CF948B2985DDF02A89DA6
                                                            Malicious:false
                                                            Preview:#..# Ttk widget set: Alternate theme..#....namespace eval ttk::theme::alt {.... variable colors.. array set colors {...-frame .."#d9d9d9"...-window.."#ffffff"...-darker ."#c3c3c3"...-border.."#414141"...-activebg ."#ececec"...-disabledfg."#a3a3a3"...-selectbg."#4a6984"...-selectfg."#ffffff"...-altindicator."#aaaaaa".. }.... ttk::style theme settings alt {.....ttk::style configure "." \... -background .$colors(-frame) \... -foreground .black \... -troughcolor.$colors(-darker) \... -bordercolor.$colors(-border) \... -selectbackground .$colors(-selectbg) \... -selectforeground .$colors(-selectfg) \... -font ..TkDefaultFont \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)] ;...ttk::style map "." -foreground [list disabled $colors(-disabledfg)] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -padding "1 1" \... -reli
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3838
                                                            Entropy (8bit):4.940737732832436
                                                            Encrypted:false
                                                            SSDEEP:48:WdbclJFvlyLi+8OWXgQahpvAdNutdHrFBlCFBK2tdHkFBlhKgY1geAWUWeFVvtdp:C8EQPNeWgFeqdXj
                                                            MD5:F07A3A86362E9E253BE91F59714FE134
                                                            SHA1:84DE1AB2EAE62E4B114F0E613BD94955AFA9E6C7
                                                            SHA-256:E199CC9C429B35A09721D0A22543C3729E2B8462E68DFA158C0CEC9C70A0D79D
                                                            SHA-512:324EAF9F857076CA4FECB26D8DF76F8BB1D3F15EAE55D6B6C9689BF1682B306AC7A3592B6A518D23F9FE4DC21EFB6ACF1ECA948F889FA1ADFFA0E12C0BEAB57F
                                                            Malicious:false
                                                            Preview:#..# Aqua theme (OSX native look and feel)..#....namespace eval ttk::theme::aqua {.. ttk::style theme settings aqua {.....ttk::style configure . \... -font TkDefaultFont \... -background systemWindowBackgroundColor \... -foreground systemLabelColor \... -selectbackground systemSelectedTextBackgroundColor \... -selectforeground systemSelectedTextColor \... -selectborderwidth 0 \... -insertwidth 1.....ttk::style map . \... -foreground {....disabled systemDisabledControlTextColor....background systemLabelColor} \... -selectbackground {....background systemSelectedTextBackgroundColor....!focus systemSelectedTextBackgroundColor} \... -selectforeground {....background systemSelectedTextColor....!focus systemSelectedTextColor}.....# Button...ttk::style configure TButton -anchor center -width -6 \... -foreground systemControlTextColor...ttk::style map TButton \... -foreground {....pressed white... {alternate !pressed !background} white}...ttk::styl
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3014
                                                            Entropy (8bit):4.917794267131833
                                                            Encrypted:false
                                                            SSDEEP:48:A5N+EqJWR1eTC01cG61ELLgrDgk1JgQ6TQGvhV5giT6TUP+3JWMHTeJ:kN+RQfccG61ooDgQ6dNT6TUP+PHO
                                                            MD5:D4BF1AF5DCDD85E3BD11DBF52EB2C146
                                                            SHA1:B1691578041319E671D31473A1DD404855D2038B
                                                            SHA-256:E38A9D1F437981AA6BF0BDD074D57B769A4140C0F7D9AFF51743FE4ECC6DFDDF
                                                            SHA-512:25834B4B231F4FF1A88EEF67E1A102D1D0546EC3B0D46856258A6BE6BBC4B381389C28E2EB60A01FF895DF24D6450CD16CA449C71F82BA53BA438A4867A47DCD
                                                            Malicious:false
                                                            Preview:#..# Bindings for Buttons, Checkbuttons, and Radiobuttons...#..# Notes: <Button1-Leave>, <Button1-Enter> only control the "pressed"..# state; widgets remain "active" if the pointer is dragged out...# This doesn't seem to be conventional, but it's a nice way..# to provide extra feedback while the grab is active...# (If the button is released off the widget, the grab deactivates and..# we get a <Leave> event then, which turns off the "active" state)..#..# Normally, <ButtonRelease> and <ButtonN-Enter/Leave> events are..# delivered to the widget which received the initial <Button>..# event. However, Tk [grab]s (#1223103) and menu interactions..# (#1222605) can interfere with this. To guard against spurious..# <Button1-Enter> events, the <Button1-Enter> binding only sets..# the pressed state if the button is currently active...#....namespace eval ttk::button {}....bind TButton <Enter> ..{ %W instate !disabled {%W state active} }..bind TButton <Leave>..{ %W state !active }..bind TButton <s
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4809
                                                            Entropy (8bit):4.905115353394083
                                                            Encrypted:false
                                                            SSDEEP:48:KrS4se/XhW03cC7TxPp/uo1ZUb0WZvSoetCgV+tMWG3xT3xgNB4x76FAuoxVYuIJ:oS4sSjWwFAGkhiP3xT3xL6B2bbe
                                                            MD5:2B20E7B2E6BDDBEB14F5F63BF38DBF24
                                                            SHA1:43DB48094C4BD7DE3B76AFBC051D887FEFE9887E
                                                            SHA-256:CFFC59931FDD1683AD23895E92522CF49B099128753FCDFF34374024E42CF995
                                                            SHA-512:1EB5EA78D26D18EAD6563AFBF1798F71723001DCC945E7DB3E4368564D0563029BE3565876AD8CB97331CFE34B2A0A313FA1BF252B87049160FE5DCD65434775
                                                            Malicious:false
                                                            Preview:#..# "Clam" theme...#..# Inspired by the XFCE family of Gnome themes...#....namespace eval ttk::theme::clam {.. variable colors.. array set colors {...-disabledfg.."#999999"...-frame .."#dcdad5"...-window .."#ffffff"...-dark..."#cfcdc8"...-darker .."#bab5ab"...-darkest.."#9e9a91"...-lighter.."#eeebe7"...-lightest .."#ffffff"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-altindicator.."#5895bc"...-disabledaltindicator."#a0a0a0".. }.... ttk::style theme settings clam {.....ttk::style configure "." \... -background $colors(-frame) \... -foreground black \... -bordercolor $colors(-darkest) \... -darkcolor $colors(-dark) \... -lightcolor $colors(-lighter) \... -troughcolor $colors(-darker) \... -selectbackground $colors(-selectbg) \... -selectforeground $colors(-selectfg) \... -selectborderwidth 0 \... -font TkDefaultFont \... ;.....ttk::style map "." \... -background [list disabled $colors(-frame) \..... active $colors(-lighter)] \..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3864
                                                            Entropy (8bit):4.935603001745302
                                                            Encrypted:false
                                                            SSDEEP:48:zcJZjdWs+WVB4ULsMF7tnvnuSuqo5DKxiFgG0FgGHx9FrGTtu/3Kt+iW2PbuAk38:zcJZEstB4UoituSm+VtYErY
                                                            MD5:0205663142775F4EF2EB104661D30979
                                                            SHA1:452A0D613288A1CC8A1181C3CC1167E02AA69A73
                                                            SHA-256:424BBA4FB6836FEEBE34F6C176ED666DCE51D2FBA9A8D7AA756ABCBBAD3FC1E3
                                                            SHA-512:FB4D212A73A6F5A8D2774F43D310328B029B52B35BEE133584D8326363B385AB7AA4AE25E98126324CC716962888321E0006E5F6EF8563919A1D719019B2D117
                                                            Malicious:false
                                                            Preview:#..# "classic" Tk theme...#..# Implements Tk's traditional Motif-like look and feel...#....namespace eval ttk::theme::classic {.... variable colors; array set colors {...-frame.."#d9d9d9"...-window.."#ffffff"...-activebg."#ececec"...-troughbg."#c3c3c3"...-selectbg."#c3c3c3"...-selectfg."#000000"...-disabledfg."#a3a3a3"...-indicator."#b03060"...-altindicator."#b05e5e".. }.... ttk::style theme settings classic {...ttk::style configure "." \... -font..TkDefaultFont \... -background..$colors(-frame) \... -foreground..black \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -troughcolor.$colors(-troughbg) \... -indicatorcolor.$colors(-frame) \... -highlightcolor.$colors(-frame) \... -highlightthickness.1 \... -selectborderwidth.1 \... -insertwidth.2 \... ;.....# To match pre-Xft X11 appearance, use:...#.ttk::style configure . -font {Helvetica 12 bold}.....ttk::style map "." -background \... [list disabled
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):12718
                                                            Entropy (8bit):5.063548300335668
                                                            Encrypted:false
                                                            SSDEEP:192:otLzBJ9SfinaXUBLPYXlk7fKiLH+AzIoJdJwGknmyLsxoVEQGITse8g5sarkT32e:wB5aXmLPYXmrKxLL7A
                                                            MD5:F7065D345A4BFB3127C3689BF1947C30
                                                            SHA1:9631C05365B0F5A36E4CA5CBA83628CCD7FCBDE1
                                                            SHA-256:68EED4AF6D2EC5B3EA24B1122A704B040366CBE2F458103137479352FFA1475A
                                                            SHA-512:74B99B9E326680150DD5EC7263192691BCD8A71B2A4EE7F3177DEDDD43E924A7925085C6D372731A70570F96B3924450255B2F54CA3B9C44D1160CA37E715B00
                                                            Malicious:false
                                                            Preview:#..# Combobox bindings...#..# <<NOTE-WM-TRANSIENT>>:..#..#.Need to set [wm transient] just before mapping the popdown..#.instead of when it's created, in case a containing frame..#.has been reparented [#1818441]...#..#.On Windows: setting [wm transient] prevents the parent..#.toplevel from becoming inactive when the popdown is posted..#.(Tk 8.4.8+)..#..#.On X11: WM_TRANSIENT_FOR on override-redirect windows..#.may be used by compositing managers and by EWMH-aware..#.window managers (even though the older ICCCM spec says..#.it's meaningless)...#..#.On OSX: [wm transient] does utterly the wrong thing...#.Instead, we use [MacWindowStyle "help" "noActivates hideOnSuspend"]...#.The "noActivates" attribute prevents the parent toplevel..#.from deactivating when the popdown is posted, and is also..#.necessary for "help" windows to receive mouse events...#."hideOnSuspend" makes the popdown disappear (resp. reappear)..#.when the parent toplevel is deactivated (resp. reactivated)...#.(see [#18147
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4674
                                                            Entropy (8bit):4.836935825704301
                                                            Encrypted:false
                                                            SSDEEP:96:DRYEqfLDxGmxGUetobPT6t6brv0q3O4Uxz0:DWEqTDbxdKobPqe5PUxw
                                                            MD5:1A799FE3754307A5AADE98C367E2F5D7
                                                            SHA1:C64BE4B77F0D298610F4EE20FCEBBAEE3C8B5F22
                                                            SHA-256:5B33F32B0139663347D6CF70A5A838F8E4554E0E881E97C8478B77733162EA73
                                                            SHA-512:89F367F9A59730BCDFC5ABDE0E35A10B72A1F19C68A768BA4524C938EF5C5CAF094C1BFA8FC74173F65201F6617544223C2143252A9F691EE9AAA7543315179F
                                                            Malicious:false
                                                            Preview:#..# Map symbolic cursor names to platform-appropriate cursors...#..# The following cursors are defined:..#..#.standard.-- default cursor for most controls..#.""..-- inherit cursor from parent window..#.none..-- no cursor..#..#.text..-- editable widgets (entry, text)..#.link..-- hyperlinks within text..#.crosshair.-- graphic selection, fine control..#.busy..-- operation in progress..#.forbidden.-- action not allowed..#..#.hresize..-- horizontal resizing..#.vresize..-- vertical resizing..#..# Also resize cursors for each of the compass points,..# {nw,n,ne,w,e,sw,s,se}resize...#..# Platform notes:..#..# Windows doesn't distinguish resizing at the 8 compass points,..# only horizontal, vertical, and the two diagonals...#..# OSX doesn't have resize cursors for nw, ne, sw, or se corners...# We use the Tk-defined X11 fallbacks for these...#..# X11 doesn't have a "forbidden" cursor (usually a slashed circle);..# "pirate" seems to be the conventional cursor for this purpose...#..# Windows has a
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4553
                                                            Entropy (8bit):4.933885986949396
                                                            Encrypted:false
                                                            SSDEEP:96:lNl3u3lCFUeuMGN3xbVJU+N3xbVJh3IwxkxlBqatUrtY:zl3ZUe9GN3NVC+N3NVjqntUZY
                                                            MD5:FC79F42761D63172163C08F0F5C94436
                                                            SHA1:AABAB4061597D0D6DC371F46D14AAA1A859096DF
                                                            SHA-256:49AE8FAF169165BDDAF01D50B52943EBAB3656E9468292B7890BE143D0FCBC91
                                                            SHA-512:F619834A95C9DEB93F8184BCC437D701A961C77E24A831ADBD5C145556D26986BFDA2A6ACB9E8784F8B2380E122D12AC893EB1B6ACF03098922889497E1FF9EA
                                                            Malicious:false
                                                            Preview:#..# Settings for default theme...#....namespace eval ttk::theme::default {.. variable colors.. array set colors {...-frame..."#d9d9d9"...-foreground.."#000000"...-window..."#ffffff"...-text .."#000000"...-activebg.."#ececec"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-darker .."#c3c3c3"...-disabledfg.."#a3a3a3"...-indicator.."#4a6984"...-disabledindicator."#a3a3a3"...-altindicator.."#9fbdd8"...-disabledaltindicator."#c0c0c0".. }.... ttk::style theme settings default {.....ttk::style configure "." \... -borderwidth .1 \... -background .$colors(-frame) \... -foreground .$colors(-foreground) \... -troughcolor .$colors(-darker) \... -font ..TkDefaultFont \... -selectborderwidth.1 \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -insertwidth .1 \... -indicatordiameter.10 \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)]...ttk::style map "."
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):18006
                                                            Entropy (8bit):5.0251298333416825
                                                            Encrypted:false
                                                            SSDEEP:384:sca9Jzcyzf6yzQO+e+iPT3vKof8q3YIuR13a:sT9Jzcy76diV3YNa
                                                            MD5:DBCEDD7BFB63A55C210C25DCF230C657
                                                            SHA1:B05CF01453A22016995627176F6339068C58BA01
                                                            SHA-256:F2CACB1B3A941CC7079627644E91F0D4729BF820C481C8CE7FA28C952B803E4D
                                                            SHA-512:7F8E9A7D80B463D9CEC791EF59B1A27F8ACEC95CEEDE45ECA06C4DBF9BA805C2C1AEE19A0118709EE47768F1B735A74A32B35FB9D8559D94DA77C71E4EC5D117
                                                            Malicious:false
                                                            Preview:#..# DERIVED FROM: tk/library/entry.tcl r1.22..#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 2004, Joe English..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ttk {.. namespace eval entry {...variable State.....set State(x) 0...set State(selectMode) none...set State(anchor) 0...set State(scanX) 0...set State(scanIndex) 0...set State(scanMoved) 0.....# Button-2 scan speed is (scanNum/scanDen) characters...# per pixel of mouse movement....# The standard Tk entry widget uses the equivalent of...# scanNum = 10, scanDen = average character width....# I don't know why that was chosen....#...set State(scanNum) 1...set State(scanDen) 1...set State(deadband) 3.;# #pixels for mouse-moved deadband... }..}....### Option database settings...#..option add *TEntry.cursor [ttk::cursor text] widg
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5639
                                                            Entropy (8bit):4.9968844674828485
                                                            Encrypted:false
                                                            SSDEEP:96:NzEh94ntnVU8Z/1LkAIW22SeLMQR8hzcksejmOF4ytZm:Sh9ahV3ZWAIWDfktm
                                                            MD5:8514CF728A5782E457C50D7C61740CE5
                                                            SHA1:EDE61C428D1865F10AE093D5C4BEF29C0EC7E8CE
                                                            SHA-256:6574067A91858506460AC44DDF8CF9270E81D67B2FEFF2A43B4D5F774568A5EC
                                                            SHA-512:2E24F15887193FFB884AB6AF9ECF619EF913E3F6C6DFB0FC980BFB59A57FFEC56B68DD36935A2998FBC66D12EF40A58DC3B3F278EC0E21D84DFFEAD6A80C4C96
                                                            Malicious:false
                                                            Preview:#..# Font specifications...#..# This file, [source]d at initialization time, sets up the following..# symbolic fonts based on the current platform:..#..# TkDefaultFont.-- default for GUI items not otherwise specified..# TkTextFont.-- font for user text (entry, listbox, others)..# TkFixedFont.-- standard fixed width font..# TkHeadingFont.-- headings (column headings, etc)..# TkCaptionFont -- dialog captions (primary text in alert dialogs, etc.)..# TkTooltipFont.-- font to use for tooltip windows..# TkIconFont.-- font to use for icon captions..# TkMenuFont.-- used to use for menu items..#..# In Tk 8.5, some of these fonts may be provided by the TIP#145 implementation..# (On Windows and Mac OS X as of Oct 2007)...#..# +++ Platform notes:..#..# Windows:..#.The default system font changed from "MS Sans Serif" to "Tahoma"..# .in Windows XP/Windows 2000...#..#.MS documentation says to use "Tahoma 8" in Windows 2000/XP,..#.although many MS programs still use "MS Sans Serif 8"..#..#.Should use
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6408
                                                            Entropy (8bit):4.920607671427164
                                                            Encrypted:false
                                                            SSDEEP:192:toMcJQkmcE6fNuLyiCzSLSRwgppdT3kXdpK3dSH2tOTjvAG:tRc6kFbcH2pyXz+E2y
                                                            MD5:AEC91DD23DE04196AF5EB31E8BBD0946
                                                            SHA1:BDF5A5A42A147D7484E5A2966EA949FA68F52348
                                                            SHA-256:0935FB97B6628F055BAEB2E2BABBF2A6C8905260E1107972B0E7A1DF0752E180
                                                            SHA-512:6EA4A2EC378E6CBABBF8FF20FB1CAD0C68A90E5089F20D195FEF2EE4FF9259BD3B622378E7203BD238402140F7EAB7E316B8A8F9C4B6C0D3D3ACBE81F0A25EA4
                                                            Malicious:false
                                                            Preview:#..# Bindings for Menubuttons...#..# Menubuttons have three interaction modes:..#..# Pulldown: Press menubutton, drag over menu, release to activate menu entry..# Popdown: Click menubutton to post menu..# Keyboard: <space> or accelerator key to post menu..#..# (In addition, when menu system is active, "dropdown" -- menu posts..# on mouse-over. Ttk menubuttons don't implement this)...#..# For keyboard and popdown mode, we hand off to tk_popup and let..# the built-in Tk bindings handle the rest of the interaction...#..# ON X11:..#..# Standard Tk menubuttons use a global grab on the menubutton...# This won't work for Ttk menubuttons in pulldown mode,..# since we need to process the final <ButtonRelease> event,..# and this might be delivered to the menu. So instead we..# rely on the passive grab that occurs on <Button> events,..# and transition to popdown mode when the mouse is released..# or dragged outside the menubutton...#..# ON WINDOWS:..#..# I'm not sure what the hell is going on h
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5863
                                                            Entropy (8bit):4.963192408446461
                                                            Encrypted:false
                                                            SSDEEP:96:RErUhyi5JeUQBWdz6eP8ClK6/u6AsBmPNNiREUkheLY1EVL23sN2JJjQdD:6uyiyDQBP8Z6/u6AUREUsNEVq3y2jkdD
                                                            MD5:39AEC76C4E7B810873545C6A137ACCF3
                                                            SHA1:165372DCCDD018D980AA2167094A4E0FA82B65F1
                                                            SHA-256:B1210147F9DAF3068DE3D28D4B18C04ECFA8C8574E3E0AD275C1D0D75E9A99B2
                                                            SHA-512:759436CA4462DF6C217F1502D1350735004EDD31472FDAA9860F3FD8FBC2F4978BE2B5A57993C37B9DCE4A8237840F50D620BA95C22900F658B29A2AC38A5218
                                                            Malicious:false
                                                            Preview:#..# Bindings for TNotebook widget..#....namespace eval ttk::notebook {.. variable TLNotebooks ;# See enableTraversal..}....bind TNotebook <Button-1>..{ ttk::notebook::Press %W %x %y }..bind TNotebook <Right>...{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Left>...{ ttk::notebook::CycleTab %W -1; break }..bind TNotebook <Control-Tab>..{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Control-Shift-Tab>.{ ttk::notebook::CycleTab %W -1; break }..catch {..bind TNotebook <Control-ISO_Left_Tab>.{ ttk::notebook::CycleTab %W -1; break }..}..bind TNotebook <Destroy>..{ ttk::notebook::Cleanup %W }....# ActivateTab $nb $tab --..#.Select the specified tab and set focus...#..# Desired behavior:..#.+ take focus when reselecting the currently-selected tab;..#.+ keep focus if the notebook already has it;..#.+ otherwise set focus to the first traversable widget..#. in the newly-selected tab;..#.+ do not leave the focus in a deselected tab...#..proc ttk::notebook::ActivateTab {
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2274
                                                            Entropy (8bit):4.951790637542993
                                                            Encrypted:false
                                                            SSDEEP:48:zVAqE3ZF8b4rXzsqAOAXsmCLFeNqkFeNXez:zLeU4bzSs1M
                                                            MD5:848A62BCF6ED3C16A8CFD26C43E1BC4E
                                                            SHA1:6F5E3EDF62716B511CF575BE2C6C997AFA2FA1E7
                                                            SHA-256:20EE6AD9D701709724292A926AF93C93784B254B48A656ECC140EF3A0FE10A11
                                                            SHA-512:AE78028EAF96E5B77DEFF0CD655360DB3A8058AC98B6753D9B77D629EDFFC582999A22A7075B9F5BA83EE65DA093E2CCB0EEAA4049898910D7AF517FDE60B28E
                                                            Malicious:false
                                                            Preview:#..# Bindings for ttk::panedwindow widget...#....namespace eval ttk::panedwindow {.. variable State.. array set State {...pressed 0.. .pressX.-...pressY.-...sash .-...sashPos -.. }..}....## Bindings:..#..bind TPanedwindow <Button-1> ..{ ttk::panedwindow::Press %W %x %y }..bind TPanedwindow <B1-Motion>..{ ttk::panedwindow::Drag %W %x %y }..bind TPanedwindow <ButtonRelease-1> .{ ttk::panedwindow::Release %W %x %y }....bind TPanedwindow <Motion> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Enter> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Leave> ..{ ttk::panedwindow::ResetCursor %W }..# See <<NOTE-PW-LEAVE-NOTIFYINFERIOR>>..bind TPanedwindow <<EnteredChild>>.{ ttk::panedwindow::ResetCursor %W }....## Sash movement:..#..proc ttk::panedwindow::Press {w x y} {.. variable State.... set sash [$w identify $x $y].. if {$sash eq ""} {.. .set State(pressed) 0...return.. }.. set State(pressed) .1.. set State(pressX) .$x.. set
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1138
                                                            Entropy (8bit):4.763501917862434
                                                            Encrypted:false
                                                            SSDEEP:24:nJ8v3O0NSiio0pNFVkIks0ImxlnINgDImSgGINSyWghT:JFqS/o03fkxs0Rn+gD4v+S2F
                                                            MD5:DBF3BF0E8F04E9435E9561F740DFC700
                                                            SHA1:C7619A05A834EFB901C57DCFEC2C9E625F42428F
                                                            SHA-256:697CC0A75AE31FE9C2D85FB25DCA0AFA5D0DF9C523A2DFAD2E4A36893BE75FBA
                                                            SHA-512:D3B323DFB3EAC4A78DA2381405925C131A99C6806AF6FD8041102162A44E48BF166982A4AE4AA142A14601736716F1A628D9587E292FA8E4842BE984374CC192
                                                            Malicious:false
                                                            Preview:#..# Ttk widget set: progress bar utilities...#....namespace eval ttk::progressbar {.. variable Timers.;# Map: widget name -> after ID..}....# Autoincrement --..#.Periodic callback procedure for autoincrement mode..#..proc ttk::progressbar::Autoincrement {pb steptime stepsize} {.. variable Timers.... if {![winfo exists $pb]} {.. .# widget has been destroyed -- cancel timer...unset -nocomplain Timers($pb)...return.. }.... set Timers($pb) [after $steptime \.. .[list ttk::progressbar::Autoincrement $pb $steptime $stepsize] ].... $pb step $stepsize..}....# ttk::progressbar::start --..#.Start autoincrement mode. Invoked by [$pb start] widget code...#..proc ttk::progressbar::start {pb {steptime 50} {stepsize 1}} {.. variable Timers.. if {![info exists Timers($pb)]} {...Autoincrement $pb $steptime $stepsize.. }..}....# ttk::progressbar::stop --..#.Cancel autoincrement mode. Invoked by [$pb stop] widget code...#..proc ttk::progressbar::stop {pb} {.. variabl
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2787
                                                            Entropy (8bit):4.795451191784129
                                                            Encrypted:false
                                                            SSDEEP:48:IKADAzizZIcAlRqucObmn4AzyVN2AJyhAzukPNP:IHIBRqupmLSZkklP
                                                            MD5:F1C33CC2D47115BBECD2E7C2FCB631A7
                                                            SHA1:0123A961242ED8049B37C77C726DB8DBD94C1023
                                                            SHA-256:B909ADD0B87FA8EE08FD731041907212A8A0939D37D2FF9B2F600CD67DABD4BB
                                                            SHA-512:96587A8C3555DA1D810010C10C516CE5CCAB071557A3C8D9BD65C647C7D4AD0E35CBED0788F1D72BAFAC8C84C7E2703FC747F70D9C95F720745A1FC4A701C544
                                                            Malicious:false
                                                            Preview:# scale.tcl - Copyright (C) 2004 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# Bindings for the TScale widget....namespace eval ttk::scale {.. variable State.. array set State {...dragging 0.. }..}....bind TScale <Button-1> { ttk::scale::Press %W %x %y }..bind TScale <B1-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-1> { ttk::scale::Release %W %x %y }....bind TScale <Button-2> { ttk::scale::Jump %W %x %y }..bind TScale <B2-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-2> { ttk::scale::Release %W %x %y }....bind TScale <Button-3> { ttk::scale::Jump %W %x %y }..bind TScale <B3-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-3> { ttk::scale::Release %W %x %y }....## Keyboard navigation bindings:..#..bind TScale <<LineStart>> { %W set [%W cget -from] }..bind TScale <<LineEnd>> { %W set [%W cget -to] }....bind TScale <<PrevChar>> { ttk::scale::Increment %W -1 }..bin
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):3285
                                                            Entropy (8bit):4.979174619784594
                                                            Encrypted:false
                                                            SSDEEP:48:tyASEji8RYQ8FGD7BDos9Q1TBfvq/HKTh9lkHv8T/mAezeLEAAFULxZh4x:eIi8qFu2d11XlhfkPcczeLS4Zm
                                                            MD5:3FB31A225CEC64B720B8E579582F2749
                                                            SHA1:9C0151D9E2543C217CF8699FF5D4299A72E8F13C
                                                            SHA-256:6EAA336B13815A7FC18BCD6B9ADF722E794DA2888D053C229044784C8C8E9DE8
                                                            SHA-512:E6865655585E3D2D6839B56811F3FD86B454E8CD44E258BB1AC576AD245FF8A4D49FBB7F43458BA8A6C9DAAC8DFA923A176F0DD8A9976A11BEA09E6E2D17BF45
                                                            Malicious:false
                                                            Preview:#..# Bindings for TScrollbar widget..#....namespace eval ttk::scrollbar {.. variable State.. # State(xPress).--.. # State(yPress).-- initial position of mouse at start of drag... # State(first).-- value of -first at start of drag...}....bind TScrollbar <Button-1> ..{ ttk::scrollbar::Press %W %x %y }..bind TScrollbar <B1-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-1>.{ ttk::scrollbar::Release %W %x %y }....bind TScrollbar <Button-2> ..{ ttk::scrollbar::Jump %W %x %y }..bind TScrollbar <B2-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-2>.{ ttk::scrollbar::Release %W %x %y }....# Redirect scrollwheel bindings to the scrollbar widget..#..# The shift-bindings scroll left/right (not up/down)..# if a widget has both possibilities..set eventList [list <MouseWheel> <Shift-MouseWheel>]..switch [tk windowingsystem] {.. aqua {.. lappend eventList <Option-MouseWheel> <Shift-Option-MouseWheel>.. }.. x11 {..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2503
                                                            Entropy (8bit):4.830288003879418
                                                            Encrypted:false
                                                            SSDEEP:48:naLvMnAqeYQWYh7FvBrrbnMCfY/aVAbAigWAuFM0PfWAX20:nWQapprPnJY/8A8iRFdPtj
                                                            MD5:DD6A1737B14D3F7B2A0B4F8BE99C30AF
                                                            SHA1:E6B06895317E73CD3DC78234DD74C74F3DB8C105
                                                            SHA-256:E92D77B5CDCA2206376DB2129E87E3D744B3D5E31FDE6C0BBD44A494A6845CE1
                                                            SHA-512:B74AE92EDD53652F8A3DB0D84C18F9CE9069805BCAB0D3C2DBB537D7C241AA2681DA69B699D88A10029798D7B5BC015682F64699BA475AE6A379EEF23B48DAAF
                                                            Malicious:false
                                                            Preview:#..# Sizegrip widget bindings...#..# Dragging a sizegrip widget resizes the containing toplevel...#..# NOTE: the sizegrip widget must be in the lower right hand corner...#....switch -- [tk windowingsystem] {.. x11 -.. win32 {...option add *TSizegrip.cursor [ttk::cursor seresize] widgetDefault.. }.. aqua {.. .# Aqua sizegrips use default Arrow cursor... }..}....namespace eval ttk::sizegrip {.. variable State.. array set State {...pressed .0...pressX ..0...pressY ..0...width ..0...height ..0...widthInc.1...heightInc.1.. resizeX 1.. resizeY 1...toplevel .{}.. }..}....bind TSizegrip <Button-1> ..{ ttk::sizegrip::Press.%W %X %Y }..bind TSizegrip <B1-Motion> ..{ ttk::sizegrip::Drag .%W %X %Y }..bind TSizegrip <ButtonRelease-1> .{ ttk::sizegrip::Release %W %X %Y }....proc ttk::sizegrip::Press {W X Y} {.. variable State.... if {[$W instate disabled]} { return }.... set top [winfo toplevel $W].... # If the toplevel is not resi
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5003
                                                            Entropy (8bit):5.055050310142795
                                                            Encrypted:false
                                                            SSDEEP:96:1qg/+yrjqA/K5ytxm1J1Ve6J1yQLUAzz/S76hrwxGGe2F:N/+yr2Gk1J1Ve6fxUAzDS76hrwxs2F
                                                            MD5:9C2833FAA9248F09BC2E6AB1BA326D59
                                                            SHA1:F13CF048FD706BBB1581DC80E33D1AAD910D93E8
                                                            SHA-256:DF286BB59F471AA1E19DF39AF0EF7AA84DF9F04DC4A439A747DD8BA43C300150
                                                            SHA-512:5FF3BE1E3D651C145950C3FC5B8C2E842211C937D1042173964383D4D59ECF5DD0EC39FF7771D029716F2D895F0B1A72591EF3BF7947FE64D4D6DB5F0B8ABFFB
                                                            Malicious:false
                                                            Preview:#..# ttk::spinbox bindings..#....namespace eval ttk::spinbox { }....### Spinbox bindings...#..# Duplicate the Entry bindings, override if needed:..#....ttk::copyBindings TEntry TSpinbox....bind TSpinbox <Motion>...{ ttk::spinbox::Motion %W %x %y }..bind TSpinbox <Button-1> ..{ ttk::spinbox::Press %W %x %y }..bind TSpinbox <ButtonRelease-1> .{ ttk::spinbox::Release %W }..bind TSpinbox <Double-Button-1> .{ ttk::spinbox::DoubleClick %W %x %y }..bind TSpinbox <Triple-Button-1> .{} ;# disable TEntry triple-click....bind TSpinbox <Up>...{ event generate %W <<Increment>> }..bind TSpinbox <Down> ...{ event generate %W <<Decrement>> }....bind TSpinbox <<Increment>>..{ ttk::spinbox::Spin %W +1 }..bind TSpinbox <<Decrement>> ..{ ttk::spinbox::Spin %W -1 }....ttk::bindMouseWheel TSpinbox ..[list ttk::spinbox::MouseWheel %W]....## Motion --..#.Sets cursor...#..proc ttk::spinbox::Motion {w x y} {.. variable State.. ttk::saveCursor $w State(userConfCursor) [ttk::cursor text].. if { [$w ide
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10180
                                                            Entropy (8bit):4.886259798213254
                                                            Encrypted:false
                                                            SSDEEP:96:FoTvMxHZZ1u2xj7+ZBHxjiXJv9IfwW+vr3UxjXEJDTF/MyLF3JcMzlsra2tYGa5P:mImAkRKYXMH59o4UbS30LWb
                                                            MD5:F705B3A292D02061DA0ABB4A8DD24077
                                                            SHA1:FD75C2250F6F66435444F7DEEF383C6397ED2368
                                                            SHA-256:C88B60FFB0F72E095F6FC9786930ADD7F9ED049EABC713F889F9A7DA516E188C
                                                            SHA-512:09817638DD3D3D5C57FA630C7EDF2F19C3956C9BD264DBF07627FA14A03AECD22D5A5319806E49EF1030204FADEF17C57CE8EAE4378A319AD2093321D9151C8F
                                                            Malicious:false
                                                            Preview:#..# ttk::treeview widget bindings and utilities...#....namespace eval ttk::treeview {.. variable State.... # Enter/Leave/Motion.. #.. set State(activeWidget) .{}.. set State(activeHeading) .{}.... # Press/drag/release:.. #.. set State(pressMode) .none.. set State(pressX)..0.... # For pressMode == "resize".. set State(resizeColumn).#0.... # For pressmode == "heading".. set State(heading) .{}..}....### Widget bindings...#....bind Treeview.<Motion> ..{ ttk::treeview::Motion %W %x %y }..bind Treeview.<B1-Leave>..{ #nothing }..bind Treeview.<Leave>...{ ttk::treeview::ActivateHeading {} {}}..bind Treeview.<Button-1> ..{ ttk::treeview::Press %W %x %y }..bind Treeview.<Double-Button-1> .{ ttk::treeview::DoubleClick %W %x %y }..bind Treeview.<ButtonRelease-1> .{ ttk::treeview::Release %W %x %y }..bind Treeview.<B1-Motion> ..{ ttk::treeview::Drag %W %x %y }..bind Treeview .<Up> ..{ ttk::treeview::Keynav %W up }..bind Treeview .<Down> ..{ ttk::treeview
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4993
                                                            Entropy (8bit):4.954034141173847
                                                            Encrypted:false
                                                            SSDEEP:96:lfxukTy5jPTq8LIgF2diyNTNR6nkrn4ijSSvNigyJ5612HtZG835MSvWOTRsHWU:BM+y5jrq8G/2nkEijSSvNigyJ5612Htw
                                                            MD5:AF45B2C8B43596D1BDECA5233126BD14
                                                            SHA1:A99E75D299C4579E10FCDD59389B98C662281A26
                                                            SHA-256:2C48343B1A47F472D1A6B9EE8D670CE7FB428DB0DB7244DC323FF4C7A8B4F64B
                                                            SHA-512:C8A8D01C61774321778AB149F6CA8DDA68DB69133CB5BA7C91938E4FD564160ECDCEC473222AFFB241304A9ACC73A36B134B3A602FD3587C711F2ADBB64AFA80
                                                            Malicious:false
                                                            Preview:#..# Ttk widget set initialization script...#....### Source library scripts...#....namespace eval ::ttk {.. variable library.. if {![info exists library]} {...set library [file dirname [info script]].. }..}....source -encoding utf-8 [file join $::ttk::library fonts.tcl]..source -encoding utf-8 [file join $::ttk::library cursors.tcl]..source -encoding utf-8 [file join $::ttk::library utils.tcl]....## ttk::deprecated $old $new --..#.Define $old command as a deprecated alias for $new command..#.$old and $new must be fully namespace-qualified...#..proc ttk::deprecated {old new} {.. interp alias {} $old {} ttk::do'deprecate $old $new..}..## do'deprecate --..#.Implementation procedure for deprecated commands --..#.issue a warning (once), then re-alias old to new...#..proc ttk::do'deprecate {old new args} {.. deprecated'warning $old $new.. interp alias {} $old {} $new.. uplevel 1 [linsert $args 0 $new]..}....## deprecated'warning --..#.Gripe about use of deprecated comman
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8624
                                                            Entropy (8bit):5.001791071900077
                                                            Encrypted:false
                                                            SSDEEP:192:e0ebpSp+IZwnmTmpx8xzaHfw8K7LlJWQl8p7M+R5:rw0+WmpWxa/w9nlJHu
                                                            MD5:51086BC3315A4AE4A8591A654CFC3CEA
                                                            SHA1:2AC08309C63575B7A01FA62D3C262643CD8C823A
                                                            SHA-256:4AA041C050758B3331DC395381F7FBCE81E387908FC7A3C6107C4E7140F56F2E
                                                            SHA-512:6D69F7EAC9D5AF3B3EA85AE3E74BDFA6278789502D5E35EFE94349BFC543503BE7540D783D2632E349DD53F21074C702AC1FC487EE70C74234A08397F7238723
                                                            Malicious:false
                                                            Preview:#..# Utilities for widget implementations...#....### Focus management...#..# See also: #1516479..#....## ttk::takefocus --..#.This is the default value of the "-takefocus" option..#.for ttk::* widgets that participate in keyboard navigation...#..# NOTES:..#.tk::FocusOK (called by tk_focusNext) tests [winfo viewable]..#.if -takefocus is 1, empty, or missing; but not if it's a..#.script prefix, so we have to check that here as well...#..#..proc ttk::takefocus {w} {.. expr {[$w instate !disabled] && [winfo viewable $w]}..}....## ttk::GuessTakeFocus --..#.This routine is called as a fallback for widgets..#.with a missing or empty -takefocus option...#..#.It implements the same heuristics as tk::FocusOK...#..proc ttk::GuessTakeFocus {w} {.. # Don't traverse to widgets with '-state disabled':.. #.. if {![catch {$w cget -state} state] && $state eq "disabled"} {...return 0.. }.... # Allow traversal to widgets with explicit key or focus bindings:.. #.. if {[regexp {Key|F
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):9710
                                                            Entropy (8bit):4.6639701588183895
                                                            Encrypted:false
                                                            SSDEEP:192:BktY1F+qXd95WSZaHFHRE3GRKFh2oaoT/ezKpqvYMHab:V1F+cd95WSZuhRE34KbPmKmY2ab
                                                            MD5:0AA7F8B43C3E07F3A4DA07FC6DF9A1B0
                                                            SHA1:153AFB735B10BBA16CFBE161777232F983845D90
                                                            SHA-256:EC5F203C69DF390E9B99944CF3526D6E77DC6F68E9B1A029F326A41AFED1EF81
                                                            SHA-512:5406553211CD6714C98EF7765ABD46424CCB013343EFF693FDD3AE6E0AAE9B5983446E0E1CC706D6B2C285084BF83D397306D3D52028CBBCFB8F369857C5B69C
                                                            Malicious:false
                                                            Preview:#..# Settings for Microsoft Windows Vista and Server 2008..#....# The Vista theme can only be defined on Windows Vista and above. The theme..# is created in C due to the need to assign a theme-enabled function for..# detecting when themeing is disabled. On systems that cannot support the..# Vista theme, there will be no such theme created and we must not..# evaluate this script.....if {"vista" ni [ttk::style theme names]} {.. return..}....namespace eval ttk::theme::vista {.... ttk::style theme settings vista {.... .ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2865
                                                            Entropy (8bit):4.917847108902527
                                                            Encrypted:false
                                                            SSDEEP:48:b69VhW2gL5FPVWRzQsVqrEuF3yYrf7rfJF8xUqBgLt6g3ktO5jo4+iZ6O2htYtCW:bbXl+CEqZNNSxU0Ht2MR7W
                                                            MD5:769C0719A4044F91E7D132A25291E473
                                                            SHA1:6FB07B0C887D443A43FB15D5728920B578171219
                                                            SHA-256:AE82BCCCE708FF9C303CBCB3D4CC3FF5577A60D5B23822EA79E3E07CCE3CBBD1
                                                            SHA-512:47FED061DDC6B4EB63EF77901D0094FF2EBB1BAFACB3F44FBF13FB59DEA1EC83985B2862086ECF1A7957819A88A0FAA144B35F16BEA9356BBD9775070D42E636
                                                            Malicious:false
                                                            Preview:#..# Settings for 'winnative' theme...#....namespace eval ttk::theme::winnative {.. ttk::style theme settings winnative {.....ttk::style configure "." \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -fieldbackground SystemWindow \... -insertcolor SystemWindowText \... -troughcolor SystemScrollbar \... -font TkDefaultFont \... ;.....ttk::style map "." -foreground [list disabled SystemGrayText] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -relief raised -shiftrelief 1...ttk::style configure TCheckbutton -padding "2 4"...ttk::style configure TRadiobutton -padding "2 4"...ttk::style configure TMenubutton \... -padding "8 4" -arrowsize 3 -relief raised.....ttk::style map TButton -relief {{!disabled pressed} sunken}.....ttk::style configure TEntry \... -padding 2 -select
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):2103
                                                            Entropy (8bit):4.9805308941424355
                                                            Encrypted:false
                                                            SSDEEP:48:aaiIu89VhW2gLRWJyO514rf+rfzxTrf/MW+iZ6O2htYtCp:XoXAk21nxQ7p
                                                            MD5:162F30D2716438C75EA16B57E6F63088
                                                            SHA1:3F626FF0496BB16B27106BED7E38D1C72D1E3E27
                                                            SHA-256:AEDB21C6B2909A4BB4686837D2126E521A8CC2B38414A4540387B801EBD75466
                                                            SHA-512:6EBF9648F1381D04F351BB469B6E3A38F3D002189C92EAF80A18D65632037FF37D34EC8814BBF7FAE34553645BFC13985212F24684EE8C4E205729B975C88C97
                                                            Malicious:false
                                                            Preview:#..# Settings for 'xpnative' theme..#....namespace eval ttk::theme::xpnative {.... ttk::style theme settings xpnative {.....ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::style configure TCheckbutton -padding 2...ttk::style configure TMenubutton -padding {8 4}.....ttk::style configure TNotebook -tabmargins {2 2 2 0}...ttk::style map TNotebook.Tab \... -expand [list selected {2 2 2 2}].....ttk::style configure TLabelframe.Label -foreground "#0046d5".....# OR: -padding {3 3 3 6}, which some apps seem to use....ttk::style configure TEntry -padding {2 2 2 4}...ttk::
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10521
                                                            Entropy (8bit):5.0647027375963996
                                                            Encrypted:false
                                                            SSDEEP:192:1Y3uWEXm/swEePmJhRAXd1hTHsHG2ML/9Lm2daM0Hu:8hodMiM0Hu
                                                            MD5:508F7E258C04970FAE526990168CB773
                                                            SHA1:33785204B18C0E0F5CDCB5B49399B5907351FDB8
                                                            SHA-256:B463B366F139DDF7FED31F34C6D2341F9F27845A1A358011DFC801E1333B1828
                                                            SHA-512:A12985B58DD1D46297119CED47B7F44EF4139CED6C36FD028E66DD657E5ED0663B744C679A5BF7A39B39D17A32E1280D2945F6B9AD59AEF20436F68040F6070C
                                                            Malicious:false
                                                            Preview:# unsupported.tcl --..#..# Commands provided by Tk without official support. Use them at your..# own risk. They may change or go away without notice...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# ----------------------------------------------------------------------..# Unsupported compatibility interface for folks accessing Tk's private..# commands and variable against recommended usage...# ----------------------------------------------------------------------....namespace eval ::tk::unsupported {.... # Map from the old global names of Tk private commands to their.. # new namespace-encapsulated names..... variable PrivateCommands.. array set PrivateCommands {...tkButtonAutoInvoke..::tk::ButtonAutoInvoke...tkButtonDown...::tk::ButtonDown...tkButtonEnter...::tk::ButtonEnter...tkButtonInvoke...::tk::ButtonInvoke...tkButtonLeave...::tk::ButtonLeave...tkButtonUp...::tk::ButtonUp...tk
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26991
                                                            Entropy (8bit):4.974180990171971
                                                            Encrypted:false
                                                            SSDEEP:384:0BLzjXhss64XKNFXm39QJ63nwFiHLgRIdNPCRE5phLtffsNP4XWdxWk+I5oP9jNR:0BvjXoFCB3flLCRE5phLCP3xWq8vWTod
                                                            MD5:FA99EF44FAA88A6BA1967A1257DEB97B
                                                            SHA1:CC99DBF678F4169A90ACC5A89C6F8DAB48052EC6
                                                            SHA-256:C4722EADEDE763FA52E7937D40067B0F8EB86B7A4B707F90212ED3E5289690D0
                                                            SHA-512:3AF16095784908A444CD61EEF178A30B9FED9C20AA91D94044A3AECB6047267FB80BCE790FC1F28FB19AEF664A6618FD832612F541FDADCC34B6C01E92E5EA40
                                                            Malicious:false
                                                            Preview:# xmfbox.tcl --..#..#.Implements the "Motif" style file selection dialog for the..#.Unix platform. This implementation is used only if the..#."::tk_strictMotif" flag is set...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Scriptics Corporation..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}......# ::tk::MotifFDialog --..#..#.Implements a file dialog similar to the standard Motif file..#.selection box...#..# Arguments:..#.type.."open" or "save"..#.args..Options parsed by the procedure...#..# Results:..#.When -multiple is set to 0, this returns the absolute pathname..#.of the selected file. (NOTE: This is not the same as a single..#.element list.)..#..#.When -multiple is set to > 0, this returns a Tcl list of absolute..# pathnames. The argument for -multiple is ignored, but for consistency..#
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):66320
                                                            Entropy (8bit):6.282149407992637
                                                            Encrypted:false
                                                            SSDEEP:1536:Lx2s2VF41qe6gwfdHd5MlU9oBilPrdIJvSi7Sy7z:Lv2VNe6Lfd9alPIlPrdIJvSiJ
                                                            MD5:EDFFCEA2091A5661F451CCD83AD4527D
                                                            SHA1:F81847C0ADC0F58134B195A13486D851911FC516
                                                            SHA-256:A6851D7C25A1216D2C8FA5C1D2E9ECA3D0392D60E3B7441AD9F66C23FFDD2F08
                                                            SHA-512:ABC9FBF7BFBD705016A9D0430243358A1E8F7C4E398B6BA0FC5B1A147F0A1F635E27B859D742E4184AE9D396A68572B169476703312BABC3E7530D698FF9AB48
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@..@..@..I._.F..PT.B..PT.C..PT.H..PT.M...U.B.....B../Q.E..@......U..B...U.A...U3.A...U.A..Rich@..........PE..d......g.........." ...).n...j.......................................................@....`.............................................P.............................../......0.......T...............................@...............x............................text....l.......n.................. ..`.rdata..jB.......D...r..............@..@.data... ...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..0...........................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                            Category:dropped
                                                            Size (bytes):1394456
                                                            Entropy (8bit):5.531698507573688
                                                            Encrypted:false
                                                            SSDEEP:12288:IW7WpLV6yNLeGQbVz3YQfiBgDPtLwjFx278e6ZQnHS91lqyL+DXUgnxOr+dx5/GO:B7WpLtHa9BHSHAW+dx5/GP05vddD
                                                            MD5:A9CBD0455B46C7D14194D1F18CA8719E
                                                            SHA1:E1B0C30BCCD9583949C247854F617AC8A14CBAC7
                                                            SHA-256:DF6C19637D239BFEDC8CD13D20E0938C65E8FDF340622FF334DB533F2D30FA19
                                                            SHA-512:B92468E71490A8800E51410DF7068DD8099E78C79A95666ECF274A9E9206359F049490B8F60B96081FAFD872EC717E67020364BCFA972F26F0D77A959637E528
                                                            Malicious:false
                                                            Preview:PK..........!..b.e............_collections_abc.pyc......................................\.....S.r.S.S.K.J.r.J.r. .S.S.K.r.\.".\.\.....5.......r.\.".S.5.......r.S...r.\.".\.5.......r.C./.S.Q.r.S.r.\.".\.".S.5.......5.......r.\.".\.".\.".5.......5.......5.......r.\.".\.".0.R%..................5.......5.......5.......r.\.".\.".0.R)..................5.......5.......5.......r.\.".\.".0.R-..................5.......5.......5.......r.\.".\."./.5.......5.......r.\.".\.".\."./.5.......5.......5.......r.\.".\.".\.".S.5.......5.......5.......r.\.".\.".\.".S.S.-...5.......5.......5.......r.\.".\.".\.".5.......5.......5.......r.\.".\.".S.5.......5.......r \.".\.".S.5.......5.......r!\.".\.".\"".5.......5.......5.......r#\.".0.R%..................5.......5.......r$\.".0.R)..................5.......5.......r%\.".0.R-..................5.......5.......r&\.".\.RN..................5.......r(S...r)\)".5.......r*C)\.".S...".5.......5.......r+S...r,\,".5.......r,\.".\,5.......r-\,R]..................5.......
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):5232408
                                                            Entropy (8bit):5.940072183736028
                                                            Encrypted:false
                                                            SSDEEP:98304:/V+Qs2NuR5YV0L8PQ1CPwDvt3uFlDC4SC9c:9rs2NuDYV0L841CPwDvt3uFlDC4SCa
                                                            MD5:123AD0908C76CCBA4789C084F7A6B8D0
                                                            SHA1:86DE58289C8200ED8C1FC51D5F00E38E32C1AAD5
                                                            SHA-256:4E5D5D20D6D31E72AB341C81E97B89E514326C4C861B48638243BDF0918CFA43
                                                            SHA-512:80FAE0533BA9A2F5FA7806E86F0DB8B6AAB32620DDE33B70A3596938B529F3822856DE75BDDB1B06721F8556EC139D784BC0BB9C8DA0D391DF2C20A80D33CB04
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._~.._~.._~..V.S.M~.....]~.....[~.....W~.....S~.._~...~......T~..J....~..J...7}..J...^~..J.?.^~..J...^~..Rich_~..........................PE..d......f.........." ...(..7..<......v........................................0P.......O...`...........................................H.0.....O.@....@O.|.... L. .....O../...PO.$...`{D.8............................yD.@.............O..............................text.....7.......7................. ..`.rdata........7.......7.............@..@.data...Ao....K..<....K.............@....pdata....... L.......K.............@..@.idata...%....O..&....N.............@..@.00cfg..u....0O.......N.............@..@.rsrc...|....@O.......N.............@..@.reloc..~....PO.......N.............@..B................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):6083856
                                                            Entropy (8bit):6.126922729922386
                                                            Encrypted:false
                                                            SSDEEP:49152:fXGc3O7T4DKX+vLFMmKYxiAYNBD987KdJlI9HbeX2jrgQcw6Zc4h67mM+XDQ3bLi:Of42zJiwJl/YF7v3vaHDMiEN3Kr
                                                            MD5:B9DE917B925DD246B709BB4233777EFD
                                                            SHA1:775F258D8B530C6EA9F0DD3D1D0B61C1948C25D2
                                                            SHA-256:0C0A66505093B6A4BB3475F716BD3D9552095776F6A124709C13B3F9552C7D99
                                                            SHA-512:F4BF3398F50FDD3AB7E3F02C1F940B4C8B5650ED7AF16C626CCD1B934053BA73A35F96DA03B349C1EB614BB23E0BC6B5CC58B07B7553A5C93C6D23124F324A33
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........s]{v ]{v ]{v M.w!_{v M.. S{v M.u!Y{v M.r!U{v M.s!P{v T.. G{v ..w!V{v ]{w .zv ..{!.{v ..v!\{v ... \{v ..t!\{v Rich]{v ........................PE..d......g.........." ...).:+..T9......J........................................d.....uF]...`...........................................O.....h.P.......d......0].......\../....d..... A3.T.....................I.(....?3.@............P+..............................text....8+......:+................. ..`.rdata....%..P+...%..>+.............@..@.data...$9....P..N....P.............@....pdata.......0]...... U.............@..@PyRuntim.N...._..P....W.............@....rsrc.........d.......[.............@..@.reloc........d.......[.............@..B........................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):30992
                                                            Entropy (8bit):6.554484610649281
                                                            Encrypted:false
                                                            SSDEEP:384:7hhxm9tKLhuoNHfzzlvFy0ZZIJ9GckHQIYiSy1pCQ4HWSJIVE8E9VF0Ny6sC:tCytHf98uZIJ9Gx5YiSyvy2ES
                                                            MD5:20831703486869B470006941B4D996F2
                                                            SHA1:28851DFD43706542CD3EF1B88B5E2749562DFEE0
                                                            SHA-256:78E5994C29D8851F28B5B12D59D742D876683AEA58ECEEA1FB895B2036CDCDEB
                                                            SHA-512:4AAF5D66D2B73F939B9A91E7EDDFEB2CE2476C625586EF227B312230414C064AA850B02A4028363AA4664408C9510594754530A6D026A0A84BE0168D677C1BC4
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........tV..'V..'V..'_.j'T..'F:.&T..'F:.&R..'F:.&^..'F:.&Z..'.;.&T..'V..'...'...&S..'.;.&W..'.;.&W..'.;.'W..'.;.&W..'RichV..'................PE..d.....g.........." ...).....2............................................................`..........................................@..L...<A..x....p.......`.......J.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data...p....P.......8..............@....pdata.......`.......:..............@..@.rsrc........p.......>..............@..@.reloc..L............H..............@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1822480
                                                            Entropy (8bit):6.496835067638848
                                                            Encrypted:false
                                                            SSDEEP:49152:ehk299wKFi8C2Qt6IHCmGViSIV8JryqL3eD0:qN9wdeIAvt
                                                            MD5:8587238932B4F7F394CE587AD169846B
                                                            SHA1:6CDC9C1751E812BE3A11BB411A145E7AB6885DEF
                                                            SHA-256:C861F39AD0F4FC7F3875850925F61442BFF2BC1839BBBB3584A63BC4D6E5CEA6
                                                            SHA-512:C88506E5B78AB1459C25DE4C7EF65B3C9E24E0F79AB2132E8FDC7A02195AF2E137874512A0F423C80D558969E42E2A4BC7D2CDDEE696624DBD230B32C44F88F2
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........'...Ft..Ft..Ft...u..Ft.....Ft...q..Ft...p..Ft...w..Ft.^/u..Ft..>..Ft..>p..Ft..>u..Ft..Fu..Gt...|.^Ft...t..Ft.....Ft...v..Ft.Rich.Ft.........................PE..d......e.........." ...&.&..........x'..............................................P.....`.........................................`....`..Xt..h....... .......(......../..........................................p...@............@..h............................text....%.......&.................. ..`.rdata..(Q...@...R...*..............@..@.data...0#...........|..............@....pdata..(...........................@..@.rsrc... ............~..............@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):11708
                                                            Entropy (8bit):5.033309358188091
                                                            Encrypted:false
                                                            SSDEEP:192:rXlm2LnoZ7k2mOEhYoKVtWD2xLsdF+MNlPQ4lJ+B0O0DgryYY/+zy7go:rXlm2Lng7kvF2VtWD2xL/MNT+B0O0Urk
                                                            MD5:09136E22071F0B5AC55481E1AC5CB418
                                                            SHA1:B45E10211323E92D9A985C82C5CF0A8C3DC1E51D
                                                            SHA-256:FE9087E2779FF30D229356E87920F3ADD9E362A70FCCB832AE23086118BFC0DA
                                                            SHA-512:565B418C129C619BB92862B7AF52F75BDF3E0603AA365C8D6BDE0C60DAFC1C4C6C553216D484A35C2039C8640BD4871036BD644458F7282DC95454F11D5BAE1A
                                                            Malicious:false
                                                            Preview:# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Heuristics to assemble a platform identifier from publicly available..# information. The identifier describes the platform of the currently..# running tcl shell. This is a mixture of the runtime environment and..# of build-time properties of the executable itself...#..# Examples:..# <1> A tcl shell executing on a x86_64 processor, but having a..# wordsize of 4 was compiled for the x86 environment, i.e. 32..# bit, and loaded packages have to match that, and not the..# actual cpu...#..# <2> The hp/solaris 32/64 bit builds of the core cannot be..# distinguished by looking at tcl_platform. As packages have to..# match the 32/64 information we have to look in more places. In..# this case we inspect the executable itself (magic numbers,..# i.e. fileutil::magic::filetype)...#..# The basic information used comes out of the 'os' and 'machine'..# entries of the 'tcl_platform' array. A number of general and
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6217
                                                            Entropy (8bit):4.843096643524417
                                                            Encrypted:false
                                                            SSDEEP:192:PV5U+VLnNUGVvH+knNUGVUHD5ngWftN+Ig1EfIdqi+g0SYiCXVDjqL:Nm6boXNuEwq51iCFD2
                                                            MD5:0C30529D7AD5DE360061E4365D0737F4
                                                            SHA1:33CF0EAE4D0D742C18145D3B987EEAD8B2220F79
                                                            SHA-256:F587F5F375CF6EA3410F7421FF51DB004E7231E952EED2F74100AE8D3E9BB91E
                                                            SHA-512:EB33545663B7E344EE09487C75B4CE052C202D81BAB5915171475E40AA2B1F0B8B1C3366F84CFF61D946012622A984BD2E19DB1FB71C91B911EBDCC9633658B9
                                                            Malicious:false
                                                            Preview:..# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Higher-level commands which invoke the functionality of this package..# for an arbitrary tcl shell (tclsh, wish, ...). This is required by a..# repository as while the tcl shell executing packages uses the same..# platform in general as a repository application there can be..# differences in detail (i.e. 32/64 bit builds).....# ### ### ### ######### ######### #########..## Requirements....package require platform..namespace eval ::platform::shell {}....# ### ### ### ######### ######### #########..## Implementation....# -- platform::shell::generic....proc ::platform::shell::generic {shell} {.. # Argument is the path to a tcl shell..... CHECK $shell.. LOCATE base out.... set code {}.. # Forget any preexisting platform package, it might be in.. # conflict with this one... lappend code {package forget platform}.. # Inject our platform package.. lappend code [list source $base]..
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):35141
                                                            Entropy (8bit):4.945541385716526
                                                            Encrypted:false
                                                            SSDEEP:768:m3xQ0CzasW/rHPG2yfkZ0Kbh91iQ34nq5MIVYB8mbgijsPIAtw4qvUm:4xQ0CzasWDHPG2yW0kJ3dimXmUij6njG
                                                            MD5:62FDB2C6EC12160D3636F8D19485990B
                                                            SHA1:BAD3547AFD2D9E58BAA6841EC6CBA55F47B75F04
                                                            SHA-256:6CC549A37C051D0C70A935B26C2098D1CA4A10B1A60BCE03068BE268B5E81CA1
                                                            SHA-512:1867C11BD337B325BCEE00048720FC48CDB71E7C78F1B18F0880E036F22CDE89C25FBE15270BF7738D2FC8F376CE0608D78D9230295687D5DBD6F95F6C4D0920
                                                            Malicious:false
                                                            Preview:# msgcat.tcl --..#..#.This file defines various procedures which implement a..#.message catalog facility for Tcl programs. It should be..#.loaded with the command "package require msgcat"...#..# Copyright (c) 2010-2015 Harald Oehlmann...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 1998 Mark Harrison...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.5-..# When the version number changes, be sure to update the pkgIndex.tcl file,..# and the installation directory in the Makefiles...package provide msgcat 1.6.1....namespace eval msgcat {.. namespace export mc mcexists mcload mclocale mcmax mcmset mcpreferences mcset\.. mcunknown mcflset mcflmset mcloadedlocales mcforgetpackage\... mcpackageconfig mcpackagelocale.... # Records the list of locales to search.. variable Loclist {}.... # List of currently loaded locales.. variable LoadedLoc
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Unicode text, UTF-8 text
                                                            Category:dropped
                                                            Size (bytes):105075
                                                            Entropy (8bit):4.7881869186256925
                                                            Encrypted:false
                                                            SSDEEP:1536:rKURHPk3tqN0E7NkhtMcrQ3qoyXutpr/lTM5t2g/CrQiXcuIHS8DuHm7zvL2YlQt:rKUTzUcwiBIHS8Dim7DL2Y0K/Ha0rBC
                                                            MD5:B15354C98D6A676152A2C81E8EB5ECF7
                                                            SHA1:B027020D5AB2921E21C79E10C3EEB03BB47550FF
                                                            SHA-256:DF623D89CEF0FA5D2C53CB9ACE1EE8FF4AFD5A735AB6D86E68757DA89122F26B
                                                            SHA-512:5B5D2B19EF1F64EA6D4911B6568C0194E2E86C45514A5C778BCABE642E9A919FFB48107EA0E280E425BE1711B277D15303009D951BBAC110DAF860F60BBD05E3
                                                            Malicious:false
                                                            Preview:# tcltest.tcl --.#.#.This file contains support code for the Tcl test suite. It.# defines the tcltest namespace and finds and defines the output.# directory, constraints available, output and error channels,.#.etc. used by Tcl tests. See the tcltest man page for more.#.details..#.# This design was based on the Tcl testing approach designed and.# initially implemented by Mary Ann May-Pumphrey of Sun.#.Microsystems..#.# Copyright . 1994-1997 Sun Microsystems, Inc..# Copyright . 1998-1999 Scriptics Corporation..# Copyright . 2000 Ajuba Solutions.# Contributions from Don Porter, NIST, 2002. (not subject to US copyright).# All rights reserved...namespace eval tcltest {.. # When the version number changes, be sure to update the pkgIndex.tcl file,. # and the install directory in the Makefiles. When the minor version. # changes (new feature) be sure to update the man page as well.. variable Version 2.5.7.. # Compatibility support for dumb variables
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:Tcl script, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):118422
                                                            Entropy (8bit):4.888857036034696
                                                            Encrypted:false
                                                            SSDEEP:1536:RYY1IO/KuUhIW17zr1DLJuuBuFsj6aIeGc3e6xGxjndp72y4eFBxIQ30Ik:RbyOCuUv9r5LJmsjjxTxGxjndpCBemQ0
                                                            MD5:CF01A75B7F92042E50002DAEC4B6AE63
                                                            SHA1:279C011127396DC8A23F73470761646EF38C1102
                                                            SHA-256:CEEEF25A5919509BF5889BBF5E70734F117F0876AE35C80F01977510A2A9D762
                                                            SHA-512:D01620365BD4847CC0B8A170C3A45C9BE515C59AF002AB5454CB2D72A800C4479BC0131E4BADAF22A6E661B822263D76F27D52BDE449CF2754B1F13EEB5B92C6
                                                            Malicious:false
                                                            Preview:# http.tcl --..#..#.Client-side HTTP for GET, POST, and HEAD commands. These routines can..#.be used in untrusted code that uses the Safesock security policy...#.These procedures use a callback interface to avoid using vwait, which..#.is not defined in the safe base...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.6-..# Keep this in sync with pkgIndex.tcl and with the install directories in..# Makefiles..package provide http 2.9.8....namespace eval http {.. # Allow resourcing to not clobber existing data.... variable http.. if {![info exists http]} {...array set http {... -accept */*... -pipeline 1... -postfresh 0... -proxyhost {}... -proxyport {}... -proxyfilter http::ProxyRequired... -repost 0... -urlencoding utf-8... -zip 1...}...# We need a useragent string of this style or various servers will...# refuse to send us compressed content
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1569040
                                                            Entropy (8bit):6.183941021450726
                                                            Encrypted:false
                                                            SSDEEP:24576:tvVYTm+MKYeCmXNrhMMjMt41GZsbTYsgG04ChR3mxOl8v07B62sUCcmxNFClwdbR:tNY7YReNrhMMi41GZsbTYsgG04ChR3mB
                                                            MD5:6F06390D3AC095827DF2F1A8ED5DAE0C
                                                            SHA1:879F24522821F597C0341CA091E474163764B343
                                                            SHA-256:6425BF57ABCC1DFBBE8662B1956883AE0C5AB8C2D9314E19692B3D86BABC242C
                                                            SHA-512:27B975E15F6E1B9BC8E3E41152BAEE25F4B400DE3AA6E334C61B2165FECD27560FA5C4296A9B3FF0EB1103173CFB61C348BA11E01A44CBADBECF308B5D7C5095
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K.`@............................................D.......`..............D...........F...`.......`.......`.......`.......Rich............................PE..d...3..e.........." ...&............H...............................................Gj....`..........................................h..h@......h....0...{...p.........../.......F..px..............................0w..@...............0............................text............................... ..`.rdata..............................@..@.data..............................@....pdata.......p.......H..............@..@.rsrc....{...0...|..................@..@.reloc...F.......H...z..............@..B........................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):709904
                                                            Entropy (8bit):5.861739047785334
                                                            Encrypted:false
                                                            SSDEEP:12288:FYGdLI/X77mvfldCKGihH32W3cnPSqrUgLIe:FYGW7qNxr3cnPXLIe
                                                            MD5:0902D299A2A487A7B0C2D75862B13640
                                                            SHA1:04BCBD5A11861A03A0D323A8050A677C3A88BE13
                                                            SHA-256:2693C7EE4FBA55DC548F641C0CB94485D0E18596FFEF16541BD43A5104C28B20
                                                            SHA-512:8CBEF5A9F2D24DA1014F8F1CCBDDD997A084A0B04DD56BCB6AC38DDB636D05EF7E4EA7F67A085363AAD3F43D45413914E55BDEF14A662E80BE955E6DFC2FECA3
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Q.............(.....(.....(.....(.....)................).....).....)x....)....Rich..................PE..d.....g.........." ...).B...f......P,..............................................<.....`.........................................P...X................................/..........p...T...........................0...@............`..h............................text....@.......B.................. ..`.rdata...?...`...@...F..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):146192
                                                            Entropy (8bit):6.607123332668088
                                                            Encrypted:false
                                                            SSDEEP:3072:dvEO6FnGGVV1m4dkRR5Th2UgvGxbOUJCf/:dsVD+RrFgvi7Ju
                                                            MD5:3A46A119C9860C477F13FE98C878452C
                                                            SHA1:E0BCBE5B30EF2A2F58E1206C650672EE3F85ABC9
                                                            SHA-256:8C2ED3E1A90C9B0E3EF844BE20E1AF791AE8A1B665D4731162404F0EEE1697DC
                                                            SHA-512:0D3D4E8A2C8886FD6E480AECC5051644F39C1E06B1113DEF7273369F771C4429C757AED13BD8082F4768F617CA3499CD81B79A0893B5A2955FB4B68C8B571C71
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....d.e..........."...'............P..........A..........................................`... ......................................0.......@..8....p.................../......................................(....................A..p............................text...............................`..`.data...............................@....rdata...W.......X..................@..@.pdata..............................@..@.xdata..............................@..@.bss......... ...........................edata.......0......................@..@.idata..8....@......................@....CRT....X....P......................@....tls.........`......................@....rsrc........p......................@....reloc..............................@..B................................................................................................................................
                                                            File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                            Entropy (8bit):7.993086573557297
                                                            TrID:
                                                            • Win64 Executable GUI (202006/5) 77.37%
                                                            • InstallShield setup (43055/19) 16.49%
                                                            • Win64 Executable (generic) (12005/4) 4.60%
                                                            • Generic Win/DOS Executable (2004/3) 0.77%
                                                            • DOS Executable Generic (2002/1) 0.77%
                                                            File name:HxYqlJEUcq.exe
                                                            File size:10'283'628 bytes
                                                            MD5:f42027e450d51ce5b48df6496678bd14
                                                            SHA1:95955705c4fcd65bf9fc4c548b2f96727b746740
                                                            SHA256:fd43184bbfeb84ede2569054e8df15f7a0fd8d00f96652558f020d5e61046563
                                                            SHA512:5bf5ece00eaf1d6303e6b5a300f4424dadbd5054f5e113a97c194a92a9c0610b19812b769e53553b480bb90ab7ddf612eb5e397b0e28f8c3642e8178c9d555e7
                                                            SSDEEP:196608:ob0W8/9E62Y8XMCHGLLc54i1wN+lPIcu9KYK39srRqZksfiU3PP4NMRRcQx:XW818XMCHWUjqcuIOeT3/P4Nm
                                                            TLSH:2BA633883BC408EDEC96513DAAE11AA7D6E670B607B5C6934BF44EA14DA31C4EF35703
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n=..*\.Z*\.Z*\.Za$.[-\.Za$.[.\.Za$.[ \.Z:..Z)\.Z:..[#\.Z:..[;\.Z:..[.\.Za$.[!\.Z*\.Z.\.Zb..[3\.Zb..[+\.ZRich*\.Z........PE..d..
                                                            Icon Hash:9269ccd4d46c2956
                                                            Entrypoint:0x14000cdb0
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x140000000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x6718FF3C [Wed Oct 23 13:50:52 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:6
                                                            OS Version Minor:0
                                                            File Version Major:6
                                                            File Version Minor:0
                                                            Subsystem Version Major:6
                                                            Subsystem Version Minor:0
                                                            Import Hash:72c4e339b7af8ab1ed2eb3821c98713a
                                                            Instruction
                                                            dec eax
                                                            sub esp, 28h
                                                            call 00007F01D8E88CDCh
                                                            dec eax
                                                            add esp, 28h
                                                            jmp 00007F01D8E888FFh
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            dec eax
                                                            sub esp, 28h
                                                            call 00007F01D8E890A8h
                                                            test eax, eax
                                                            je 00007F01D8E88AA3h
                                                            dec eax
                                                            mov eax, dword ptr [00000030h]
                                                            dec eax
                                                            mov ecx, dword ptr [eax+08h]
                                                            jmp 00007F01D8E88A87h
                                                            dec eax
                                                            cmp ecx, eax
                                                            je 00007F01D8E88A96h
                                                            xor eax, eax
                                                            dec eax
                                                            cmpxchg dword ptr [0003577Ch], ecx
                                                            jne 00007F01D8E88A70h
                                                            xor al, al
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            mov al, 01h
                                                            jmp 00007F01D8E88A79h
                                                            int3
                                                            int3
                                                            int3
                                                            dec eax
                                                            sub esp, 28h
                                                            test ecx, ecx
                                                            jne 00007F01D8E88A89h
                                                            mov byte ptr [00035765h], 00000001h
                                                            call 00007F01D8E881D5h
                                                            call 00007F01D8E894C0h
                                                            test al, al
                                                            jne 00007F01D8E88A86h
                                                            xor al, al
                                                            jmp 00007F01D8E88A96h
                                                            call 00007F01D8E95FDFh
                                                            test al, al
                                                            jne 00007F01D8E88A8Bh
                                                            xor ecx, ecx
                                                            call 00007F01D8E894D0h
                                                            jmp 00007F01D8E88A6Ch
                                                            mov al, 01h
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            int3
                                                            int3
                                                            inc eax
                                                            push ebx
                                                            dec eax
                                                            sub esp, 20h
                                                            cmp byte ptr [0003572Ch], 00000000h
                                                            mov ebx, ecx
                                                            jne 00007F01D8E88AE9h
                                                            cmp ecx, 01h
                                                            jnbe 00007F01D8E88AECh
                                                            call 00007F01D8E8901Eh
                                                            test eax, eax
                                                            je 00007F01D8E88AAAh
                                                            test ebx, ebx
                                                            jne 00007F01D8E88AA6h
                                                            dec eax
                                                            lea ecx, dword ptr [00035716h]
                                                            call 00007F01D8E95DD2h
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3ca5c0x78.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000xdea0.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x440000x2250.pdata
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x550000x764.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0800x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39f400x140.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x4a0.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x29f000x2a0002a7ae207b6295492e9da088072661752False0.5514439174107143data6.487454925709845IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x2b0000x12a500x12c003253b55c27628c283e94f8545edae569False0.5244661458333333data5.752649883341154IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x3e0000x53f80xe00dba0caeecab624a0ccc0d577241601d1False0.134765625data1.8392217063172436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .pdata0x440000x22500x2400f5559f14427a02f0a5dbd0dd026cae54False0.470703125data5.291665041994019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .rsrc0x470000xdea00xe000fb03bf161e30b9b0f1031367773500d6False0.9809047154017857data7.931268815848454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x550000x7640x800816c68eeb419ee2c08656c31c06a0fffFalse0.5576171875data5.2809528666624175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x470e80xd893PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9982865285067547
                                                            RT_GROUP_ICON0x5497c0x14data1.1
                                                            RT_MANIFEST0x549900x50dXML 1.0 document, ASCII text0.4694508894044857
                                                            DLLImport
                                                            USER32.dllCreateWindowExW, ShutdownBlockReasonCreate, MsgWaitForMultipleObjects, ShowWindow, DestroyWindow, RegisterClassW, DefWindowProcW, PeekMessageW, DispatchMessageW, TranslateMessage, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                            COMCTL32.dll
                                                            KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, LCMapStringW, CompareStringW, FlsFree, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, FormatMessageW, GetLastError, GetModuleFileNameW, LoadLibraryExW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, GetEnvironmentStringsW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, QueryPerformanceCounter, QueryPerformanceFrequency, WaitForSingleObject, Sleep, GetCurrentProcess, TerminateProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FlsSetValue, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, CreateDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue
                                                            ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                            GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                            No network behavior found

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:05:01:53
                                                            Start date:24/10/2024
                                                            Path:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\HxYqlJEUcq.exe"
                                                            Imagebase:0x7ff6110c0000
                                                            File size:10'283'628 bytes
                                                            MD5 hash:F42027E450D51CE5B48DF6496678BD14
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:1
                                                            Start time:05:01:59
                                                            Start date:24/10/2024
                                                            Path:C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\HxYqlJEUcq.exe"
                                                            Imagebase:0x7ff6110c0000
                                                            File size:10'283'628 bytes
                                                            MD5 hash:F42027E450D51CE5B48DF6496678BD14
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:9.5%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:20.1%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:31
                                                              execution_graph 20208 7ff6110ccb50 20209 7ff6110ccb60 20208->20209 20225 7ff6110d9ba8 20209->20225 20211 7ff6110ccb6c 20231 7ff6110cce48 20211->20231 20213 7ff6110cd12c 7 API calls 20215 7ff6110ccc05 20213->20215 20214 7ff6110ccb84 _RTC_Initialize 20223 7ff6110ccbd9 20214->20223 20236 7ff6110ccff8 20214->20236 20217 7ff6110ccb99 20239 7ff6110d9014 20217->20239 20223->20213 20224 7ff6110ccbf5 20223->20224 20226 7ff6110d9bb9 20225->20226 20227 7ff6110d4f08 memcpy_s 11 API calls 20226->20227 20230 7ff6110d9bc1 20226->20230 20228 7ff6110d9bd0 20227->20228 20229 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 20228->20229 20229->20230 20230->20211 20232 7ff6110cce59 20231->20232 20235 7ff6110cce5e __scrt_release_startup_lock 20231->20235 20233 7ff6110cd12c 7 API calls 20232->20233 20232->20235 20234 7ff6110cced2 20233->20234 20235->20214 20264 7ff6110ccfbc 20236->20264 20238 7ff6110cd001 20238->20217 20240 7ff6110ccba5 20239->20240 20241 7ff6110d9034 20239->20241 20240->20223 20263 7ff6110cd0cc InitializeSListHead 20240->20263 20242 7ff6110d9052 GetModuleFileNameW 20241->20242 20243 7ff6110d903c 20241->20243 20247 7ff6110d907d 20242->20247 20244 7ff6110d4f08 memcpy_s 11 API calls 20243->20244 20245 7ff6110d9041 20244->20245 20246 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 20245->20246 20246->20240 20248 7ff6110d8fb4 11 API calls 20247->20248 20249 7ff6110d90bd 20248->20249 20250 7ff6110d90c5 20249->20250 20254 7ff6110d90dd 20249->20254 20251 7ff6110d4f08 memcpy_s 11 API calls 20250->20251 20252 7ff6110d90ca 20251->20252 20253 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20252->20253 20253->20240 20255 7ff6110d90ff 20254->20255 20257 7ff6110d9144 20254->20257 20258 7ff6110d912b 20254->20258 20256 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20255->20256 20256->20240 20261 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20257->20261 20259 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20258->20259 20260 7ff6110d9134 20259->20260 20262 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20260->20262 20261->20255 20262->20240 20265 7ff6110ccfd6 20264->20265 20267 7ff6110ccfcf 20264->20267 20268 7ff6110da1ec 20265->20268 20267->20238 20271 7ff6110d9e28 20268->20271 20278 7ff6110e02d8 EnterCriticalSection 20271->20278 20279 7ff6110d9d50 20282 7ff6110d9ccc 20279->20282 20289 7ff6110e02d8 EnterCriticalSection 20282->20289 20423 7ff6110dafd0 20424 7ff6110dafd5 20423->20424 20425 7ff6110dafea 20423->20425 20429 7ff6110daff0 20424->20429 20430 7ff6110db032 20429->20430 20431 7ff6110db03a 20429->20431 20432 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20430->20432 20433 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20431->20433 20432->20431 20434 7ff6110db047 20433->20434 20435 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20434->20435 20436 7ff6110db054 20435->20436 20437 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20436->20437 20438 7ff6110db061 20437->20438 20439 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20438->20439 20440 7ff6110db06e 20439->20440 20441 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20440->20441 20442 7ff6110db07b 20441->20442 20443 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20442->20443 20444 7ff6110db088 20443->20444 20445 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20444->20445 20446 7ff6110db095 20445->20446 20447 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20446->20447 20448 7ff6110db0a5 20447->20448 20449 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20448->20449 20450 7ff6110db0b5 20449->20450 20455 7ff6110dae94 20450->20455 20469 7ff6110e02d8 EnterCriticalSection 20455->20469 18869 7ff6110e08c8 18870 7ff6110e08ec 18869->18870 18872 7ff6110e08fc 18869->18872 18871 7ff6110d4f08 memcpy_s 11 API calls 18870->18871 18891 7ff6110e08f1 18871->18891 18873 7ff6110e0bdc 18872->18873 18874 7ff6110e091e 18872->18874 18875 7ff6110d4f08 memcpy_s 11 API calls 18873->18875 18876 7ff6110e093f 18874->18876 19000 7ff6110e0f84 18874->19000 18877 7ff6110e0be1 18875->18877 18880 7ff6110e09b1 18876->18880 18882 7ff6110e0965 18876->18882 18887 7ff6110e09a5 18876->18887 18879 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18877->18879 18879->18891 18884 7ff6110deb98 memcpy_s 11 API calls 18880->18884 18898 7ff6110e0974 18880->18898 18881 7ff6110e0a5e 18890 7ff6110e0a7b 18881->18890 18899 7ff6110e0acd 18881->18899 19015 7ff6110d96c0 18882->19015 18888 7ff6110e09c7 18884->18888 18886 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18886->18891 18887->18881 18887->18898 19021 7ff6110e712c 18887->19021 18892 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18888->18892 18896 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18890->18896 18897 7ff6110e09d5 18892->18897 18893 7ff6110e096f 18895 7ff6110d4f08 memcpy_s 11 API calls 18893->18895 18894 7ff6110e098d 18894->18887 18901 7ff6110e0f84 45 API calls 18894->18901 18895->18898 18900 7ff6110e0a84 18896->18900 18897->18887 18897->18898 18903 7ff6110deb98 memcpy_s 11 API calls 18897->18903 18898->18886 18899->18898 18902 7ff6110e33dc 40 API calls 18899->18902 18911 7ff6110e0a89 18900->18911 19057 7ff6110e33dc 18900->19057 18901->18887 18904 7ff6110e0b0a 18902->18904 18905 7ff6110e09f7 18903->18905 18906 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18904->18906 18908 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18905->18908 18909 7ff6110e0b14 18906->18909 18908->18887 18909->18898 18909->18911 18910 7ff6110e0bd0 18913 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18910->18913 18911->18910 18915 7ff6110deb98 memcpy_s 11 API calls 18911->18915 18912 7ff6110e0ab5 18914 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18912->18914 18913->18891 18914->18911 18916 7ff6110e0b58 18915->18916 18917 7ff6110e0b60 18916->18917 18918 7ff6110e0b69 18916->18918 18919 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18917->18919 18920 7ff6110da4a4 __std_exception_copy 37 API calls 18918->18920 18921 7ff6110e0b67 18919->18921 18922 7ff6110e0b78 18920->18922 18925 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18921->18925 18923 7ff6110e0b80 18922->18923 18924 7ff6110e0c0b 18922->18924 19066 7ff6110e7244 18923->19066 18927 7ff6110da900 _isindst 17 API calls 18924->18927 18925->18891 18929 7ff6110e0c1f 18927->18929 18930 7ff6110e0c48 18929->18930 18938 7ff6110e0c58 18929->18938 18933 7ff6110d4f08 memcpy_s 11 API calls 18930->18933 18931 7ff6110e0ba7 18935 7ff6110d4f08 memcpy_s 11 API calls 18931->18935 18932 7ff6110e0bc8 18934 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18932->18934 18936 7ff6110e0c4d 18933->18936 18934->18910 18937 7ff6110e0bac 18935->18937 18940 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18937->18940 18939 7ff6110e0f3b 18938->18939 18941 7ff6110e0c7a 18938->18941 18942 7ff6110d4f08 memcpy_s 11 API calls 18939->18942 18940->18921 18946 7ff6110e0c97 18941->18946 19085 7ff6110e106c 18941->19085 18943 7ff6110e0f40 18942->18943 18945 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18943->18945 18945->18936 18947 7ff6110e0d0b 18946->18947 18949 7ff6110e0cbf 18946->18949 18956 7ff6110e0cff 18946->18956 18951 7ff6110e0d33 18947->18951 18957 7ff6110deb98 memcpy_s 11 API calls 18947->18957 18967 7ff6110e0cce 18947->18967 18948 7ff6110e0dbe 18961 7ff6110e0ddb 18948->18961 18968 7ff6110e0e2e 18948->18968 19100 7ff6110d96fc 18949->19100 18954 7ff6110deb98 memcpy_s 11 API calls 18951->18954 18951->18956 18951->18967 18962 7ff6110e0d55 18954->18962 18955 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18955->18936 18956->18948 18956->18967 19106 7ff6110e6fec 18956->19106 18958 7ff6110e0d25 18957->18958 18963 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18958->18963 18959 7ff6110e0ce7 18959->18956 18970 7ff6110e106c 45 API calls 18959->18970 18960 7ff6110e0cc9 18964 7ff6110d4f08 memcpy_s 11 API calls 18960->18964 18965 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18961->18965 18966 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18962->18966 18963->18951 18964->18967 18969 7ff6110e0de4 18965->18969 18966->18956 18967->18955 18968->18967 18971 7ff6110e33dc 40 API calls 18968->18971 18974 7ff6110e33dc 40 API calls 18969->18974 18977 7ff6110e0dea 18969->18977 18970->18956 18972 7ff6110e0e6c 18971->18972 18973 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18972->18973 18975 7ff6110e0e76 18973->18975 18978 7ff6110e0e16 18974->18978 18975->18967 18975->18977 18976 7ff6110e0f2f 18979 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18976->18979 18977->18976 18981 7ff6110deb98 memcpy_s 11 API calls 18977->18981 18980 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18978->18980 18979->18936 18980->18977 18982 7ff6110e0ebb 18981->18982 18983 7ff6110e0ec3 18982->18983 18984 7ff6110e0ecc 18982->18984 18985 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18983->18985 18986 7ff6110e0474 37 API calls 18984->18986 18987 7ff6110e0eca 18985->18987 18988 7ff6110e0eda 18986->18988 18991 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18987->18991 18989 7ff6110e0ee2 SetEnvironmentVariableW 18988->18989 18990 7ff6110e0f6f 18988->18990 18992 7ff6110e0f27 18989->18992 18993 7ff6110e0f06 18989->18993 18994 7ff6110da900 _isindst 17 API calls 18990->18994 18991->18936 18995 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18992->18995 18996 7ff6110d4f08 memcpy_s 11 API calls 18993->18996 18997 7ff6110e0f83 18994->18997 18995->18976 18998 7ff6110e0f0b 18996->18998 18999 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18998->18999 18999->18987 19001 7ff6110e0fa1 19000->19001 19002 7ff6110e0fb9 19000->19002 19001->18876 19003 7ff6110deb98 memcpy_s 11 API calls 19002->19003 19004 7ff6110e0fdd 19003->19004 19005 7ff6110e103e 19004->19005 19009 7ff6110deb98 memcpy_s 11 API calls 19004->19009 19010 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19004->19010 19011 7ff6110da4a4 __std_exception_copy 37 API calls 19004->19011 19012 7ff6110e104d 19004->19012 19014 7ff6110e1062 19004->19014 19007 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19005->19007 19006 7ff6110da504 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19008 7ff6110e1068 19006->19008 19007->19001 19009->19004 19010->19004 19011->19004 19013 7ff6110da900 _isindst 17 API calls 19012->19013 19013->19014 19014->19006 19016 7ff6110d96d0 19015->19016 19017 7ff6110d96d9 19015->19017 19016->19017 19130 7ff6110d9198 19016->19130 19017->18893 19017->18894 19022 7ff6110e6254 19021->19022 19023 7ff6110e7139 19021->19023 19024 7ff6110e6261 19022->19024 19032 7ff6110e6297 19022->19032 19025 7ff6110d4f4c 45 API calls 19023->19025 19027 7ff6110d4f08 memcpy_s 11 API calls 19024->19027 19045 7ff6110e6208 19024->19045 19026 7ff6110e716d 19025->19026 19029 7ff6110e7172 19026->19029 19033 7ff6110e7183 19026->19033 19037 7ff6110e719a 19026->19037 19030 7ff6110e626b 19027->19030 19028 7ff6110e62c1 19031 7ff6110d4f08 memcpy_s 11 API calls 19028->19031 19029->18887 19034 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19030->19034 19035 7ff6110e62c6 19031->19035 19032->19028 19036 7ff6110e62e6 19032->19036 19038 7ff6110d4f08 memcpy_s 11 API calls 19033->19038 19039 7ff6110e6276 19034->19039 19040 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19035->19040 19041 7ff6110d4f4c 45 API calls 19036->19041 19048 7ff6110e62d1 19036->19048 19043 7ff6110e71a4 19037->19043 19044 7ff6110e71b6 19037->19044 19042 7ff6110e7188 19038->19042 19039->18887 19040->19048 19041->19048 19049 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19042->19049 19050 7ff6110d4f08 memcpy_s 11 API calls 19043->19050 19046 7ff6110e71de 19044->19046 19047 7ff6110e71c7 19044->19047 19045->18887 19371 7ff6110e8f4c 19046->19371 19362 7ff6110e62a4 19047->19362 19048->18887 19049->19029 19053 7ff6110e71a9 19050->19053 19055 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19053->19055 19055->19029 19056 7ff6110d4f08 memcpy_s 11 API calls 19056->19029 19058 7ff6110e33fe 19057->19058 19059 7ff6110e341b 19057->19059 19058->19059 19060 7ff6110e340c 19058->19060 19061 7ff6110e3425 19059->19061 19411 7ff6110e7c38 19059->19411 19062 7ff6110d4f08 memcpy_s 11 API calls 19060->19062 19418 7ff6110e7c74 19061->19418 19064 7ff6110e3411 memcpy_s 19062->19064 19064->18912 19067 7ff6110d4f4c 45 API calls 19066->19067 19068 7ff6110e72aa 19067->19068 19069 7ff6110e72b8 19068->19069 19430 7ff6110def24 19068->19430 19433 7ff6110d54ac 19069->19433 19073 7ff6110e73a4 19076 7ff6110e73b5 19073->19076 19077 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19073->19077 19074 7ff6110d4f4c 45 API calls 19075 7ff6110e7327 19074->19075 19079 7ff6110def24 5 API calls 19075->19079 19082 7ff6110e7330 19075->19082 19078 7ff6110e0ba3 19076->19078 19080 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19076->19080 19077->19076 19078->18931 19078->18932 19079->19082 19080->19078 19081 7ff6110d54ac 14 API calls 19083 7ff6110e738b 19081->19083 19082->19081 19083->19073 19084 7ff6110e7393 SetEnvironmentVariableW 19083->19084 19084->19073 19086 7ff6110e10ac 19085->19086 19092 7ff6110e108f 19085->19092 19087 7ff6110deb98 memcpy_s 11 API calls 19086->19087 19095 7ff6110e10d0 19087->19095 19088 7ff6110da504 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19090 7ff6110e115a 19088->19090 19089 7ff6110e1131 19091 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19089->19091 19091->19092 19092->18946 19093 7ff6110deb98 memcpy_s 11 API calls 19093->19095 19094 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19094->19095 19095->19089 19095->19093 19095->19094 19096 7ff6110e0474 37 API calls 19095->19096 19097 7ff6110e1140 19095->19097 19099 7ff6110e1154 19095->19099 19096->19095 19098 7ff6110da900 _isindst 17 API calls 19097->19098 19098->19099 19099->19088 19101 7ff6110d9715 19100->19101 19102 7ff6110d970c 19100->19102 19101->18959 19101->18960 19102->19101 19455 7ff6110d920c 19102->19455 19107 7ff6110e6ff9 19106->19107 19110 7ff6110e7026 19106->19110 19108 7ff6110e6ffe 19107->19108 19107->19110 19109 7ff6110d4f08 memcpy_s 11 API calls 19108->19109 19112 7ff6110e7003 19109->19112 19111 7ff6110e706a 19110->19111 19114 7ff6110e7089 19110->19114 19128 7ff6110e705e __crtLCMapStringW 19110->19128 19113 7ff6110d4f08 memcpy_s 11 API calls 19111->19113 19115 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19112->19115 19116 7ff6110e706f 19113->19116 19117 7ff6110e7093 19114->19117 19118 7ff6110e70a5 19114->19118 19119 7ff6110e700e 19115->19119 19121 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19116->19121 19122 7ff6110d4f08 memcpy_s 11 API calls 19117->19122 19120 7ff6110d4f4c 45 API calls 19118->19120 19119->18956 19123 7ff6110e70b2 19120->19123 19121->19128 19124 7ff6110e7098 19122->19124 19123->19128 19502 7ff6110e8b08 19123->19502 19125 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19124->19125 19125->19128 19128->18956 19129 7ff6110d4f08 memcpy_s 11 API calls 19129->19128 19131 7ff6110d91b1 19130->19131 19140 7ff6110d91ad 19130->19140 19153 7ff6110e25f0 19131->19153 19136 7ff6110d91c3 19138 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19136->19138 19137 7ff6110d91cf 19179 7ff6110d927c 19137->19179 19138->19140 19140->19017 19145 7ff6110d94ec 19140->19145 19142 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19143 7ff6110d91f6 19142->19143 19144 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19143->19144 19144->19140 19146 7ff6110d9515 19145->19146 19151 7ff6110d952e 19145->19151 19146->19017 19147 7ff6110e07e8 WideCharToMultiByte 19147->19151 19148 7ff6110deb98 memcpy_s 11 API calls 19148->19151 19149 7ff6110d95be 19150 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19149->19150 19150->19146 19151->19146 19151->19147 19151->19148 19151->19149 19152 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19151->19152 19152->19151 19154 7ff6110e25fd 19153->19154 19155 7ff6110d91b6 19153->19155 19198 7ff6110db224 19154->19198 19159 7ff6110e292c GetEnvironmentStringsW 19155->19159 19160 7ff6110d91bb 19159->19160 19161 7ff6110e295c 19159->19161 19160->19136 19160->19137 19162 7ff6110e07e8 WideCharToMultiByte 19161->19162 19163 7ff6110e29ad 19162->19163 19164 7ff6110e29b4 FreeEnvironmentStringsW 19163->19164 19165 7ff6110dd5fc _fread_nolock 12 API calls 19163->19165 19164->19160 19166 7ff6110e29c7 19165->19166 19167 7ff6110e29cf 19166->19167 19168 7ff6110e29d8 19166->19168 19170 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19167->19170 19169 7ff6110e07e8 WideCharToMultiByte 19168->19169 19171 7ff6110e29fb 19169->19171 19172 7ff6110e29d6 19170->19172 19173 7ff6110e29ff 19171->19173 19174 7ff6110e2a09 19171->19174 19172->19164 19175 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19173->19175 19176 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19174->19176 19177 7ff6110e2a07 FreeEnvironmentStringsW 19175->19177 19176->19177 19177->19160 19180 7ff6110d92a1 19179->19180 19181 7ff6110deb98 memcpy_s 11 API calls 19180->19181 19192 7ff6110d92d7 19181->19192 19182 7ff6110d92df 19183 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19182->19183 19185 7ff6110d91d7 19183->19185 19184 7ff6110d9352 19186 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19184->19186 19185->19142 19186->19185 19187 7ff6110deb98 memcpy_s 11 API calls 19187->19192 19188 7ff6110d9341 19356 7ff6110d94a8 19188->19356 19189 7ff6110da4a4 __std_exception_copy 37 API calls 19189->19192 19192->19182 19192->19184 19192->19187 19192->19188 19192->19189 19193 7ff6110d9377 19192->19193 19196 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19192->19196 19195 7ff6110da900 _isindst 17 API calls 19193->19195 19194 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19194->19182 19197 7ff6110d938a 19195->19197 19196->19192 19199 7ff6110db235 FlsGetValue 19198->19199 19200 7ff6110db250 FlsSetValue 19198->19200 19201 7ff6110db242 19199->19201 19202 7ff6110db24a 19199->19202 19200->19201 19203 7ff6110db25d 19200->19203 19204 7ff6110da504 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19201->19204 19206 7ff6110db248 19201->19206 19202->19200 19205 7ff6110deb98 memcpy_s 11 API calls 19203->19205 19207 7ff6110db2c5 19204->19207 19208 7ff6110db26c 19205->19208 19218 7ff6110e22c4 19206->19218 19209 7ff6110db28a FlsSetValue 19208->19209 19210 7ff6110db27a FlsSetValue 19208->19210 19212 7ff6110db296 FlsSetValue 19209->19212 19213 7ff6110db2a8 19209->19213 19211 7ff6110db283 19210->19211 19214 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19211->19214 19212->19211 19215 7ff6110daef4 memcpy_s 11 API calls 19213->19215 19214->19201 19216 7ff6110db2b0 19215->19216 19217 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19216->19217 19217->19206 19241 7ff6110e2534 19218->19241 19220 7ff6110e22f9 19256 7ff6110e1fc4 19220->19256 19223 7ff6110dd5fc _fread_nolock 12 API calls 19224 7ff6110e2327 19223->19224 19225 7ff6110e232f 19224->19225 19227 7ff6110e233e 19224->19227 19226 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19225->19226 19240 7ff6110e2316 19226->19240 19227->19227 19263 7ff6110e266c 19227->19263 19230 7ff6110e243a 19231 7ff6110d4f08 memcpy_s 11 API calls 19230->19231 19233 7ff6110e243f 19231->19233 19232 7ff6110e2495 19235 7ff6110e24fc 19232->19235 19274 7ff6110e1df4 19232->19274 19236 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19233->19236 19234 7ff6110e2454 19234->19232 19237 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19234->19237 19239 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19235->19239 19236->19240 19237->19232 19239->19240 19240->19155 19242 7ff6110e2557 19241->19242 19243 7ff6110e2561 19242->19243 19289 7ff6110e02d8 EnterCriticalSection 19242->19289 19245 7ff6110e25d3 19243->19245 19248 7ff6110da504 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19243->19248 19245->19220 19249 7ff6110e25eb 19248->19249 19252 7ff6110db224 50 API calls 19249->19252 19255 7ff6110e2642 19249->19255 19253 7ff6110e262c 19252->19253 19254 7ff6110e22c4 65 API calls 19253->19254 19254->19255 19255->19220 19257 7ff6110d4f4c 45 API calls 19256->19257 19258 7ff6110e1fd8 19257->19258 19259 7ff6110e1fe4 GetOEMCP 19258->19259 19260 7ff6110e1ff6 19258->19260 19261 7ff6110e200b 19259->19261 19260->19261 19262 7ff6110e1ffb GetACP 19260->19262 19261->19223 19261->19240 19262->19261 19264 7ff6110e1fc4 47 API calls 19263->19264 19265 7ff6110e2699 19264->19265 19266 7ff6110e27ef 19265->19266 19267 7ff6110e26d6 IsValidCodePage 19265->19267 19273 7ff6110e26f0 memcpy_s 19265->19273 19268 7ff6110cc550 _log10_special 8 API calls 19266->19268 19267->19266 19270 7ff6110e26e7 19267->19270 19269 7ff6110e2431 19268->19269 19269->19230 19269->19234 19271 7ff6110e2716 GetCPInfo 19270->19271 19270->19273 19271->19266 19271->19273 19290 7ff6110e20dc 19273->19290 19355 7ff6110e02d8 EnterCriticalSection 19274->19355 19291 7ff6110e2119 GetCPInfo 19290->19291 19292 7ff6110e220f 19290->19292 19291->19292 19298 7ff6110e212c 19291->19298 19293 7ff6110cc550 _log10_special 8 API calls 19292->19293 19295 7ff6110e22ae 19293->19295 19294 7ff6110e2e40 48 API calls 19296 7ff6110e21a3 19294->19296 19295->19266 19301 7ff6110e7b84 19296->19301 19298->19294 19300 7ff6110e7b84 54 API calls 19300->19292 19302 7ff6110d4f4c 45 API calls 19301->19302 19303 7ff6110e7ba9 19302->19303 19306 7ff6110e7850 19303->19306 19307 7ff6110e7891 19306->19307 19308 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19307->19308 19311 7ff6110e78db 19308->19311 19309 7ff6110e7b59 19310 7ff6110cc550 _log10_special 8 API calls 19309->19310 19312 7ff6110e21d6 19310->19312 19311->19309 19313 7ff6110dd5fc _fread_nolock 12 API calls 19311->19313 19314 7ff6110e7a11 19311->19314 19316 7ff6110e7913 19311->19316 19312->19300 19313->19316 19314->19309 19315 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19314->19315 19315->19309 19316->19314 19317 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19316->19317 19318 7ff6110e7986 19317->19318 19318->19314 19337 7ff6110df0e4 19318->19337 19321 7ff6110e7a22 19323 7ff6110dd5fc _fread_nolock 12 API calls 19321->19323 19325 7ff6110e7af4 19321->19325 19326 7ff6110e7a40 19321->19326 19322 7ff6110e79d1 19322->19314 19324 7ff6110df0e4 __crtLCMapStringW 6 API calls 19322->19324 19323->19326 19324->19314 19325->19314 19327 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19325->19327 19326->19314 19328 7ff6110df0e4 __crtLCMapStringW 6 API calls 19326->19328 19327->19314 19329 7ff6110e7ac0 19328->19329 19329->19325 19330 7ff6110e7ae0 19329->19330 19331 7ff6110e7af6 19329->19331 19332 7ff6110e07e8 WideCharToMultiByte 19330->19332 19333 7ff6110e07e8 WideCharToMultiByte 19331->19333 19334 7ff6110e7aee 19332->19334 19333->19334 19334->19325 19335 7ff6110e7b0e 19334->19335 19335->19314 19336 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19335->19336 19336->19314 19343 7ff6110ded10 19337->19343 19340 7ff6110df12a 19340->19314 19340->19321 19340->19322 19342 7ff6110df193 LCMapStringW 19342->19340 19344 7ff6110ded68 __vcrt_InitializeCriticalSectionEx 19343->19344 19345 7ff6110ded6d 19343->19345 19344->19345 19346 7ff6110ded9d LoadLibraryExW 19344->19346 19347 7ff6110dee92 GetProcAddress 19344->19347 19351 7ff6110dedfc LoadLibraryExW 19344->19351 19345->19340 19352 7ff6110df1d0 19345->19352 19348 7ff6110dee72 19346->19348 19349 7ff6110dedc2 GetLastError 19346->19349 19347->19345 19348->19347 19350 7ff6110dee89 FreeLibrary 19348->19350 19349->19344 19350->19347 19351->19344 19351->19348 19353 7ff6110ded10 __crtLCMapStringW 5 API calls 19352->19353 19354 7ff6110df1fe __crtLCMapStringW 19353->19354 19354->19342 19360 7ff6110d94ad 19356->19360 19361 7ff6110d9349 19356->19361 19357 7ff6110d94d6 19359 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19357->19359 19358 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19358->19360 19359->19361 19360->19357 19360->19358 19361->19194 19363 7ff6110e62c1 19362->19363 19365 7ff6110e62d8 19362->19365 19364 7ff6110d4f08 memcpy_s 11 API calls 19363->19364 19366 7ff6110e62c6 19364->19366 19365->19363 19367 7ff6110e62e6 19365->19367 19368 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19366->19368 19369 7ff6110d4f4c 45 API calls 19367->19369 19370 7ff6110e62d1 19367->19370 19368->19370 19369->19370 19370->19029 19372 7ff6110d4f4c 45 API calls 19371->19372 19373 7ff6110e8f71 19372->19373 19376 7ff6110e8bc8 19373->19376 19379 7ff6110e8c16 19376->19379 19377 7ff6110cc550 _log10_special 8 API calls 19378 7ff6110e7205 19377->19378 19378->19029 19378->19056 19380 7ff6110e8c9d 19379->19380 19382 7ff6110e8c88 GetCPInfo 19379->19382 19385 7ff6110e8ca1 19379->19385 19381 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19380->19381 19380->19385 19383 7ff6110e8d35 19381->19383 19382->19380 19382->19385 19384 7ff6110dd5fc _fread_nolock 12 API calls 19383->19384 19383->19385 19386 7ff6110e8d6c 19383->19386 19384->19386 19385->19377 19386->19385 19387 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19386->19387 19388 7ff6110e8dda 19387->19388 19389 7ff6110e8ebc 19388->19389 19390 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19388->19390 19389->19385 19391 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19389->19391 19392 7ff6110e8e00 19390->19392 19391->19385 19392->19389 19393 7ff6110dd5fc _fread_nolock 12 API calls 19392->19393 19394 7ff6110e8e2d 19392->19394 19393->19394 19394->19389 19395 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19394->19395 19396 7ff6110e8ea4 19395->19396 19397 7ff6110e8ec4 19396->19397 19398 7ff6110e8eaa 19396->19398 19405 7ff6110def68 19397->19405 19398->19389 19401 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19398->19401 19401->19389 19402 7ff6110e8f03 19402->19385 19404 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19402->19404 19403 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19403->19402 19404->19385 19406 7ff6110ded10 __crtLCMapStringW 5 API calls 19405->19406 19407 7ff6110defa6 19406->19407 19408 7ff6110defae 19407->19408 19409 7ff6110df1d0 __crtLCMapStringW 5 API calls 19407->19409 19408->19402 19408->19403 19410 7ff6110df017 CompareStringW 19409->19410 19410->19408 19412 7ff6110e7c41 19411->19412 19413 7ff6110e7c5a HeapSize 19411->19413 19414 7ff6110d4f08 memcpy_s 11 API calls 19412->19414 19415 7ff6110e7c46 19414->19415 19416 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 19415->19416 19417 7ff6110e7c51 19416->19417 19417->19061 19419 7ff6110e7c93 19418->19419 19420 7ff6110e7c89 19418->19420 19422 7ff6110e7c98 19419->19422 19429 7ff6110e7c9f memcpy_s 19419->19429 19421 7ff6110dd5fc _fread_nolock 12 API calls 19420->19421 19427 7ff6110e7c91 19421->19427 19423 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19422->19423 19423->19427 19424 7ff6110e7cd2 HeapReAlloc 19424->19427 19424->19429 19425 7ff6110e7ca5 19426 7ff6110d4f08 memcpy_s 11 API calls 19425->19426 19426->19427 19427->19064 19428 7ff6110e3590 memcpy_s 2 API calls 19428->19429 19429->19424 19429->19425 19429->19428 19431 7ff6110ded10 __crtLCMapStringW 5 API calls 19430->19431 19432 7ff6110def44 19431->19432 19432->19069 19434 7ff6110d54fa 19433->19434 19435 7ff6110d54d6 19433->19435 19436 7ff6110d5554 19434->19436 19439 7ff6110d54ff 19434->19439 19438 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19435->19438 19454 7ff6110d54e5 19435->19454 19437 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19436->19437 19446 7ff6110d5570 19437->19446 19438->19454 19440 7ff6110d5514 19439->19440 19441 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19439->19441 19439->19454 19442 7ff6110dd5fc _fread_nolock 12 API calls 19440->19442 19441->19440 19442->19454 19443 7ff6110d5577 GetLastError 19445 7ff6110d4e7c _fread_nolock 11 API calls 19443->19445 19444 7ff6110d55b2 19448 7ff6110df8a0 _fread_nolock MultiByteToWideChar 19444->19448 19444->19454 19449 7ff6110d5584 19445->19449 19446->19443 19446->19444 19447 7ff6110d55a5 19446->19447 19450 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19446->19450 19451 7ff6110dd5fc _fread_nolock 12 API calls 19447->19451 19452 7ff6110d55f6 19448->19452 19453 7ff6110d4f08 memcpy_s 11 API calls 19449->19453 19450->19447 19451->19444 19452->19443 19452->19454 19453->19454 19454->19073 19454->19074 19456 7ff6110d9225 19455->19456 19457 7ff6110d9221 19455->19457 19476 7ff6110e2a3c GetEnvironmentStringsW 19456->19476 19457->19101 19468 7ff6110d95cc 19457->19468 19460 7ff6110d9232 19463 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19460->19463 19461 7ff6110d923e 19483 7ff6110d938c 19461->19483 19463->19457 19465 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19466 7ff6110d9265 19465->19466 19467 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19466->19467 19467->19457 19469 7ff6110d95ef 19468->19469 19474 7ff6110d9606 19468->19474 19469->19101 19470 7ff6110df8a0 MultiByteToWideChar _fread_nolock 19470->19474 19471 7ff6110deb98 memcpy_s 11 API calls 19471->19474 19472 7ff6110d967a 19473 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19472->19473 19473->19469 19474->19469 19474->19470 19474->19471 19474->19472 19475 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19474->19475 19475->19474 19477 7ff6110d922a 19476->19477 19478 7ff6110e2a60 19476->19478 19477->19460 19477->19461 19479 7ff6110dd5fc _fread_nolock 12 API calls 19478->19479 19480 7ff6110e2a97 memcpy_s 19479->19480 19481 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19480->19481 19482 7ff6110e2ab7 FreeEnvironmentStringsW 19481->19482 19482->19477 19484 7ff6110d93b4 19483->19484 19485 7ff6110deb98 memcpy_s 11 API calls 19484->19485 19497 7ff6110d93ef 19485->19497 19486 7ff6110d93f7 19487 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19486->19487 19488 7ff6110d9246 19487->19488 19488->19465 19489 7ff6110d9471 19490 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19489->19490 19490->19488 19491 7ff6110deb98 memcpy_s 11 API calls 19491->19497 19492 7ff6110d9460 19494 7ff6110d94a8 11 API calls 19492->19494 19493 7ff6110e0474 37 API calls 19493->19497 19495 7ff6110d9468 19494->19495 19498 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19495->19498 19496 7ff6110d9494 19499 7ff6110da900 _isindst 17 API calls 19496->19499 19497->19486 19497->19489 19497->19491 19497->19492 19497->19493 19497->19496 19500 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19497->19500 19498->19486 19501 7ff6110d94a6 19499->19501 19500->19497 19503 7ff6110e8b31 __crtLCMapStringW 19502->19503 19504 7ff6110e70ee 19503->19504 19505 7ff6110def68 6 API calls 19503->19505 19504->19128 19504->19129 19505->19504 15968 7ff6110ccc3c 15989 7ff6110cce0c 15968->15989 15971 7ff6110ccd88 16143 7ff6110cd12c IsProcessorFeaturePresent 15971->16143 15972 7ff6110ccc58 __scrt_acquire_startup_lock 15974 7ff6110ccd92 15972->15974 15981 7ff6110ccc76 __scrt_release_startup_lock 15972->15981 15975 7ff6110cd12c 7 API calls 15974->15975 15977 7ff6110ccd9d __FrameHandler3::FrameUnwindToEmptyState 15975->15977 15976 7ff6110ccc9b 15978 7ff6110ccd21 15995 7ff6110cd274 15978->15995 15980 7ff6110ccd26 15998 7ff6110c1000 15980->15998 15981->15976 15981->15978 16132 7ff6110d9b2c 15981->16132 15987 7ff6110ccd49 15987->15977 16139 7ff6110ccf90 15987->16139 15990 7ff6110cce14 15989->15990 15991 7ff6110cce20 __scrt_dllmain_crt_thread_attach 15990->15991 15992 7ff6110ccc50 15991->15992 15993 7ff6110cce2d 15991->15993 15992->15971 15992->15972 15993->15992 16150 7ff6110cd888 15993->16150 16177 7ff6110ea4d0 15995->16177 15997 7ff6110cd28b GetStartupInfoW 15997->15980 15999 7ff6110c1009 15998->15999 16179 7ff6110d5484 15999->16179 16001 7ff6110c37fb 16186 7ff6110c36b0 16001->16186 16007 7ff6110c383c 16346 7ff6110c1c80 16007->16346 16008 7ff6110c391b 16355 7ff6110c45c0 16008->16355 16012 7ff6110c385b 16258 7ff6110c8830 16012->16258 16015 7ff6110c396a 16378 7ff6110c2710 16015->16378 16018 7ff6110c388e 16025 7ff6110c38bb __std_exception_destroy 16018->16025 16350 7ff6110c89a0 16018->16350 16019 7ff6110c395d 16020 7ff6110c3984 16019->16020 16021 7ff6110c3962 16019->16021 16023 7ff6110c1c80 49 API calls 16020->16023 16374 7ff6110d004c 16021->16374 16026 7ff6110c39a3 16023->16026 16027 7ff6110c8830 14 API calls 16025->16027 16034 7ff6110c38de __std_exception_destroy 16025->16034 16031 7ff6110c1950 115 API calls 16026->16031 16027->16034 16029 7ff6110c3a0b 16030 7ff6110c89a0 40 API calls 16029->16030 16032 7ff6110c3a17 16030->16032 16033 7ff6110c39ce 16031->16033 16035 7ff6110c89a0 40 API calls 16032->16035 16033->16012 16036 7ff6110c39de 16033->16036 16040 7ff6110c390e __std_exception_destroy 16034->16040 16389 7ff6110c8940 16034->16389 16037 7ff6110c3a23 16035->16037 16038 7ff6110c2710 54 API calls 16036->16038 16039 7ff6110c89a0 40 API calls 16037->16039 16046 7ff6110c3808 __std_exception_destroy 16038->16046 16039->16040 16041 7ff6110c8830 14 API calls 16040->16041 16042 7ff6110c3a3b 16041->16042 16043 7ff6110c3b2f 16042->16043 16044 7ff6110c3a60 __std_exception_destroy 16042->16044 16045 7ff6110c2710 54 API calls 16043->16045 16047 7ff6110c8940 40 API calls 16044->16047 16058 7ff6110c3aab 16044->16058 16045->16046 16396 7ff6110cc550 16046->16396 16047->16058 16048 7ff6110c8830 14 API calls 16049 7ff6110c3bf4 __std_exception_destroy 16048->16049 16050 7ff6110c3d41 16049->16050 16051 7ff6110c3c46 16049->16051 16405 7ff6110c44e0 16050->16405 16052 7ff6110c3c50 16051->16052 16053 7ff6110c3cd4 16051->16053 16271 7ff6110c90e0 16052->16271 16056 7ff6110c8830 14 API calls 16053->16056 16060 7ff6110c3ce0 16056->16060 16057 7ff6110c3d4f 16061 7ff6110c3d71 16057->16061 16062 7ff6110c3d65 16057->16062 16058->16048 16063 7ff6110c3c61 16060->16063 16067 7ff6110c3ced 16060->16067 16065 7ff6110c1c80 49 API calls 16061->16065 16408 7ff6110c4630 16062->16408 16069 7ff6110c2710 54 API calls 16063->16069 16076 7ff6110c3cc8 __std_exception_destroy 16065->16076 16070 7ff6110c1c80 49 API calls 16067->16070 16069->16046 16073 7ff6110c3d0b 16070->16073 16071 7ff6110c3dc4 16321 7ff6110c9390 16071->16321 16075 7ff6110c3d12 16073->16075 16073->16076 16074 7ff6110c3dd7 SetDllDirectoryW 16080 7ff6110c3e0a 16074->16080 16122 7ff6110c3e5a 16074->16122 16079 7ff6110c2710 54 API calls 16075->16079 16076->16071 16077 7ff6110c3da7 SetDllDirectoryW LoadLibraryExW 16076->16077 16077->16071 16079->16046 16082 7ff6110c8830 14 API calls 16080->16082 16081 7ff6110c4008 16084 7ff6110c4035 16081->16084 16085 7ff6110c4012 PostMessageW GetMessageW 16081->16085 16089 7ff6110c3e16 __std_exception_destroy 16082->16089 16083 7ff6110c3f1b 16326 7ff6110c33c0 16083->16326 16485 7ff6110c3360 16084->16485 16085->16084 16092 7ff6110c3ef2 16089->16092 16093 7ff6110c3e4e 16089->16093 16096 7ff6110c8940 40 API calls 16092->16096 16093->16122 16411 7ff6110c6dc0 16093->16411 16096->16122 16122->16081 16122->16083 16133 7ff6110d9b43 16132->16133 16134 7ff6110d9b64 16132->16134 16133->15978 18653 7ff6110da3d8 16134->18653 16137 7ff6110cd2b8 GetModuleHandleW 16138 7ff6110cd2c9 16137->16138 16138->15987 16140 7ff6110ccfa1 16139->16140 16141 7ff6110ccd60 16140->16141 16142 7ff6110cd888 7 API calls 16140->16142 16141->15976 16142->16141 16144 7ff6110cd152 _isindst memcpy_s 16143->16144 16145 7ff6110cd171 RtlCaptureContext RtlLookupFunctionEntry 16144->16145 16146 7ff6110cd19a RtlVirtualUnwind 16145->16146 16147 7ff6110cd1d6 memcpy_s 16145->16147 16146->16147 16148 7ff6110cd208 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16147->16148 16149 7ff6110cd256 _isindst 16148->16149 16149->15974 16151 7ff6110cd890 16150->16151 16152 7ff6110cd89a 16150->16152 16156 7ff6110cdc24 16151->16156 16152->15992 16157 7ff6110cdc33 16156->16157 16158 7ff6110cd895 16156->16158 16164 7ff6110cde60 16157->16164 16160 7ff6110cdc90 16158->16160 16161 7ff6110cdcbb 16160->16161 16162 7ff6110cdc9e DeleteCriticalSection 16161->16162 16163 7ff6110cdcbf 16161->16163 16162->16161 16163->16152 16168 7ff6110cdcc8 16164->16168 16169 7ff6110cddb2 TlsFree 16168->16169 16175 7ff6110cdd0c __vcrt_InitializeCriticalSectionEx 16168->16175 16170 7ff6110cdd3a LoadLibraryExW 16172 7ff6110cdd5b GetLastError 16170->16172 16173 7ff6110cddd9 16170->16173 16171 7ff6110cddf9 GetProcAddress 16171->16169 16172->16175 16173->16171 16174 7ff6110cddf0 FreeLibrary 16173->16174 16174->16171 16175->16169 16175->16170 16175->16171 16176 7ff6110cdd7d LoadLibraryExW 16175->16176 16176->16173 16176->16175 16178 7ff6110ea4c0 16177->16178 16178->15997 16178->16178 16182 7ff6110df480 16179->16182 16180 7ff6110df4d3 16498 7ff6110da814 16180->16498 16182->16180 16183 7ff6110df526 16182->16183 16508 7ff6110df358 16183->16508 16185 7ff6110df4fc 16185->16001 16554 7ff6110cc850 16186->16554 16189 7ff6110c3710 16556 7ff6110c9280 FindFirstFileExW 16189->16556 16190 7ff6110c36eb GetLastError 16561 7ff6110c2c50 16190->16561 16194 7ff6110c3723 16576 7ff6110c9300 CreateFileW 16194->16576 16195 7ff6110c377d 16587 7ff6110c9440 16195->16587 16197 7ff6110cc550 _log10_special 8 API calls 16199 7ff6110c37b5 16197->16199 16199->16046 16208 7ff6110c1950 16199->16208 16201 7ff6110c378b 16204 7ff6110c3706 16201->16204 16206 7ff6110c2810 49 API calls 16201->16206 16202 7ff6110c3734 16579 7ff6110c2810 16202->16579 16203 7ff6110c374c __vcrt_InitializeCriticalSectionEx 16203->16195 16204->16197 16206->16204 16209 7ff6110c45c0 108 API calls 16208->16209 16210 7ff6110c1985 16209->16210 16211 7ff6110c1c43 16210->16211 16213 7ff6110c7f90 83 API calls 16210->16213 16212 7ff6110cc550 _log10_special 8 API calls 16211->16212 16214 7ff6110c1c5e 16212->16214 16215 7ff6110c19cb 16213->16215 16214->16007 16214->16008 16257 7ff6110c1a03 16215->16257 16985 7ff6110d06d4 16215->16985 16217 7ff6110d004c 74 API calls 16217->16211 16218 7ff6110c19e5 16219 7ff6110c19e9 16218->16219 16220 7ff6110c1a08 16218->16220 16221 7ff6110d4f08 memcpy_s 11 API calls 16219->16221 16989 7ff6110d039c 16220->16989 16223 7ff6110c19ee 16221->16223 16992 7ff6110c2910 16223->16992 16226 7ff6110c1a45 16231 7ff6110c1a5c 16226->16231 16232 7ff6110c1a7b 16226->16232 16227 7ff6110c1a26 16228 7ff6110d4f08 memcpy_s 11 API calls 16227->16228 16229 7ff6110c1a2b 16228->16229 16230 7ff6110c2910 54 API calls 16229->16230 16230->16257 16233 7ff6110d4f08 memcpy_s 11 API calls 16231->16233 16234 7ff6110c1c80 49 API calls 16232->16234 16235 7ff6110c1a61 16233->16235 16236 7ff6110c1a92 16234->16236 16237 7ff6110c2910 54 API calls 16235->16237 16238 7ff6110c1c80 49 API calls 16236->16238 16237->16257 16239 7ff6110c1add 16238->16239 16240 7ff6110d06d4 73 API calls 16239->16240 16241 7ff6110c1b01 16240->16241 16242 7ff6110c1b35 16241->16242 16243 7ff6110c1b16 16241->16243 16244 7ff6110d039c _fread_nolock 53 API calls 16242->16244 16245 7ff6110d4f08 memcpy_s 11 API calls 16243->16245 16246 7ff6110c1b4a 16244->16246 16247 7ff6110c1b1b 16245->16247 16249 7ff6110c1b50 16246->16249 16250 7ff6110c1b6f 16246->16250 16248 7ff6110c2910 54 API calls 16247->16248 16248->16257 16251 7ff6110d4f08 memcpy_s 11 API calls 16249->16251 17007 7ff6110d0110 16250->17007 16253 7ff6110c1b55 16251->16253 16255 7ff6110c2910 54 API calls 16253->16255 16255->16257 16256 7ff6110c2710 54 API calls 16256->16257 16257->16217 16259 7ff6110c883a 16258->16259 16260 7ff6110c9390 2 API calls 16259->16260 16261 7ff6110c8859 GetEnvironmentVariableW 16260->16261 16262 7ff6110c88c2 16261->16262 16263 7ff6110c8876 ExpandEnvironmentStringsW 16261->16263 16264 7ff6110cc550 _log10_special 8 API calls 16262->16264 16263->16262 16265 7ff6110c8898 16263->16265 16267 7ff6110c88d4 16264->16267 16266 7ff6110c9440 2 API calls 16265->16266 16268 7ff6110c88aa 16266->16268 16267->16018 16269 7ff6110cc550 _log10_special 8 API calls 16268->16269 16270 7ff6110c88ba 16269->16270 16270->16018 16272 7ff6110c90f5 16271->16272 17225 7ff6110c8570 GetCurrentProcess OpenProcessToken 16272->17225 16275 7ff6110c8570 7 API calls 16276 7ff6110c9121 16275->16276 16277 7ff6110c9154 16276->16277 16278 7ff6110c913a 16276->16278 16280 7ff6110c26b0 48 API calls 16277->16280 16279 7ff6110c26b0 48 API calls 16278->16279 16281 7ff6110c9152 16279->16281 16282 7ff6110c9167 LocalFree LocalFree 16280->16282 16281->16282 16283 7ff6110c9183 16282->16283 16285 7ff6110c918f 16282->16285 17235 7ff6110c2b50 16283->17235 16286 7ff6110cc550 _log10_special 8 API calls 16285->16286 16287 7ff6110c3c55 16286->16287 16287->16063 16288 7ff6110c8660 16287->16288 16289 7ff6110c8678 16288->16289 16290 7ff6110c86fa GetTempPathW GetCurrentProcessId 16289->16290 16291 7ff6110c869c 16289->16291 17244 7ff6110c25c0 16290->17244 16293 7ff6110c8830 14 API calls 16291->16293 16294 7ff6110c86a8 16293->16294 17251 7ff6110c81d0 16294->17251 16301 7ff6110c8728 __std_exception_destroy 16307 7ff6110c8765 __std_exception_destroy 16301->16307 17248 7ff6110d8b68 16301->17248 16306 7ff6110cc550 _log10_special 8 API calls 16308 7ff6110c3cbb 16306->16308 16312 7ff6110c9390 2 API calls 16307->16312 16320 7ff6110c87d4 __std_exception_destroy 16307->16320 16308->16063 16308->16076 16313 7ff6110c87b1 16312->16313 16314 7ff6110c87b6 16313->16314 16315 7ff6110c87e9 16313->16315 16316 7ff6110c9390 2 API calls 16314->16316 16317 7ff6110d8238 38 API calls 16315->16317 16317->16320 16320->16306 16322 7ff6110c93b2 MultiByteToWideChar 16321->16322 16323 7ff6110c93d6 16321->16323 16322->16323 16325 7ff6110c93ec __std_exception_destroy 16322->16325 16324 7ff6110c93f3 MultiByteToWideChar 16323->16324 16323->16325 16324->16325 16325->16074 16327 7ff6110c33ce memcpy_s 16326->16327 16328 7ff6110c35c7 16327->16328 16332 7ff6110c1c80 49 API calls 16327->16332 16333 7ff6110c35e2 16327->16333 16338 7ff6110c35c9 16327->16338 16339 7ff6110c2a50 54 API calls 16327->16339 16343 7ff6110c35d0 16327->16343 17540 7ff6110c4560 16327->17540 17546 7ff6110c7e20 16327->17546 17557 7ff6110c1600 16327->17557 17605 7ff6110c7120 16327->17605 17609 7ff6110c4190 16327->17609 17653 7ff6110c4450 16327->17653 16329 7ff6110cc550 _log10_special 8 API calls 16328->16329 16330 7ff6110c3664 16329->16330 16330->16046 16345 7ff6110c90c0 LocalFree 16330->16345 16332->16327 16335 7ff6110c2710 54 API calls 16333->16335 16335->16328 16340 7ff6110c2710 54 API calls 16338->16340 16339->16327 16340->16328 16344 7ff6110c2710 54 API calls 16343->16344 16344->16328 16347 7ff6110c1ca5 16346->16347 16348 7ff6110d4984 49 API calls 16347->16348 16349 7ff6110c1cc8 16348->16349 16349->16012 16351 7ff6110c9390 2 API calls 16350->16351 16352 7ff6110c89b4 16351->16352 16353 7ff6110d8238 38 API calls 16352->16353 16354 7ff6110c89c6 __std_exception_destroy 16353->16354 16354->16025 16356 7ff6110c45cc 16355->16356 16357 7ff6110c9390 2 API calls 16356->16357 16358 7ff6110c45f4 16357->16358 16359 7ff6110c9390 2 API calls 16358->16359 16360 7ff6110c4607 16359->16360 17836 7ff6110d5f94 16360->17836 16363 7ff6110cc550 _log10_special 8 API calls 16364 7ff6110c392b 16363->16364 16364->16015 16365 7ff6110c7f90 16364->16365 16366 7ff6110c7fb4 16365->16366 16367 7ff6110c808b __std_exception_destroy 16366->16367 16368 7ff6110d06d4 73 API calls 16366->16368 16367->16019 16369 7ff6110c7fd0 16368->16369 16369->16367 18227 7ff6110d78c8 16369->18227 16371 7ff6110c7fe5 16371->16367 16372 7ff6110d06d4 73 API calls 16371->16372 16373 7ff6110d039c _fread_nolock 53 API calls 16371->16373 16372->16371 16373->16371 16375 7ff6110d007c 16374->16375 18242 7ff6110cfe28 16375->18242 16377 7ff6110d0095 16377->16015 16379 7ff6110cc850 16378->16379 16380 7ff6110c2734 GetCurrentProcessId 16379->16380 16381 7ff6110c1c80 49 API calls 16380->16381 16382 7ff6110c2787 16381->16382 16383 7ff6110d4984 49 API calls 16382->16383 16384 7ff6110c27cf 16383->16384 16385 7ff6110c2620 12 API calls 16384->16385 16386 7ff6110c27f1 16385->16386 16387 7ff6110cc550 _log10_special 8 API calls 16386->16387 16388 7ff6110c2801 16387->16388 16388->16046 16390 7ff6110c9390 2 API calls 16389->16390 16391 7ff6110c895c 16390->16391 16392 7ff6110c9390 2 API calls 16391->16392 16393 7ff6110c896c 16392->16393 16394 7ff6110d8238 38 API calls 16393->16394 16395 7ff6110c897a __std_exception_destroy 16394->16395 16395->16029 16397 7ff6110cc559 16396->16397 16398 7ff6110c3ca7 16397->16398 16399 7ff6110cc8e0 IsProcessorFeaturePresent 16397->16399 16398->16137 16400 7ff6110cc8f8 16399->16400 18253 7ff6110ccad8 RtlCaptureContext 16400->18253 16406 7ff6110c1c80 49 API calls 16405->16406 16407 7ff6110c44fd 16406->16407 16407->16057 16409 7ff6110c1c80 49 API calls 16408->16409 16410 7ff6110c4660 16409->16410 16410->16076 16412 7ff6110c6dd5 16411->16412 16413 7ff6110c3e6c 16412->16413 16414 7ff6110d4f08 memcpy_s 11 API calls 16412->16414 16417 7ff6110c7340 16413->16417 16415 7ff6110c6de2 16414->16415 16416 7ff6110c2910 54 API calls 16415->16416 16416->16413 18258 7ff6110c1470 16417->18258 16419 7ff6110c7368 16420 7ff6110c4630 49 API calls 16419->16420 16430 7ff6110c74b9 __std_exception_destroy 16419->16430 18364 7ff6110c6360 16485->18364 16488 7ff6110c3399 16494 7ff6110c3670 16488->16494 16515 7ff6110da55c 16498->16515 16501 7ff6110da84f 16501->16185 16553 7ff6110d546c EnterCriticalSection 16508->16553 16516 7ff6110da5b3 16515->16516 16517 7ff6110da578 GetLastError 16515->16517 16516->16501 16521 7ff6110da5c8 16516->16521 16518 7ff6110da588 16517->16518 16528 7ff6110db390 16518->16528 16522 7ff6110da5e4 GetLastError SetLastError 16521->16522 16523 7ff6110da5fc 16521->16523 16522->16523 16523->16501 16524 7ff6110da900 IsProcessorFeaturePresent 16523->16524 16525 7ff6110da913 16524->16525 16545 7ff6110da614 16525->16545 16529 7ff6110db3af FlsGetValue 16528->16529 16530 7ff6110db3ca FlsSetValue 16528->16530 16531 7ff6110db3c4 16529->16531 16533 7ff6110da5a3 SetLastError 16529->16533 16532 7ff6110db3d7 16530->16532 16530->16533 16531->16530 16534 7ff6110deb98 memcpy_s 11 API calls 16532->16534 16533->16516 16535 7ff6110db3e6 16534->16535 16536 7ff6110db404 FlsSetValue 16535->16536 16537 7ff6110db3f4 FlsSetValue 16535->16537 16539 7ff6110db422 16536->16539 16540 7ff6110db410 FlsSetValue 16536->16540 16538 7ff6110db3fd 16537->16538 16542 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16538->16542 16541 7ff6110daef4 memcpy_s 11 API calls 16539->16541 16540->16538 16543 7ff6110db42a 16541->16543 16542->16533 16544 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16543->16544 16544->16533 16546 7ff6110da64e _isindst memcpy_s 16545->16546 16547 7ff6110da676 RtlCaptureContext RtlLookupFunctionEntry 16546->16547 16548 7ff6110da6b0 RtlVirtualUnwind 16547->16548 16549 7ff6110da6e6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16547->16549 16548->16549 16550 7ff6110da738 _isindst 16549->16550 16551 7ff6110cc550 _log10_special 8 API calls 16550->16551 16552 7ff6110da757 GetCurrentProcess TerminateProcess 16551->16552 16555 7ff6110c36bc GetModuleFileNameW 16554->16555 16555->16189 16555->16190 16557 7ff6110c92bf FindClose 16556->16557 16558 7ff6110c92d2 16556->16558 16557->16558 16559 7ff6110cc550 _log10_special 8 API calls 16558->16559 16560 7ff6110c371a 16559->16560 16560->16194 16560->16195 16562 7ff6110cc850 16561->16562 16563 7ff6110c2c70 GetCurrentProcessId 16562->16563 16592 7ff6110c26b0 16563->16592 16565 7ff6110c2cb9 16596 7ff6110d4bd8 16565->16596 16568 7ff6110c26b0 48 API calls 16569 7ff6110c2d34 FormatMessageW 16568->16569 16571 7ff6110c2d7f MessageBoxW 16569->16571 16572 7ff6110c2d6d 16569->16572 16574 7ff6110cc550 _log10_special 8 API calls 16571->16574 16573 7ff6110c26b0 48 API calls 16572->16573 16573->16571 16575 7ff6110c2daf 16574->16575 16575->16204 16577 7ff6110c9340 GetFinalPathNameByHandleW CloseHandle 16576->16577 16578 7ff6110c3730 16576->16578 16577->16578 16578->16202 16578->16203 16580 7ff6110c2834 16579->16580 16581 7ff6110c26b0 48 API calls 16580->16581 16582 7ff6110c2887 16581->16582 16583 7ff6110d4bd8 48 API calls 16582->16583 16584 7ff6110c28d0 MessageBoxW 16583->16584 16585 7ff6110cc550 _log10_special 8 API calls 16584->16585 16586 7ff6110c2900 16585->16586 16586->16204 16588 7ff6110c946a WideCharToMultiByte 16587->16588 16590 7ff6110c9495 16587->16590 16588->16590 16591 7ff6110c94ab __std_exception_destroy 16588->16591 16589 7ff6110c94b2 WideCharToMultiByte 16589->16591 16590->16589 16590->16591 16591->16201 16593 7ff6110c26d5 16592->16593 16594 7ff6110d4bd8 48 API calls 16593->16594 16595 7ff6110c26f8 16594->16595 16595->16565 16598 7ff6110d4c32 16596->16598 16597 7ff6110d4c57 16599 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16597->16599 16598->16597 16600 7ff6110d4c93 16598->16600 16602 7ff6110d4c81 16599->16602 16614 7ff6110d2f90 16600->16614 16604 7ff6110cc550 _log10_special 8 API calls 16602->16604 16603 7ff6110d4d74 16605 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16603->16605 16606 7ff6110c2d04 16604->16606 16605->16602 16606->16568 16608 7ff6110d4d9a 16608->16603 16610 7ff6110d4da4 16608->16610 16609 7ff6110d4d49 16611 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16609->16611 16613 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16610->16613 16611->16602 16612 7ff6110d4d40 16612->16603 16612->16609 16613->16602 16615 7ff6110d2fce 16614->16615 16616 7ff6110d2fbe 16614->16616 16617 7ff6110d2fd7 16615->16617 16622 7ff6110d3005 16615->16622 16618 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16616->16618 16619 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16617->16619 16620 7ff6110d2ffd 16618->16620 16619->16620 16620->16603 16620->16608 16620->16609 16620->16612 16622->16616 16622->16620 16625 7ff6110d39a4 16622->16625 16658 7ff6110d33f0 16622->16658 16695 7ff6110d2b80 16622->16695 16626 7ff6110d39e6 16625->16626 16627 7ff6110d3a57 16625->16627 16630 7ff6110d3a81 16626->16630 16631 7ff6110d39ec 16626->16631 16628 7ff6110d3ab0 16627->16628 16629 7ff6110d3a5c 16627->16629 16637 7ff6110d3aba 16628->16637 16638 7ff6110d3ac7 16628->16638 16643 7ff6110d3abf 16628->16643 16632 7ff6110d3a5e 16629->16632 16633 7ff6110d3a91 16629->16633 16718 7ff6110d1d54 16630->16718 16634 7ff6110d3a20 16631->16634 16635 7ff6110d39f1 16631->16635 16636 7ff6110d3a00 16632->16636 16646 7ff6110d3a6d 16632->16646 16725 7ff6110d1944 16633->16725 16640 7ff6110d39f7 16634->16640 16634->16643 16635->16638 16635->16640 16656 7ff6110d3af0 16636->16656 16698 7ff6110d4158 16636->16698 16637->16630 16637->16643 16732 7ff6110d46ac 16638->16732 16640->16636 16645 7ff6110d3a32 16640->16645 16654 7ff6110d3a1b 16640->16654 16643->16656 16736 7ff6110d2164 16643->16736 16645->16656 16708 7ff6110d4494 16645->16708 16646->16630 16648 7ff6110d3a72 16646->16648 16648->16656 16714 7ff6110d4558 16648->16714 16650 7ff6110cc550 _log10_special 8 API calls 16651 7ff6110d3dea 16650->16651 16651->16622 16654->16656 16657 7ff6110d3cdc 16654->16657 16743 7ff6110d47c0 16654->16743 16656->16650 16657->16656 16749 7ff6110dea08 16657->16749 16659 7ff6110d3414 16658->16659 16660 7ff6110d33fe 16658->16660 16661 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16659->16661 16662 7ff6110d3454 16659->16662 16660->16662 16663 7ff6110d39e6 16660->16663 16664 7ff6110d3a57 16660->16664 16661->16662 16662->16622 16667 7ff6110d3a81 16663->16667 16668 7ff6110d39ec 16663->16668 16665 7ff6110d3ab0 16664->16665 16666 7ff6110d3a5c 16664->16666 16674 7ff6110d3aba 16665->16674 16675 7ff6110d3ac7 16665->16675 16680 7ff6110d3abf 16665->16680 16669 7ff6110d3a5e 16666->16669 16670 7ff6110d3a91 16666->16670 16676 7ff6110d1d54 38 API calls 16667->16676 16671 7ff6110d3a20 16668->16671 16672 7ff6110d39f1 16668->16672 16673 7ff6110d3a00 16669->16673 16682 7ff6110d3a6d 16669->16682 16678 7ff6110d1944 38 API calls 16670->16678 16677 7ff6110d39f7 16671->16677 16671->16680 16672->16675 16672->16677 16679 7ff6110d4158 47 API calls 16673->16679 16693 7ff6110d3af0 16673->16693 16674->16667 16674->16680 16681 7ff6110d46ac 45 API calls 16675->16681 16690 7ff6110d3a1b 16676->16690 16677->16673 16683 7ff6110d3a32 16677->16683 16677->16690 16678->16690 16679->16690 16684 7ff6110d2164 38 API calls 16680->16684 16680->16693 16681->16690 16682->16667 16685 7ff6110d3a72 16682->16685 16686 7ff6110d4494 46 API calls 16683->16686 16683->16693 16684->16690 16688 7ff6110d4558 37 API calls 16685->16688 16685->16693 16686->16690 16687 7ff6110cc550 _log10_special 8 API calls 16689 7ff6110d3dea 16687->16689 16688->16690 16689->16622 16691 7ff6110d47c0 45 API calls 16690->16691 16690->16693 16694 7ff6110d3cdc 16690->16694 16691->16694 16692 7ff6110dea08 46 API calls 16692->16694 16693->16687 16694->16692 16694->16693 16968 7ff6110d0fc8 16695->16968 16699 7ff6110d417e 16698->16699 16761 7ff6110d0b80 16699->16761 16704 7ff6110d47c0 45 API calls 16706 7ff6110d42c3 16704->16706 16705 7ff6110d47c0 45 API calls 16707 7ff6110d4351 16705->16707 16706->16705 16706->16706 16706->16707 16707->16654 16710 7ff6110d44c9 16708->16710 16709 7ff6110d450e 16709->16654 16710->16709 16711 7ff6110d44e7 16710->16711 16713 7ff6110d47c0 45 API calls 16710->16713 16712 7ff6110dea08 46 API calls 16711->16712 16712->16709 16713->16711 16715 7ff6110d4579 16714->16715 16716 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16715->16716 16717 7ff6110d45aa 16715->16717 16716->16717 16717->16654 16719 7ff6110d1d87 16718->16719 16720 7ff6110d1db6 16719->16720 16722 7ff6110d1e73 16719->16722 16724 7ff6110d1df3 16720->16724 16900 7ff6110d0c28 16720->16900 16723 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16722->16723 16723->16724 16724->16654 16726 7ff6110d1977 16725->16726 16727 7ff6110d19a6 16726->16727 16729 7ff6110d1a63 16726->16729 16728 7ff6110d0c28 12 API calls 16727->16728 16731 7ff6110d19e3 16727->16731 16728->16731 16730 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16729->16730 16730->16731 16731->16654 16733 7ff6110d46ef 16732->16733 16735 7ff6110d46f3 __crtLCMapStringW 16733->16735 16908 7ff6110d4748 16733->16908 16735->16654 16737 7ff6110d2197 16736->16737 16738 7ff6110d21c6 16737->16738 16740 7ff6110d2283 16737->16740 16739 7ff6110d0c28 12 API calls 16738->16739 16742 7ff6110d2203 16738->16742 16739->16742 16741 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16740->16741 16741->16742 16742->16654 16744 7ff6110d47d7 16743->16744 16912 7ff6110dd9b8 16744->16912 16750 7ff6110dea39 16749->16750 16751 7ff6110dea47 16749->16751 16750->16751 16752 7ff6110dea67 16750->16752 16753 7ff6110d47c0 45 API calls 16750->16753 16751->16657 16754 7ff6110dea9f 16752->16754 16755 7ff6110dea78 16752->16755 16753->16752 16754->16751 16757 7ff6110deb2a 16754->16757 16758 7ff6110deac9 16754->16758 16958 7ff6110e00a0 16755->16958 16759 7ff6110df8a0 _fread_nolock MultiByteToWideChar 16757->16759 16758->16751 16961 7ff6110df8a0 16758->16961 16759->16751 16762 7ff6110d0bb7 16761->16762 16768 7ff6110d0ba6 16761->16768 16763 7ff6110dd5fc _fread_nolock 12 API calls 16762->16763 16762->16768 16764 7ff6110d0be4 16763->16764 16765 7ff6110d0bf8 16764->16765 16766 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16764->16766 16767 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16765->16767 16766->16765 16767->16768 16769 7ff6110de570 16768->16769 16770 7ff6110de5c0 16769->16770 16771 7ff6110de58d 16769->16771 16770->16771 16773 7ff6110de5f2 16770->16773 16772 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16771->16772 16782 7ff6110d42a1 16772->16782 16776 7ff6110de705 16773->16776 16786 7ff6110de63a 16773->16786 16774 7ff6110de7f7 16824 7ff6110dda5c 16774->16824 16776->16774 16777 7ff6110de7bd 16776->16777 16778 7ff6110de78c 16776->16778 16780 7ff6110de74f 16776->16780 16783 7ff6110de745 16776->16783 16817 7ff6110dddf4 16777->16817 16810 7ff6110de0d4 16778->16810 16800 7ff6110de304 16780->16800 16782->16704 16782->16706 16783->16777 16785 7ff6110de74a 16783->16785 16785->16778 16785->16780 16786->16782 16791 7ff6110da4a4 16786->16791 16789 7ff6110da900 _isindst 17 API calls 16790 7ff6110de854 16789->16790 16792 7ff6110da4b1 16791->16792 16793 7ff6110da4bb 16791->16793 16792->16793 16797 7ff6110da4d6 16792->16797 16794 7ff6110d4f08 memcpy_s 11 API calls 16793->16794 16799 7ff6110da4c2 16794->16799 16796 7ff6110da4ce 16796->16782 16796->16789 16797->16796 16798 7ff6110d4f08 memcpy_s 11 API calls 16797->16798 16798->16799 16833 7ff6110da8e0 16799->16833 16836 7ff6110e40ac 16800->16836 16804 7ff6110de3ac 16805 7ff6110de401 16804->16805 16806 7ff6110de3cc 16804->16806 16809 7ff6110de3b0 16804->16809 16889 7ff6110ddef0 16805->16889 16885 7ff6110de1ac 16806->16885 16809->16782 16811 7ff6110e40ac 38 API calls 16810->16811 16812 7ff6110de11e 16811->16812 16813 7ff6110e3af4 37 API calls 16812->16813 16814 7ff6110de16e 16813->16814 16815 7ff6110de172 16814->16815 16816 7ff6110de1ac 45 API calls 16814->16816 16815->16782 16816->16815 16818 7ff6110e40ac 38 API calls 16817->16818 16819 7ff6110dde3f 16818->16819 16820 7ff6110e3af4 37 API calls 16819->16820 16821 7ff6110dde97 16820->16821 16822 7ff6110dde9b 16821->16822 16823 7ff6110ddef0 45 API calls 16821->16823 16822->16782 16823->16822 16825 7ff6110ddad4 16824->16825 16826 7ff6110ddaa1 16824->16826 16828 7ff6110ddaec 16825->16828 16830 7ff6110ddb6d 16825->16830 16827 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16826->16827 16832 7ff6110ddacd memcpy_s 16827->16832 16829 7ff6110dddf4 46 API calls 16828->16829 16829->16832 16831 7ff6110d47c0 45 API calls 16830->16831 16830->16832 16831->16832 16832->16782 16834 7ff6110da778 _invalid_parameter_noinfo 37 API calls 16833->16834 16835 7ff6110da8f9 16834->16835 16835->16796 16837 7ff6110e40ff fegetenv 16836->16837 16838 7ff6110e7e2c 37 API calls 16837->16838 16841 7ff6110e4152 16838->16841 16839 7ff6110e417f 16843 7ff6110da4a4 __std_exception_copy 37 API calls 16839->16843 16840 7ff6110e4242 16842 7ff6110e7e2c 37 API calls 16840->16842 16841->16840 16846 7ff6110e421c 16841->16846 16847 7ff6110e416d 16841->16847 16844 7ff6110e426c 16842->16844 16845 7ff6110e41fd 16843->16845 16848 7ff6110e7e2c 37 API calls 16844->16848 16849 7ff6110e5324 16845->16849 16855 7ff6110e4205 16845->16855 16850 7ff6110da4a4 __std_exception_copy 37 API calls 16846->16850 16847->16839 16847->16840 16851 7ff6110e427d 16848->16851 16853 7ff6110da900 _isindst 17 API calls 16849->16853 16850->16845 16852 7ff6110e8020 20 API calls 16851->16852 16863 7ff6110e42e6 memcpy_s 16852->16863 16854 7ff6110e5339 16853->16854 16856 7ff6110cc550 _log10_special 8 API calls 16855->16856 16857 7ff6110de351 16856->16857 16881 7ff6110e3af4 16857->16881 16858 7ff6110e468f memcpy_s 16859 7ff6110e49cf 16860 7ff6110e3c10 37 API calls 16859->16860 16867 7ff6110e50e7 16860->16867 16861 7ff6110e497b 16861->16859 16864 7ff6110e533c memcpy_s 37 API calls 16861->16864 16862 7ff6110e4327 memcpy_s 16875 7ff6110e4c6b memcpy_s 16862->16875 16879 7ff6110e4783 memcpy_s 16862->16879 16863->16858 16863->16862 16865 7ff6110d4f08 memcpy_s 11 API calls 16863->16865 16864->16859 16866 7ff6110e4760 16865->16866 16868 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 16866->16868 16869 7ff6110e533c memcpy_s 37 API calls 16867->16869 16874 7ff6110e5142 16867->16874 16868->16862 16869->16874 16870 7ff6110e52c8 16871 7ff6110e7e2c 37 API calls 16870->16871 16871->16855 16872 7ff6110d4f08 11 API calls memcpy_s 16872->16875 16873 7ff6110d4f08 11 API calls memcpy_s 16873->16879 16874->16870 16876 7ff6110e3c10 37 API calls 16874->16876 16880 7ff6110e533c memcpy_s 37 API calls 16874->16880 16875->16859 16875->16861 16875->16872 16877 7ff6110da8e0 37 API calls _invalid_parameter_noinfo 16875->16877 16876->16874 16877->16875 16878 7ff6110da8e0 37 API calls _invalid_parameter_noinfo 16878->16879 16879->16861 16879->16873 16879->16878 16880->16874 16882 7ff6110e3b13 16881->16882 16883 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16882->16883 16884 7ff6110e3b3e memcpy_s 16882->16884 16883->16884 16884->16804 16886 7ff6110de1d8 memcpy_s 16885->16886 16887 7ff6110d47c0 45 API calls 16886->16887 16888 7ff6110de292 memcpy_s 16886->16888 16887->16888 16888->16809 16890 7ff6110ddf2b 16889->16890 16893 7ff6110ddf78 memcpy_s 16889->16893 16891 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16890->16891 16892 7ff6110ddf57 16891->16892 16892->16809 16894 7ff6110ddfe3 16893->16894 16896 7ff6110d47c0 45 API calls 16893->16896 16895 7ff6110da4a4 __std_exception_copy 37 API calls 16894->16895 16899 7ff6110de025 memcpy_s 16895->16899 16896->16894 16897 7ff6110da900 _isindst 17 API calls 16898 7ff6110de0d0 16897->16898 16899->16897 16901 7ff6110d0c5f 16900->16901 16902 7ff6110d0c4e 16900->16902 16901->16902 16903 7ff6110dd5fc _fread_nolock 12 API calls 16901->16903 16902->16724 16904 7ff6110d0c90 16903->16904 16905 7ff6110d0ca4 16904->16905 16906 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16904->16906 16907 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16905->16907 16906->16905 16907->16902 16909 7ff6110d476e 16908->16909 16910 7ff6110d4766 16908->16910 16909->16735 16911 7ff6110d47c0 45 API calls 16910->16911 16911->16909 16913 7ff6110dd9d1 16912->16913 16914 7ff6110d47ff 16912->16914 16913->16914 16920 7ff6110e3304 16913->16920 16916 7ff6110dda24 16914->16916 16917 7ff6110d480f 16916->16917 16918 7ff6110dda3d 16916->16918 16917->16657 16918->16917 16955 7ff6110e2650 16918->16955 16932 7ff6110db150 GetLastError 16920->16932 16923 7ff6110e335e 16923->16914 16933 7ff6110db174 FlsGetValue 16932->16933 16934 7ff6110db191 FlsSetValue 16932->16934 16935 7ff6110db18b 16933->16935 16951 7ff6110db181 16933->16951 16936 7ff6110db1a3 16934->16936 16934->16951 16935->16934 16938 7ff6110deb98 memcpy_s 11 API calls 16936->16938 16937 7ff6110db1fd SetLastError 16939 7ff6110db20a 16937->16939 16940 7ff6110db21d 16937->16940 16941 7ff6110db1b2 16938->16941 16939->16923 16954 7ff6110e02d8 EnterCriticalSection 16939->16954 16942 7ff6110da504 __FrameHandler3::FrameUnwindToEmptyState 38 API calls 16940->16942 16943 7ff6110db1d0 FlsSetValue 16941->16943 16944 7ff6110db1c0 FlsSetValue 16941->16944 16947 7ff6110db222 16942->16947 16945 7ff6110db1ee 16943->16945 16946 7ff6110db1dc FlsSetValue 16943->16946 16948 7ff6110db1c9 16944->16948 16949 7ff6110daef4 memcpy_s 11 API calls 16945->16949 16946->16948 16950 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16948->16950 16952 7ff6110db1f6 16949->16952 16950->16951 16951->16937 16953 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16952->16953 16953->16937 16956 7ff6110db150 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16955->16956 16957 7ff6110e2659 16956->16957 16964 7ff6110e6d88 16958->16964 16963 7ff6110df8a9 MultiByteToWideChar 16961->16963 16967 7ff6110e6dec 16964->16967 16965 7ff6110cc550 _log10_special 8 API calls 16966 7ff6110e00bd 16965->16966 16966->16751 16967->16965 16969 7ff6110d100f 16968->16969 16970 7ff6110d0ffd 16968->16970 16973 7ff6110d101d 16969->16973 16976 7ff6110d1059 16969->16976 16971 7ff6110d4f08 memcpy_s 11 API calls 16970->16971 16972 7ff6110d1002 16971->16972 16974 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 16972->16974 16975 7ff6110da814 _invalid_parameter_noinfo 37 API calls 16973->16975 16982 7ff6110d100d 16974->16982 16975->16982 16977 7ff6110d13d5 16976->16977 16979 7ff6110d4f08 memcpy_s 11 API calls 16976->16979 16978 7ff6110d4f08 memcpy_s 11 API calls 16977->16978 16977->16982 16980 7ff6110d1669 16978->16980 16981 7ff6110d13ca 16979->16981 16983 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 16980->16983 16984 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 16981->16984 16982->16622 16983->16982 16984->16977 16986 7ff6110d0704 16985->16986 17013 7ff6110d0464 16986->17013 16988 7ff6110d071d 16988->16218 17025 7ff6110d03bc 16989->17025 16993 7ff6110cc850 16992->16993 16994 7ff6110c2930 GetCurrentProcessId 16993->16994 16995 7ff6110c1c80 49 API calls 16994->16995 16996 7ff6110c2979 16995->16996 17039 7ff6110d4984 16996->17039 17001 7ff6110c1c80 49 API calls 17002 7ff6110c29ff 17001->17002 17069 7ff6110c2620 17002->17069 17005 7ff6110cc550 _log10_special 8 API calls 17006 7ff6110c2a31 17005->17006 17006->16257 17008 7ff6110c1b89 17007->17008 17009 7ff6110d0119 17007->17009 17008->16256 17008->16257 17010 7ff6110d4f08 memcpy_s 11 API calls 17009->17010 17011 7ff6110d011e 17010->17011 17012 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17011->17012 17012->17008 17014 7ff6110d04ce 17013->17014 17015 7ff6110d048e 17013->17015 17014->17015 17017 7ff6110d04da 17014->17017 17016 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17015->17016 17018 7ff6110d04b5 17016->17018 17024 7ff6110d546c EnterCriticalSection 17017->17024 17018->16988 17026 7ff6110c1a20 17025->17026 17027 7ff6110d03e6 17025->17027 17026->16226 17026->16227 17027->17026 17028 7ff6110d0432 17027->17028 17029 7ff6110d03f5 memcpy_s 17027->17029 17038 7ff6110d546c EnterCriticalSection 17028->17038 17032 7ff6110d4f08 memcpy_s 11 API calls 17029->17032 17033 7ff6110d040a 17032->17033 17035 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17033->17035 17035->17026 17043 7ff6110d49de 17039->17043 17040 7ff6110d4a03 17041 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17040->17041 17056 7ff6110d4a2d 17041->17056 17042 7ff6110d4a3f 17078 7ff6110d2c10 17042->17078 17043->17040 17043->17042 17045 7ff6110d4b1c 17048 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17045->17048 17047 7ff6110cc550 _log10_special 8 API calls 17049 7ff6110c29c3 17047->17049 17048->17056 17057 7ff6110d5160 17049->17057 17050 7ff6110d4b40 17050->17045 17052 7ff6110d4b4a 17050->17052 17051 7ff6110d4af1 17053 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17051->17053 17055 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17052->17055 17053->17056 17054 7ff6110d4ae8 17054->17045 17054->17051 17055->17056 17056->17047 17058 7ff6110db2c8 memcpy_s 11 API calls 17057->17058 17059 7ff6110d5177 17058->17059 17060 7ff6110deb98 memcpy_s 11 API calls 17059->17060 17062 7ff6110d51b7 17059->17062 17066 7ff6110c29e5 17059->17066 17061 7ff6110d51ac 17060->17061 17063 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17061->17063 17062->17066 17216 7ff6110dec20 17062->17216 17063->17062 17066->17001 17067 7ff6110da900 _isindst 17 API calls 17068 7ff6110d51fc 17067->17068 17070 7ff6110c262f 17069->17070 17071 7ff6110c9390 2 API calls 17070->17071 17072 7ff6110c2660 17071->17072 17073 7ff6110c266f MessageBoxW 17072->17073 17074 7ff6110c2683 MessageBoxA 17072->17074 17075 7ff6110c2690 17073->17075 17074->17075 17076 7ff6110cc550 _log10_special 8 API calls 17075->17076 17077 7ff6110c26a0 17076->17077 17077->17005 17079 7ff6110d2c4e 17078->17079 17080 7ff6110d2c3e 17078->17080 17081 7ff6110d2c57 17079->17081 17085 7ff6110d2c85 17079->17085 17082 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17080->17082 17083 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17081->17083 17084 7ff6110d2c7d 17082->17084 17083->17084 17084->17045 17084->17050 17084->17051 17084->17054 17085->17080 17085->17084 17086 7ff6110d47c0 45 API calls 17085->17086 17088 7ff6110d2f34 17085->17088 17092 7ff6110d35a0 17085->17092 17118 7ff6110d3268 17085->17118 17148 7ff6110d2af0 17085->17148 17086->17085 17090 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17088->17090 17090->17080 17093 7ff6110d35e2 17092->17093 17094 7ff6110d3655 17092->17094 17095 7ff6110d367f 17093->17095 17096 7ff6110d35e8 17093->17096 17097 7ff6110d36af 17094->17097 17098 7ff6110d365a 17094->17098 17165 7ff6110d1b50 17095->17165 17101 7ff6110d36be 17096->17101 17105 7ff6110d35ed 17096->17105 17097->17095 17097->17101 17116 7ff6110d3618 17097->17116 17099 7ff6110d368f 17098->17099 17100 7ff6110d365c 17098->17100 17172 7ff6110d1740 17099->17172 17107 7ff6110d35fd 17100->17107 17109 7ff6110d366b 17100->17109 17117 7ff6110d36ed 17101->17117 17179 7ff6110d1f60 17101->17179 17105->17107 17108 7ff6110d3630 17105->17108 17105->17116 17107->17117 17151 7ff6110d3f04 17107->17151 17108->17117 17161 7ff6110d43c0 17108->17161 17109->17095 17111 7ff6110d3670 17109->17111 17114 7ff6110d4558 37 API calls 17111->17114 17111->17117 17112 7ff6110cc550 _log10_special 8 API calls 17113 7ff6110d3983 17112->17113 17113->17085 17114->17116 17116->17117 17186 7ff6110de858 17116->17186 17117->17112 17119 7ff6110d3273 17118->17119 17120 7ff6110d3289 17118->17120 17121 7ff6110d32c7 17119->17121 17122 7ff6110d35e2 17119->17122 17123 7ff6110d3655 17119->17123 17120->17121 17124 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17120->17124 17121->17085 17125 7ff6110d367f 17122->17125 17126 7ff6110d35e8 17122->17126 17127 7ff6110d36af 17123->17127 17128 7ff6110d365a 17123->17128 17124->17121 17131 7ff6110d1b50 38 API calls 17125->17131 17130 7ff6110d36be 17126->17130 17134 7ff6110d35ed 17126->17134 17127->17125 17127->17130 17146 7ff6110d3618 17127->17146 17129 7ff6110d368f 17128->17129 17135 7ff6110d365c 17128->17135 17132 7ff6110d1740 38 API calls 17129->17132 17138 7ff6110d1f60 38 API calls 17130->17138 17147 7ff6110d36ed 17130->17147 17131->17146 17132->17146 17133 7ff6110d3f04 47 API calls 17133->17146 17136 7ff6110d35fd 17134->17136 17137 7ff6110d3630 17134->17137 17134->17146 17135->17136 17139 7ff6110d366b 17135->17139 17136->17133 17136->17147 17140 7ff6110d43c0 47 API calls 17137->17140 17137->17147 17138->17146 17139->17125 17141 7ff6110d3670 17139->17141 17140->17146 17144 7ff6110d4558 37 API calls 17141->17144 17141->17147 17142 7ff6110cc550 _log10_special 8 API calls 17143 7ff6110d3983 17142->17143 17143->17085 17144->17146 17145 7ff6110de858 47 API calls 17145->17146 17146->17145 17146->17147 17147->17142 17199 7ff6110d0d14 17148->17199 17152 7ff6110d3f26 17151->17152 17153 7ff6110d0b80 12 API calls 17152->17153 17154 7ff6110d3f6e 17153->17154 17155 7ff6110de570 46 API calls 17154->17155 17157 7ff6110d4041 17155->17157 17156 7ff6110d4063 17159 7ff6110d40ec 17156->17159 17160 7ff6110d47c0 45 API calls 17156->17160 17157->17156 17158 7ff6110d47c0 45 API calls 17157->17158 17158->17156 17159->17116 17160->17159 17162 7ff6110d43d8 17161->17162 17164 7ff6110d4440 17161->17164 17163 7ff6110de858 47 API calls 17162->17163 17162->17164 17163->17164 17164->17116 17166 7ff6110d1b83 17165->17166 17167 7ff6110d1bb2 17166->17167 17169 7ff6110d1c6f 17166->17169 17168 7ff6110d0b80 12 API calls 17167->17168 17171 7ff6110d1bef 17167->17171 17168->17171 17170 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17169->17170 17170->17171 17171->17116 17173 7ff6110d1773 17172->17173 17174 7ff6110d17a2 17173->17174 17176 7ff6110d185f 17173->17176 17175 7ff6110d0b80 12 API calls 17174->17175 17178 7ff6110d17df 17174->17178 17175->17178 17177 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17176->17177 17177->17178 17178->17116 17180 7ff6110d1f93 17179->17180 17181 7ff6110d1fc2 17180->17181 17183 7ff6110d207f 17180->17183 17182 7ff6110d0b80 12 API calls 17181->17182 17185 7ff6110d1fff 17181->17185 17182->17185 17184 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17183->17184 17184->17185 17185->17116 17187 7ff6110de880 17186->17187 17189 7ff6110d47c0 45 API calls 17187->17189 17190 7ff6110de8c5 17187->17190 17192 7ff6110de885 memcpy_s 17187->17192 17194 7ff6110de8ae memcpy_s 17187->17194 17188 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17188->17192 17189->17190 17190->17192 17190->17194 17196 7ff6110e07e8 17190->17196 17192->17116 17194->17188 17194->17192 17198 7ff6110e080c WideCharToMultiByte 17196->17198 17200 7ff6110d0d53 17199->17200 17201 7ff6110d0d41 17199->17201 17203 7ff6110d0d60 17200->17203 17207 7ff6110d0d9d 17200->17207 17202 7ff6110d4f08 memcpy_s 11 API calls 17201->17202 17204 7ff6110d0d46 17202->17204 17205 7ff6110da814 _invalid_parameter_noinfo 37 API calls 17203->17205 17206 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17204->17206 17209 7ff6110d0d51 17205->17209 17206->17209 17208 7ff6110d0e46 17207->17208 17210 7ff6110d4f08 memcpy_s 11 API calls 17207->17210 17208->17209 17211 7ff6110d4f08 memcpy_s 11 API calls 17208->17211 17209->17085 17212 7ff6110d0e3b 17210->17212 17213 7ff6110d0ef0 17211->17213 17214 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17212->17214 17215 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17213->17215 17214->17208 17215->17209 17220 7ff6110dec3d 17216->17220 17217 7ff6110dec42 17218 7ff6110d51dd 17217->17218 17219 7ff6110d4f08 memcpy_s 11 API calls 17217->17219 17218->17066 17218->17067 17221 7ff6110dec4c 17219->17221 17220->17217 17220->17218 17223 7ff6110dec8c 17220->17223 17222 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17221->17222 17222->17218 17223->17218 17224 7ff6110d4f08 memcpy_s 11 API calls 17223->17224 17224->17221 17226 7ff6110c8633 __std_exception_destroy 17225->17226 17227 7ff6110c85b1 GetTokenInformation 17225->17227 17230 7ff6110c864c 17226->17230 17231 7ff6110c8646 CloseHandle 17226->17231 17228 7ff6110c85d2 GetLastError 17227->17228 17229 7ff6110c85dd 17227->17229 17228->17226 17228->17229 17229->17226 17232 7ff6110c85f9 GetTokenInformation 17229->17232 17230->16275 17231->17230 17232->17226 17233 7ff6110c861c 17232->17233 17233->17226 17234 7ff6110c8626 ConvertSidToStringSidW 17233->17234 17234->17226 17236 7ff6110cc850 17235->17236 17237 7ff6110c2b74 GetCurrentProcessId 17236->17237 17238 7ff6110c26b0 48 API calls 17237->17238 17239 7ff6110c2bc7 17238->17239 17240 7ff6110d4bd8 48 API calls 17239->17240 17241 7ff6110c2c10 MessageBoxW 17240->17241 17242 7ff6110cc550 _log10_special 8 API calls 17241->17242 17243 7ff6110c2c40 17242->17243 17243->16285 17245 7ff6110c25e5 17244->17245 17246 7ff6110d4bd8 48 API calls 17245->17246 17247 7ff6110c2604 17246->17247 17247->16301 17293 7ff6110d8794 17248->17293 17252 7ff6110c81dc 17251->17252 17253 7ff6110c9390 2 API calls 17252->17253 17254 7ff6110c81fb 17253->17254 17255 7ff6110c8203 17254->17255 17256 7ff6110c8216 ExpandEnvironmentStringsW 17254->17256 17257 7ff6110c2810 49 API calls 17255->17257 17258 7ff6110c823c __std_exception_destroy 17256->17258 17282 7ff6110c820f __std_exception_destroy 17257->17282 17259 7ff6110c8253 17258->17259 17260 7ff6110c8240 17258->17260 17264 7ff6110c82bf 17259->17264 17265 7ff6110c8261 GetDriveTypeW 17259->17265 17261 7ff6110c2810 49 API calls 17260->17261 17261->17282 17262 7ff6110cc550 _log10_special 8 API calls 17282->17262 17334 7ff6110e1558 17293->17334 17393 7ff6110e12d0 17334->17393 17414 7ff6110e02d8 EnterCriticalSection 17393->17414 17541 7ff6110c456a 17540->17541 17542 7ff6110c9390 2 API calls 17541->17542 17543 7ff6110c458f 17542->17543 17544 7ff6110cc550 _log10_special 8 API calls 17543->17544 17545 7ff6110c45b7 17544->17545 17545->16327 17547 7ff6110c7e2e 17546->17547 17548 7ff6110c1c80 49 API calls 17547->17548 17551 7ff6110c7f52 17547->17551 17554 7ff6110c7eb5 17548->17554 17549 7ff6110cc550 _log10_special 8 API calls 17550 7ff6110c7f83 17549->17550 17550->16327 17551->17549 17552 7ff6110c1c80 49 API calls 17552->17554 17553 7ff6110c4560 10 API calls 17553->17554 17554->17551 17554->17552 17554->17553 17555 7ff6110c9390 2 API calls 17554->17555 17556 7ff6110c7f23 CreateDirectoryW 17555->17556 17556->17551 17556->17554 17558 7ff6110c1613 17557->17558 17559 7ff6110c1637 17557->17559 17678 7ff6110c1050 17558->17678 17561 7ff6110c45c0 108 API calls 17559->17561 17563 7ff6110c164b 17561->17563 17562 7ff6110c1618 17566 7ff6110c162e 17562->17566 17569 7ff6110c2710 54 API calls 17562->17569 17564 7ff6110c1653 17563->17564 17565 7ff6110c1682 17563->17565 17567 7ff6110d4f08 memcpy_s 11 API calls 17564->17567 17568 7ff6110c45c0 108 API calls 17565->17568 17566->16327 17570 7ff6110c1658 17567->17570 17571 7ff6110c1696 17568->17571 17569->17566 17572 7ff6110c2910 54 API calls 17570->17572 17573 7ff6110c169e 17571->17573 17574 7ff6110c16b8 17571->17574 17575 7ff6110c1671 17572->17575 17576 7ff6110c2710 54 API calls 17573->17576 17577 7ff6110d06d4 73 API calls 17574->17577 17575->16327 17578 7ff6110c16ae 17576->17578 17579 7ff6110c16cd 17577->17579 17584 7ff6110d004c 74 API calls 17578->17584 17580 7ff6110c16d1 17579->17580 17581 7ff6110c16f9 17579->17581 17606 7ff6110c718b 17605->17606 17608 7ff6110c7144 17605->17608 17606->16327 17608->17606 17742 7ff6110d5024 17608->17742 17610 7ff6110c41a1 17609->17610 17611 7ff6110c44e0 49 API calls 17610->17611 17612 7ff6110c41db 17611->17612 17613 7ff6110c44e0 49 API calls 17612->17613 17614 7ff6110c41eb 17613->17614 17615 7ff6110c420d 17614->17615 17616 7ff6110c423c 17614->17616 17773 7ff6110c4110 17615->17773 17618 7ff6110c4110 51 API calls 17616->17618 17619 7ff6110c423a 17618->17619 17620 7ff6110c4267 17619->17620 17621 7ff6110c429c 17619->17621 17780 7ff6110c7cf0 17620->17780 17622 7ff6110c4110 51 API calls 17621->17622 17625 7ff6110c42c0 17622->17625 17654 7ff6110c1c80 49 API calls 17653->17654 17655 7ff6110c4474 17654->17655 17655->16327 17679 7ff6110c45c0 108 API calls 17678->17679 17680 7ff6110c108c 17679->17680 17681 7ff6110c1094 17680->17681 17682 7ff6110c10a9 17680->17682 17683 7ff6110c2710 54 API calls 17681->17683 17684 7ff6110d06d4 73 API calls 17682->17684 17690 7ff6110c10a4 __std_exception_destroy 17683->17690 17685 7ff6110c10bf 17684->17685 17686 7ff6110c10c3 17685->17686 17687 7ff6110c10e6 17685->17687 17688 7ff6110d4f08 memcpy_s 11 API calls 17686->17688 17692 7ff6110c1122 17687->17692 17693 7ff6110c10f7 17687->17693 17689 7ff6110c10c8 17688->17689 17691 7ff6110c2910 54 API calls 17689->17691 17690->17562 17695 7ff6110c1129 17692->17695 17700 7ff6110c113c 17692->17700 17694 7ff6110d4f08 memcpy_s 11 API calls 17693->17694 17696 7ff6110c1100 17694->17696 17697 7ff6110c1210 92 API calls 17695->17697 17702 7ff6110d039c _fread_nolock 53 API calls 17700->17702 17704 7ff6110c11ed 17700->17704 17702->17700 17743 7ff6110d505e 17742->17743 17744 7ff6110d5031 17742->17744 17745 7ff6110d5081 17743->17745 17749 7ff6110d509d 17743->17749 17746 7ff6110d4f08 memcpy_s 11 API calls 17744->17746 17747 7ff6110d4fe8 17744->17747 17748 7ff6110d4f08 memcpy_s 11 API calls 17745->17748 17750 7ff6110d503b 17746->17750 17747->17608 17751 7ff6110d5086 17748->17751 17757 7ff6110d4f4c 17749->17757 17753 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17750->17753 17754 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17751->17754 17755 7ff6110d5046 17753->17755 17756 7ff6110d5091 17754->17756 17755->17608 17756->17608 17758 7ff6110d4f70 17757->17758 17759 7ff6110d4f6b 17757->17759 17758->17759 17760 7ff6110db150 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 17758->17760 17759->17756 17761 7ff6110d4f8b 17760->17761 17765 7ff6110dd984 17761->17765 17766 7ff6110d4fae 17765->17766 17767 7ff6110dd999 17765->17767 17767->17766 17774 7ff6110c4136 17773->17774 17775 7ff6110d4984 49 API calls 17774->17775 17776 7ff6110c415c 17775->17776 17837 7ff6110d5ec8 17836->17837 17838 7ff6110d5eee 17837->17838 17841 7ff6110d5f21 17837->17841 17839 7ff6110d4f08 memcpy_s 11 API calls 17838->17839 17840 7ff6110d5ef3 17839->17840 17842 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 17840->17842 17843 7ff6110d5f34 17841->17843 17844 7ff6110d5f27 17841->17844 17847 7ff6110c4616 17842->17847 17855 7ff6110dac28 17843->17855 17846 7ff6110d4f08 memcpy_s 11 API calls 17844->17846 17846->17847 17847->16363 17868 7ff6110e02d8 EnterCriticalSection 17855->17868 18228 7ff6110d78f8 18227->18228 18231 7ff6110d73d4 18228->18231 18230 7ff6110d7911 18230->16371 18232 7ff6110d741e 18231->18232 18233 7ff6110d73ef 18231->18233 18241 7ff6110d546c EnterCriticalSection 18232->18241 18234 7ff6110da814 _invalid_parameter_noinfo 37 API calls 18233->18234 18240 7ff6110d740f 18234->18240 18240->18230 18243 7ff6110cfe43 18242->18243 18245 7ff6110cfe71 18242->18245 18244 7ff6110da814 _invalid_parameter_noinfo 37 API calls 18243->18244 18246 7ff6110cfe63 18244->18246 18245->18246 18252 7ff6110d546c EnterCriticalSection 18245->18252 18246->16377 18254 7ff6110ccaf2 RtlLookupFunctionEntry 18253->18254 18255 7ff6110cc90b 18254->18255 18256 7ff6110ccb08 RtlVirtualUnwind 18254->18256 18257 7ff6110cc8a0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18255->18257 18256->18254 18256->18255 18259 7ff6110c45c0 108 API calls 18258->18259 18260 7ff6110c1493 18259->18260 18261 7ff6110c14bc 18260->18261 18262 7ff6110c149b 18260->18262 18264 7ff6110d06d4 73 API calls 18261->18264 18263 7ff6110c2710 54 API calls 18262->18263 18265 7ff6110c14ab 18263->18265 18266 7ff6110c14d1 18264->18266 18265->16419 18267 7ff6110c14d5 18266->18267 18268 7ff6110c14f8 18266->18268 18269 7ff6110d4f08 memcpy_s 11 API calls 18267->18269 18271 7ff6110c1532 18268->18271 18272 7ff6110c1508 18268->18272 18365 7ff6110c6375 18364->18365 18366 7ff6110c1c80 49 API calls 18365->18366 18367 7ff6110c63b1 18366->18367 18368 7ff6110c63dd 18367->18368 18369 7ff6110c63ba 18367->18369 18371 7ff6110c4630 49 API calls 18368->18371 18370 7ff6110c2710 54 API calls 18369->18370 18372 7ff6110c63d3 18370->18372 18374 7ff6110c63f5 18371->18374 18376 7ff6110cc550 _log10_special 8 API calls 18372->18376 18373 7ff6110c6413 18375 7ff6110c4560 10 API calls 18373->18375 18374->18373 18377 7ff6110c2710 54 API calls 18374->18377 18378 7ff6110c641d 18375->18378 18379 7ff6110c336e 18376->18379 18377->18373 18380 7ff6110c642b 18378->18380 18381 7ff6110c8e80 3 API calls 18378->18381 18379->16488 18395 7ff6110c6500 18379->18395 18382 7ff6110c4630 49 API calls 18380->18382 18381->18380 18544 7ff6110c5400 18395->18544 18654 7ff6110db150 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18653->18654 18655 7ff6110da3e1 18654->18655 18658 7ff6110da504 18655->18658 18667 7ff6110e3650 18658->18667 18693 7ff6110e3608 18667->18693 18698 7ff6110e02d8 EnterCriticalSection 18693->18698 20327 7ff6110ead69 20330 7ff6110d5478 LeaveCriticalSection 20327->20330 20570 7ff6110eabe3 20572 7ff6110eabf3 20570->20572 20574 7ff6110d5478 LeaveCriticalSection 20572->20574 15895 7ff6110cbae0 15896 7ff6110cbb0e 15895->15896 15897 7ff6110cbaf5 15895->15897 15897->15896 15900 7ff6110dd5fc 15897->15900 15901 7ff6110dd647 15900->15901 15905 7ff6110dd60b memcpy_s 15900->15905 15910 7ff6110d4f08 15901->15910 15902 7ff6110dd62e HeapAlloc 15904 7ff6110cbb6e 15902->15904 15902->15905 15905->15901 15905->15902 15907 7ff6110e3590 15905->15907 15913 7ff6110e35d0 15907->15913 15919 7ff6110db2c8 GetLastError 15910->15919 15912 7ff6110d4f11 15912->15904 15918 7ff6110e02d8 EnterCriticalSection 15913->15918 15920 7ff6110db309 FlsSetValue 15919->15920 15924 7ff6110db2ec 15919->15924 15921 7ff6110db31b 15920->15921 15934 7ff6110db2f9 SetLastError 15920->15934 15936 7ff6110deb98 15921->15936 15924->15920 15924->15934 15926 7ff6110db348 FlsSetValue 15929 7ff6110db354 FlsSetValue 15926->15929 15930 7ff6110db366 15926->15930 15927 7ff6110db338 FlsSetValue 15928 7ff6110db341 15927->15928 15943 7ff6110da948 15928->15943 15929->15928 15949 7ff6110daef4 15930->15949 15934->15912 15937 7ff6110deba9 memcpy_s 15936->15937 15938 7ff6110debde HeapAlloc 15937->15938 15939 7ff6110debfa 15937->15939 15942 7ff6110e3590 memcpy_s 2 API calls 15937->15942 15938->15937 15940 7ff6110db32a 15938->15940 15941 7ff6110d4f08 memcpy_s 10 API calls 15939->15941 15940->15926 15940->15927 15941->15940 15942->15937 15944 7ff6110da94d RtlFreeHeap 15943->15944 15948 7ff6110da97c 15943->15948 15945 7ff6110da968 GetLastError 15944->15945 15944->15948 15946 7ff6110da975 Concurrency::details::SchedulerProxy::DeleteThis 15945->15946 15947 7ff6110d4f08 memcpy_s 9 API calls 15946->15947 15947->15948 15948->15934 15954 7ff6110dadcc 15949->15954 15966 7ff6110e02d8 EnterCriticalSection 15954->15966 20575 7ff6110d5410 20576 7ff6110d541b 20575->20576 20584 7ff6110df2a4 20576->20584 20597 7ff6110e02d8 EnterCriticalSection 20584->20597 18702 7ff6110df98c 18703 7ff6110dfb7e 18702->18703 18707 7ff6110df9ce _isindst 18702->18707 18704 7ff6110d4f08 memcpy_s 11 API calls 18703->18704 18722 7ff6110dfb6e 18704->18722 18705 7ff6110cc550 _log10_special 8 API calls 18706 7ff6110dfb99 18705->18706 18707->18703 18708 7ff6110dfa4e _isindst 18707->18708 18723 7ff6110e6194 18708->18723 18713 7ff6110dfbaa 18714 7ff6110da900 _isindst 17 API calls 18713->18714 18717 7ff6110dfbbe 18714->18717 18720 7ff6110dfaab 18720->18722 18747 7ff6110e61d8 18720->18747 18722->18705 18724 7ff6110e61a3 18723->18724 18725 7ff6110dfa6c 18723->18725 18754 7ff6110e02d8 EnterCriticalSection 18724->18754 18729 7ff6110e5598 18725->18729 18730 7ff6110e55a1 18729->18730 18731 7ff6110dfa81 18729->18731 18732 7ff6110d4f08 memcpy_s 11 API calls 18730->18732 18731->18713 18735 7ff6110e55c8 18731->18735 18733 7ff6110e55a6 18732->18733 18734 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18733->18734 18734->18731 18736 7ff6110e55d1 18735->18736 18738 7ff6110dfa92 18735->18738 18737 7ff6110d4f08 memcpy_s 11 API calls 18736->18737 18739 7ff6110e55d6 18737->18739 18738->18713 18741 7ff6110e55f8 18738->18741 18740 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18739->18740 18740->18738 18742 7ff6110e5601 18741->18742 18746 7ff6110dfaa3 18741->18746 18743 7ff6110d4f08 memcpy_s 11 API calls 18742->18743 18744 7ff6110e5606 18743->18744 18745 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18744->18745 18745->18746 18746->18713 18746->18720 18755 7ff6110e02d8 EnterCriticalSection 18747->18755 20607 7ff6110eadfe 20608 7ff6110eae0d 20607->20608 20610 7ff6110eae17 20607->20610 20611 7ff6110e0338 LeaveCriticalSection 20608->20611 19936 7ff6110e16b0 19947 7ff6110e73e4 19936->19947 19948 7ff6110e73f1 19947->19948 19949 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19948->19949 19950 7ff6110e740d 19948->19950 19949->19948 19951 7ff6110da948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19950->19951 19952 7ff6110e16b9 19950->19952 19951->19950 19953 7ff6110e02d8 EnterCriticalSection 19952->19953 18756 7ff6110d5628 18757 7ff6110d5642 18756->18757 18758 7ff6110d565f 18756->18758 18759 7ff6110d4ee8 _fread_nolock 11 API calls 18757->18759 18758->18757 18760 7ff6110d5672 CreateFileW 18758->18760 18761 7ff6110d5647 18759->18761 18762 7ff6110d56dc 18760->18762 18763 7ff6110d56a6 18760->18763 18764 7ff6110d4f08 memcpy_s 11 API calls 18761->18764 18807 7ff6110d5c04 18762->18807 18781 7ff6110d577c GetFileType 18763->18781 18768 7ff6110d564f 18764->18768 18772 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18768->18772 18770 7ff6110d56e5 18775 7ff6110d4e7c _fread_nolock 11 API calls 18770->18775 18771 7ff6110d5710 18828 7ff6110d59c4 18771->18828 18777 7ff6110d565a 18772->18777 18773 7ff6110d56d1 CloseHandle 18773->18777 18774 7ff6110d56bb CloseHandle 18774->18777 18780 7ff6110d56ef 18775->18780 18780->18777 18782 7ff6110d57ca 18781->18782 18783 7ff6110d5887 18781->18783 18784 7ff6110d57f6 GetFileInformationByHandle 18782->18784 18791 7ff6110d5b00 21 API calls 18782->18791 18785 7ff6110d588f 18783->18785 18786 7ff6110d58b1 18783->18786 18787 7ff6110d58a2 GetLastError 18784->18787 18788 7ff6110d581f 18784->18788 18785->18787 18789 7ff6110d5893 18785->18789 18790 7ff6110d58d4 PeekNamedPipe 18786->18790 18805 7ff6110d5872 18786->18805 18794 7ff6110d4e7c _fread_nolock 11 API calls 18787->18794 18792 7ff6110d59c4 51 API calls 18788->18792 18793 7ff6110d4f08 memcpy_s 11 API calls 18789->18793 18790->18805 18797 7ff6110d57e4 18791->18797 18795 7ff6110d582a 18792->18795 18793->18805 18794->18805 18845 7ff6110d5924 18795->18845 18796 7ff6110cc550 _log10_special 8 API calls 18799 7ff6110d56b4 18796->18799 18797->18784 18797->18805 18799->18773 18799->18774 18801 7ff6110d5924 10 API calls 18802 7ff6110d5849 18801->18802 18803 7ff6110d5924 10 API calls 18802->18803 18804 7ff6110d585a 18803->18804 18804->18805 18806 7ff6110d4f08 memcpy_s 11 API calls 18804->18806 18805->18796 18806->18805 18808 7ff6110d5c3a 18807->18808 18809 7ff6110d4f08 memcpy_s 11 API calls 18808->18809 18827 7ff6110d5cd2 __std_exception_destroy 18808->18827 18811 7ff6110d5c4c 18809->18811 18810 7ff6110cc550 _log10_special 8 API calls 18812 7ff6110d56e1 18810->18812 18813 7ff6110d4f08 memcpy_s 11 API calls 18811->18813 18812->18770 18812->18771 18814 7ff6110d5c54 18813->18814 18815 7ff6110d7e08 45 API calls 18814->18815 18816 7ff6110d5c69 18815->18816 18817 7ff6110d5c71 18816->18817 18818 7ff6110d5c7b 18816->18818 18819 7ff6110d4f08 memcpy_s 11 API calls 18817->18819 18820 7ff6110d4f08 memcpy_s 11 API calls 18818->18820 18823 7ff6110d5c76 18819->18823 18821 7ff6110d5c80 18820->18821 18822 7ff6110d4f08 memcpy_s 11 API calls 18821->18822 18821->18827 18824 7ff6110d5c8a 18822->18824 18825 7ff6110d5cc4 GetDriveTypeW 18823->18825 18823->18827 18826 7ff6110d7e08 45 API calls 18824->18826 18825->18827 18826->18823 18827->18810 18829 7ff6110d59ec 18828->18829 18837 7ff6110d571d 18829->18837 18852 7ff6110df724 18829->18852 18831 7ff6110d5a80 18832 7ff6110df724 51 API calls 18831->18832 18831->18837 18833 7ff6110d5a93 18832->18833 18834 7ff6110df724 51 API calls 18833->18834 18833->18837 18835 7ff6110d5aa6 18834->18835 18836 7ff6110df724 51 API calls 18835->18836 18835->18837 18836->18837 18838 7ff6110d5b00 18837->18838 18839 7ff6110d5b1a 18838->18839 18840 7ff6110d5b51 18839->18840 18841 7ff6110d5b2a 18839->18841 18842 7ff6110df5b8 21 API calls 18840->18842 18843 7ff6110d4e7c _fread_nolock 11 API calls 18841->18843 18844 7ff6110d5b3a 18841->18844 18842->18844 18843->18844 18844->18780 18846 7ff6110d5940 18845->18846 18847 7ff6110d594d FileTimeToSystemTime 18845->18847 18846->18847 18848 7ff6110d5948 18846->18848 18847->18848 18849 7ff6110d5961 SystemTimeToTzSpecificLocalTime 18847->18849 18850 7ff6110cc550 _log10_special 8 API calls 18848->18850 18849->18848 18851 7ff6110d5839 18850->18851 18851->18801 18853 7ff6110df755 18852->18853 18854 7ff6110df731 18852->18854 18857 7ff6110df78f 18853->18857 18858 7ff6110df7ae 18853->18858 18854->18853 18855 7ff6110df736 18854->18855 18856 7ff6110d4f08 memcpy_s 11 API calls 18855->18856 18859 7ff6110df73b 18856->18859 18860 7ff6110d4f08 memcpy_s 11 API calls 18857->18860 18861 7ff6110d4f4c 45 API calls 18858->18861 18862 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18859->18862 18863 7ff6110df794 18860->18863 18867 7ff6110df7bb 18861->18867 18864 7ff6110df746 18862->18864 18865 7ff6110da8e0 _invalid_parameter_noinfo 37 API calls 18863->18865 18864->18831 18866 7ff6110df79f 18865->18866 18866->18831 18867->18866 18868 7ff6110e04dc 51 API calls 18867->18868 18868->18867 20196 7ff6110dc520 20207 7ff6110e02d8 EnterCriticalSection 20196->20207

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7ff6110c89e0-7ff6110c8b26 call 7ff6110cc850 call 7ff6110c9390 SetConsoleCtrlHandler GetStartupInfoW call 7ff6110d53f0 call 7ff6110da47c call 7ff6110d871c call 7ff6110d53f0 call 7ff6110da47c call 7ff6110d871c call 7ff6110d53f0 call 7ff6110da47c call 7ff6110d871c GetCommandLineW CreateProcessW 23 7ff6110c8b4d-7ff6110c8b89 RegisterClassW 0->23 24 7ff6110c8b28-7ff6110c8b48 GetLastError call 7ff6110c2c50 0->24 25 7ff6110c8b91-7ff6110c8be5 CreateWindowExW 23->25 26 7ff6110c8b8b GetLastError 23->26 32 7ff6110c8e39-7ff6110c8e5f call 7ff6110cc550 24->32 28 7ff6110c8bef-7ff6110c8bf4 ShowWindow 25->28 29 7ff6110c8be7-7ff6110c8bed GetLastError 25->29 26->25 31 7ff6110c8bfa-7ff6110c8c0a WaitForSingleObject 28->31 29->31 34 7ff6110c8c0c 31->34 35 7ff6110c8c88-7ff6110c8c8f 31->35 37 7ff6110c8c10-7ff6110c8c13 34->37 38 7ff6110c8cd2-7ff6110c8cd9 35->38 39 7ff6110c8c91-7ff6110c8ca1 WaitForSingleObject 35->39 42 7ff6110c8c15 GetLastError 37->42 43 7ff6110c8c1b-7ff6110c8c22 37->43 40 7ff6110c8cdf-7ff6110c8cf5 QueryPerformanceFrequency QueryPerformanceCounter 38->40 41 7ff6110c8dc0-7ff6110c8dd9 GetMessageW 38->41 44 7ff6110c8ca7-7ff6110c8cb7 TerminateProcess 39->44 45 7ff6110c8df8-7ff6110c8e02 39->45 46 7ff6110c8d00-7ff6110c8d38 MsgWaitForMultipleObjects PeekMessageW 40->46 48 7ff6110c8def-7ff6110c8df6 41->48 49 7ff6110c8ddb-7ff6110c8de9 TranslateMessage DispatchMessageW 41->49 42->43 43->39 47 7ff6110c8c24-7ff6110c8c41 PeekMessageW 43->47 52 7ff6110c8cbf-7ff6110c8ccd WaitForSingleObject 44->52 53 7ff6110c8cb9 GetLastError 44->53 50 7ff6110c8e04-7ff6110c8e0a DestroyWindow 45->50 51 7ff6110c8e11-7ff6110c8e35 GetExitCodeProcess CloseHandle * 2 45->51 54 7ff6110c8d73-7ff6110c8d7a 46->54 55 7ff6110c8d3a 46->55 56 7ff6110c8c43-7ff6110c8c74 TranslateMessage DispatchMessageW PeekMessageW 47->56 57 7ff6110c8c76-7ff6110c8c86 WaitForSingleObject 47->57 48->41 48->45 49->48 50->51 51->32 52->45 53->52 54->41 59 7ff6110c8d7c-7ff6110c8da5 QueryPerformanceCounter 54->59 58 7ff6110c8d40-7ff6110c8d71 TranslateMessage DispatchMessageW PeekMessageW 55->58 56->56 56->57 57->35 57->37 58->54 58->58 59->46 60 7ff6110c8dab-7ff6110c8db2 59->60 60->45 61 7ff6110c8db4-7ff6110c8db8 60->61 61->41
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Message$ErrorLast$ObjectProcessSingleWait$CloseCreateHandlePeekWindow_invalid_parameter_noinfo$ByteCharClassCodeCommandConsoleCtrlCurrentDestroyDispatchExitFormatHandlerInfoLineMultiRegisterStartupTerminateTranslateWide
                                                              • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
                                                              • API String ID: 3832162212-3165540532
                                                              • Opcode ID: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                                                              • Instruction ID: 20ec7c9bbf2514fea101c1dd25031cadc0c85ea97b2fb584a1c7860570bbc154
                                                              • Opcode Fuzzy Hash: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                                                              • Instruction Fuzzy Hash: A9D16031E09E8286EB109F76E8542AD3768FF84F79F404236DA5D82AA4DF3CD645C714

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 62 7ff6110c1000-7ff6110c3806 call 7ff6110cfe18 call 7ff6110cfe20 call 7ff6110cc850 call 7ff6110d53f0 call 7ff6110d5484 call 7ff6110c36b0 76 7ff6110c3814-7ff6110c3836 call 7ff6110c1950 62->76 77 7ff6110c3808-7ff6110c380f 62->77 82 7ff6110c383c-7ff6110c3856 call 7ff6110c1c80 76->82 83 7ff6110c391b-7ff6110c3931 call 7ff6110c45c0 76->83 78 7ff6110c3c97-7ff6110c3cb2 call 7ff6110cc550 77->78 87 7ff6110c385b-7ff6110c389b call 7ff6110c8830 82->87 90 7ff6110c3933-7ff6110c3960 call 7ff6110c7f90 83->90 91 7ff6110c396a-7ff6110c397f call 7ff6110c2710 83->91 97 7ff6110c38c1-7ff6110c38cc call 7ff6110d4f30 87->97 98 7ff6110c389d-7ff6110c38a3 87->98 100 7ff6110c3984-7ff6110c39a6 call 7ff6110c1c80 90->100 101 7ff6110c3962-7ff6110c3965 call 7ff6110d004c 90->101 102 7ff6110c3c8f 91->102 109 7ff6110c38d2-7ff6110c38e1 call 7ff6110c8830 97->109 110 7ff6110c39fc-7ff6110c3a2a call 7ff6110c8940 call 7ff6110c89a0 * 3 97->110 103 7ff6110c38af-7ff6110c38bd call 7ff6110c89a0 98->103 104 7ff6110c38a5-7ff6110c38ad 98->104 115 7ff6110c39b0-7ff6110c39b9 100->115 101->91 102->78 103->97 104->103 119 7ff6110c39f4-7ff6110c39f7 call 7ff6110d4f30 109->119 120 7ff6110c38e7-7ff6110c38ed 109->120 138 7ff6110c3a2f-7ff6110c3a3e call 7ff6110c8830 110->138 115->115 118 7ff6110c39bb-7ff6110c39d8 call 7ff6110c1950 115->118 118->87 130 7ff6110c39de-7ff6110c39ef call 7ff6110c2710 118->130 119->110 124 7ff6110c38f0-7ff6110c38fc 120->124 127 7ff6110c38fe-7ff6110c3903 124->127 128 7ff6110c3905-7ff6110c3908 124->128 127->124 127->128 128->119 131 7ff6110c390e-7ff6110c3916 call 7ff6110d4f30 128->131 130->102 131->138 141 7ff6110c3b45-7ff6110c3b53 138->141 142 7ff6110c3a44-7ff6110c3a47 138->142 143 7ff6110c3b59-7ff6110c3b5d 141->143 144 7ff6110c3a67 141->144 142->141 145 7ff6110c3a4d-7ff6110c3a50 142->145 148 7ff6110c3a6b-7ff6110c3a90 call 7ff6110d4f30 143->148 144->148 146 7ff6110c3b14-7ff6110c3b17 145->146 147 7ff6110c3a56-7ff6110c3a5a 145->147 150 7ff6110c3b2f-7ff6110c3b40 call 7ff6110c2710 146->150 151 7ff6110c3b19-7ff6110c3b1d 146->151 147->146 149 7ff6110c3a60 147->149 157 7ff6110c3a92-7ff6110c3aa6 call 7ff6110c8940 148->157 158 7ff6110c3aab-7ff6110c3ac0 148->158 149->144 159 7ff6110c3c7f-7ff6110c3c87 150->159 151->150 153 7ff6110c3b1f-7ff6110c3b2a 151->153 153->148 157->158 161 7ff6110c3be8-7ff6110c3bfa call 7ff6110c8830 158->161 162 7ff6110c3ac6-7ff6110c3aca 158->162 159->102 170 7ff6110c3c2e 161->170 171 7ff6110c3bfc-7ff6110c3c02 161->171 164 7ff6110c3ad0-7ff6110c3ae8 call 7ff6110d5250 162->164 165 7ff6110c3bcd-7ff6110c3be2 call 7ff6110c1940 162->165 175 7ff6110c3b62-7ff6110c3b7a call 7ff6110d5250 164->175 176 7ff6110c3aea-7ff6110c3b02 call 7ff6110d5250 164->176 165->161 165->162 177 7ff6110c3c31-7ff6110c3c40 call 7ff6110d4f30 170->177 173 7ff6110c3c1e-7ff6110c3c2c 171->173 174 7ff6110c3c04-7ff6110c3c1c 171->174 173->177 174->177 187 7ff6110c3b87-7ff6110c3b9f call 7ff6110d5250 175->187 188 7ff6110c3b7c-7ff6110c3b80 175->188 176->165 184 7ff6110c3b08-7ff6110c3b0f 176->184 185 7ff6110c3d41-7ff6110c3d63 call 7ff6110c44e0 177->185 186 7ff6110c3c46-7ff6110c3c4a 177->186 184->165 201 7ff6110c3d71-7ff6110c3d82 call 7ff6110c1c80 185->201 202 7ff6110c3d65-7ff6110c3d6f call 7ff6110c4630 185->202 189 7ff6110c3c50-7ff6110c3c5f call 7ff6110c90e0 186->189 190 7ff6110c3cd4-7ff6110c3ce6 call 7ff6110c8830 186->190 197 7ff6110c3ba1-7ff6110c3ba5 187->197 198 7ff6110c3bac-7ff6110c3bc4 call 7ff6110d5250 187->198 188->187 204 7ff6110c3c61 189->204 205 7ff6110c3cb3-7ff6110c3cb6 call 7ff6110c8660 189->205 206 7ff6110c3d35-7ff6110c3d3c 190->206 207 7ff6110c3ce8-7ff6110c3ceb 190->207 197->198 198->165 217 7ff6110c3bc6 198->217 215 7ff6110c3d87-7ff6110c3d96 201->215 202->215 212 7ff6110c3c68 call 7ff6110c2710 204->212 216 7ff6110c3cbb-7ff6110c3cbd 205->216 206->212 207->206 213 7ff6110c3ced-7ff6110c3d10 call 7ff6110c1c80 207->213 225 7ff6110c3c6d-7ff6110c3c77 212->225 229 7ff6110c3d12-7ff6110c3d26 call 7ff6110c2710 call 7ff6110d4f30 213->229 230 7ff6110c3d2b-7ff6110c3d33 call 7ff6110d4f30 213->230 220 7ff6110c3dc4-7ff6110c3dda call 7ff6110c9390 215->220 221 7ff6110c3d98-7ff6110c3d9f 215->221 223 7ff6110c3cbf-7ff6110c3cc6 216->223 224 7ff6110c3cc8-7ff6110c3ccf 216->224 217->165 233 7ff6110c3de8-7ff6110c3e04 SetDllDirectoryW 220->233 234 7ff6110c3ddc 220->234 221->220 227 7ff6110c3da1-7ff6110c3da5 221->227 223->212 224->215 225->159 227->220 231 7ff6110c3da7-7ff6110c3dbe SetDllDirectoryW LoadLibraryExW 227->231 229->225 230->215 231->220 237 7ff6110c3f01-7ff6110c3f08 233->237 238 7ff6110c3e0a-7ff6110c3e19 call 7ff6110c8830 233->238 234->233 240 7ff6110c3f0e-7ff6110c3f15 237->240 241 7ff6110c4008-7ff6110c4010 237->241 251 7ff6110c3e32-7ff6110c3e3c call 7ff6110d4f30 238->251 252 7ff6110c3e1b-7ff6110c3e21 238->252 240->241 244 7ff6110c3f1b-7ff6110c3f25 call 7ff6110c33c0 240->244 245 7ff6110c4035-7ff6110c4067 call 7ff6110c36a0 call 7ff6110c3360 call 7ff6110c3670 call 7ff6110c6fc0 call 7ff6110c6d70 241->245 246 7ff6110c4012-7ff6110c402f PostMessageW GetMessageW 241->246 244->225 258 7ff6110c3f2b-7ff6110c3f3f call 7ff6110c90c0 244->258 246->245 263 7ff6110c3ef2-7ff6110c3efc call 7ff6110c8940 251->263 264 7ff6110c3e42-7ff6110c3e48 251->264 255 7ff6110c3e23-7ff6110c3e2b 252->255 256 7ff6110c3e2d-7ff6110c3e2f 252->256 255->256 256->251 271 7ff6110c3f41-7ff6110c3f5e PostMessageW GetMessageW 258->271 272 7ff6110c3f64-7ff6110c3f7a call 7ff6110c8940 call 7ff6110c89e0 258->272 263->237 264->263 265 7ff6110c3e4e-7ff6110c3e54 264->265 269 7ff6110c3e5f-7ff6110c3e61 265->269 270 7ff6110c3e56-7ff6110c3e58 265->270 269->237 274 7ff6110c3e67-7ff6110c3e83 call 7ff6110c6dc0 call 7ff6110c7340 269->274 270->274 275 7ff6110c3e5a 270->275 271->272 286 7ff6110c3f7f-7ff6110c3fa7 call 7ff6110c6fc0 call 7ff6110c6d70 call 7ff6110c88e0 272->286 289 7ff6110c3e8e-7ff6110c3e95 274->289 290 7ff6110c3e85-7ff6110c3e8c 274->290 275->237 310 7ff6110c3ff5-7ff6110c4003 call 7ff6110c1900 286->310 311 7ff6110c3fa9-7ff6110c3fbf call 7ff6110c8ed0 call 7ff6110c88e0 286->311 294 7ff6110c3eaf-7ff6110c3eb9 call 7ff6110c71b0 289->294 295 7ff6110c3e97-7ff6110c3ea4 call 7ff6110c6e00 289->295 293 7ff6110c3edb-7ff6110c3ef0 call 7ff6110c2a50 call 7ff6110c6fc0 call 7ff6110c6d70 290->293 293->237 304 7ff6110c3ec4-7ff6110c3ed2 call 7ff6110c74f0 294->304 305 7ff6110c3ebb-7ff6110c3ec2 294->305 295->294 308 7ff6110c3ea6-7ff6110c3ead 295->308 304->237 318 7ff6110c3ed4 304->318 305->293 308->293 310->225 311->310 323 7ff6110c3fc1-7ff6110c3fd6 311->323 318->293 324 7ff6110c3ff0 call 7ff6110c2a50 323->324 325 7ff6110c3fd8-7ff6110c3feb call 7ff6110c2710 call 7ff6110c1900 323->325 324->310 325->225
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastModuleName
                                                              • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag$pyi-runtime-tmpdir
                                                              • API String ID: 2776309574-4232158417
                                                              • Opcode ID: 2d77af2a2f9236e5f1bda1603447cca491bc739d444c9c91c5f96d0c69afedc5
                                                              • Instruction ID: 429923f5d8ce7d379b404d27ec0bf483629e77543e7e68de51100c6295842244
                                                              • Opcode Fuzzy Hash: 2d77af2a2f9236e5f1bda1603447cca491bc739d444c9c91c5f96d0c69afedc5
                                                              • Instruction Fuzzy Hash: A132E221E1CE8291FB15D722D4553F92768AF44FA2F4440B2DA5DC72D6EF2CE658CB20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 479 7ff6110e5c00-7ff6110e5c3b call 7ff6110e5588 call 7ff6110e5590 call 7ff6110e55f8 486 7ff6110e5e65-7ff6110e5eb1 call 7ff6110da900 call 7ff6110e5588 call 7ff6110e5590 call 7ff6110e55f8 479->486 487 7ff6110e5c41-7ff6110e5c4c call 7ff6110e5598 479->487 513 7ff6110e5fef-7ff6110e605d call 7ff6110da900 call 7ff6110e1578 486->513 514 7ff6110e5eb7-7ff6110e5ec2 call 7ff6110e5598 486->514 487->486 493 7ff6110e5c52-7ff6110e5c5c 487->493 495 7ff6110e5c7e-7ff6110e5c82 493->495 496 7ff6110e5c5e-7ff6110e5c61 493->496 499 7ff6110e5c85-7ff6110e5c8d 495->499 498 7ff6110e5c64-7ff6110e5c6f 496->498 502 7ff6110e5c71-7ff6110e5c78 498->502 503 7ff6110e5c7a-7ff6110e5c7c 498->503 499->499 500 7ff6110e5c8f-7ff6110e5ca2 call 7ff6110dd5fc 499->500 509 7ff6110e5ca4-7ff6110e5ca6 call 7ff6110da948 500->509 510 7ff6110e5cba-7ff6110e5cc6 call 7ff6110da948 500->510 502->498 502->503 503->495 506 7ff6110e5cab-7ff6110e5cb9 503->506 509->506 521 7ff6110e5ccd-7ff6110e5cd5 510->521 533 7ff6110e605f-7ff6110e6066 513->533 534 7ff6110e606b-7ff6110e606e 513->534 514->513 524 7ff6110e5ec8-7ff6110e5ed3 call 7ff6110e55c8 514->524 521->521 522 7ff6110e5cd7-7ff6110e5ce8 call 7ff6110e0474 521->522 522->486 532 7ff6110e5cee-7ff6110e5d44 call 7ff6110ea4d0 * 4 call 7ff6110e5b1c 522->532 524->513 531 7ff6110e5ed9-7ff6110e5efc call 7ff6110da948 GetTimeZoneInformation 524->531 545 7ff6110e5f02-7ff6110e5f23 531->545 546 7ff6110e5fc4-7ff6110e5fee call 7ff6110e5580 call 7ff6110e5570 call 7ff6110e5578 531->546 591 7ff6110e5d46-7ff6110e5d4a 532->591 539 7ff6110e60fb-7ff6110e60fe 533->539 537 7ff6110e60a5-7ff6110e60b8 call 7ff6110dd5fc 534->537 538 7ff6110e6070 534->538 557 7ff6110e60c3-7ff6110e60de call 7ff6110e1578 537->557 558 7ff6110e60ba 537->558 542 7ff6110e6073 538->542 539->542 544 7ff6110e6104-7ff6110e610c call 7ff6110e5c00 539->544 548 7ff6110e6078-7ff6110e60a4 call 7ff6110da948 call 7ff6110cc550 542->548 549 7ff6110e6073 call 7ff6110e5e7c 542->549 544->548 552 7ff6110e5f25-7ff6110e5f2b 545->552 553 7ff6110e5f2e-7ff6110e5f35 545->553 549->548 552->553 561 7ff6110e5f37-7ff6110e5f3f 553->561 562 7ff6110e5f49 553->562 575 7ff6110e60e5-7ff6110e60f7 call 7ff6110da948 557->575 576 7ff6110e60e0-7ff6110e60e3 557->576 566 7ff6110e60bc-7ff6110e60c1 call 7ff6110da948 558->566 561->562 568 7ff6110e5f41-7ff6110e5f47 561->568 571 7ff6110e5f4b-7ff6110e5fbf call 7ff6110ea4d0 * 4 call 7ff6110e2b5c call 7ff6110e6114 * 2 562->571 566->538 568->571 571->546 575->539 576->566 594 7ff6110e5d50-7ff6110e5d54 591->594 595 7ff6110e5d4c 591->595 594->591 597 7ff6110e5d56-7ff6110e5d7b call 7ff6110d6b58 594->597 595->594 603 7ff6110e5d7e-7ff6110e5d82 597->603 605 7ff6110e5d84-7ff6110e5d8f 603->605 606 7ff6110e5d91-7ff6110e5d95 603->606 605->606 608 7ff6110e5d97-7ff6110e5d9b 605->608 606->603 610 7ff6110e5d9d-7ff6110e5dc5 call 7ff6110d6b58 608->610 611 7ff6110e5e1c-7ff6110e5e20 608->611 619 7ff6110e5de3-7ff6110e5de7 610->619 620 7ff6110e5dc7 610->620 612 7ff6110e5e22-7ff6110e5e24 611->612 613 7ff6110e5e27-7ff6110e5e34 611->613 612->613 615 7ff6110e5e4f-7ff6110e5e5e call 7ff6110e5580 call 7ff6110e5570 613->615 616 7ff6110e5e36-7ff6110e5e4c call 7ff6110e5b1c 613->616 615->486 616->615 619->611 625 7ff6110e5de9-7ff6110e5e07 call 7ff6110d6b58 619->625 623 7ff6110e5dca-7ff6110e5dd1 620->623 623->619 627 7ff6110e5dd3-7ff6110e5de1 623->627 631 7ff6110e5e13-7ff6110e5e1a 625->631 627->619 627->623 631->611 632 7ff6110e5e09-7ff6110e5e0d 631->632 632->611 633 7ff6110e5e0f 632->633 633->631
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5C45
                                                                • Part of subcall function 00007FF6110E5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110E55AC
                                                                • Part of subcall function 00007FF6110DA948: RtlFreeHeap.NTDLL(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA95E
                                                                • Part of subcall function 00007FF6110DA948: GetLastError.KERNEL32(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA968
                                                                • Part of subcall function 00007FF6110DA900: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6110DA8DF,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DA909
                                                                • Part of subcall function 00007FF6110DA900: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6110DA8DF,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DA92E
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5C34
                                                                • Part of subcall function 00007FF6110E55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110E560C
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5EAA
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5EBB
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5ECC
                                                              • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6110E610C), ref: 00007FF6110E5EF3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 4070488512-239921721
                                                              • Opcode ID: c8e181fbda5929fcc8f6a75e148055e791a7ddaa32984997676ab034941af52a
                                                              • Instruction ID: 6192d8c0c785769784269a786fa83d3469ee33d91d827705828107fecbea13eb
                                                              • Opcode Fuzzy Hash: c8e181fbda5929fcc8f6a75e148055e791a7ddaa32984997676ab034941af52a
                                                              • Instruction Fuzzy Hash: 03D1132AE19A0286EB24EF23D8511B97369EF84FA5F448436EA0DC7795EF3DE541C340

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 693 7ff6110e6964-7ff6110e69d7 call 7ff6110e6698 696 7ff6110e69f1-7ff6110e69fb call 7ff6110d8520 693->696 697 7ff6110e69d9-7ff6110e69e2 call 7ff6110d4ee8 693->697 703 7ff6110e69fd-7ff6110e6a14 call 7ff6110d4ee8 call 7ff6110d4f08 696->703 704 7ff6110e6a16-7ff6110e6a7f CreateFileW 696->704 702 7ff6110e69e5-7ff6110e69ec call 7ff6110d4f08 697->702 720 7ff6110e6d32-7ff6110e6d52 702->720 703->702 705 7ff6110e6a81-7ff6110e6a87 704->705 706 7ff6110e6afc-7ff6110e6b07 GetFileType 704->706 710 7ff6110e6ac9-7ff6110e6af7 GetLastError call 7ff6110d4e7c 705->710 711 7ff6110e6a89-7ff6110e6a8d 705->711 713 7ff6110e6b5a-7ff6110e6b61 706->713 714 7ff6110e6b09-7ff6110e6b44 GetLastError call 7ff6110d4e7c CloseHandle 706->714 710->702 711->710 718 7ff6110e6a8f-7ff6110e6ac7 CreateFileW 711->718 716 7ff6110e6b63-7ff6110e6b67 713->716 717 7ff6110e6b69-7ff6110e6b6c 713->717 714->702 728 7ff6110e6b4a-7ff6110e6b55 call 7ff6110d4f08 714->728 723 7ff6110e6b72-7ff6110e6bc7 call 7ff6110d8438 716->723 717->723 724 7ff6110e6b6e 717->724 718->706 718->710 732 7ff6110e6be6-7ff6110e6c17 call 7ff6110e6418 723->732 733 7ff6110e6bc9-7ff6110e6bd5 call 7ff6110e68a0 723->733 724->723 728->702 738 7ff6110e6c1d-7ff6110e6c5f 732->738 739 7ff6110e6c19-7ff6110e6c1b 732->739 733->732 740 7ff6110e6bd7 733->740 742 7ff6110e6c81-7ff6110e6c8c 738->742 743 7ff6110e6c61-7ff6110e6c65 738->743 741 7ff6110e6bd9-7ff6110e6be1 call 7ff6110daac0 739->741 740->741 741->720 745 7ff6110e6c92-7ff6110e6c96 742->745 746 7ff6110e6d30 742->746 743->742 744 7ff6110e6c67-7ff6110e6c7c 743->744 744->742 745->746 748 7ff6110e6c9c-7ff6110e6ce1 CloseHandle CreateFileW 745->748 746->720 750 7ff6110e6ce3-7ff6110e6d11 GetLastError call 7ff6110d4e7c call 7ff6110d8660 748->750 751 7ff6110e6d16-7ff6110e6d2b 748->751 750->751 751->746
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                              • String ID:
                                                              • API String ID: 1617910340-0
                                                              • Opcode ID: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                                                              • Instruction ID: 65c2934787dbfa73f3929d4f5078b0a09c79461c5ed7dd0e6bc2c7b6dd328e09
                                                              • Opcode Fuzzy Hash: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                                                              • Instruction Fuzzy Hash: 5AC1BE32F29E4685EB10CFAAD4912AC3769EB49FA9F014235DE1E97795CF39E151C300

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 959 7ff6110e5e7c-7ff6110e5eb1 call 7ff6110e5588 call 7ff6110e5590 call 7ff6110e55f8 966 7ff6110e5fef-7ff6110e605d call 7ff6110da900 call 7ff6110e1578 959->966 967 7ff6110e5eb7-7ff6110e5ec2 call 7ff6110e5598 959->967 979 7ff6110e605f-7ff6110e6066 966->979 980 7ff6110e606b-7ff6110e606e 966->980 967->966 973 7ff6110e5ec8-7ff6110e5ed3 call 7ff6110e55c8 967->973 973->966 978 7ff6110e5ed9-7ff6110e5efc call 7ff6110da948 GetTimeZoneInformation 973->978 989 7ff6110e5f02-7ff6110e5f23 978->989 990 7ff6110e5fc4-7ff6110e5fee call 7ff6110e5580 call 7ff6110e5570 call 7ff6110e5578 978->990 984 7ff6110e60fb-7ff6110e60fe 979->984 982 7ff6110e60a5-7ff6110e60b8 call 7ff6110dd5fc 980->982 983 7ff6110e6070 980->983 999 7ff6110e60c3-7ff6110e60de call 7ff6110e1578 982->999 1000 7ff6110e60ba 982->1000 986 7ff6110e6073 983->986 984->986 988 7ff6110e6104-7ff6110e610c call 7ff6110e5c00 984->988 991 7ff6110e6078-7ff6110e60a4 call 7ff6110da948 call 7ff6110cc550 986->991 992 7ff6110e6073 call 7ff6110e5e7c 986->992 988->991 995 7ff6110e5f25-7ff6110e5f2b 989->995 996 7ff6110e5f2e-7ff6110e5f35 989->996 992->991 995->996 1003 7ff6110e5f37-7ff6110e5f3f 996->1003 1004 7ff6110e5f49 996->1004 1015 7ff6110e60e5-7ff6110e60f7 call 7ff6110da948 999->1015 1016 7ff6110e60e0-7ff6110e60e3 999->1016 1007 7ff6110e60bc-7ff6110e60c1 call 7ff6110da948 1000->1007 1003->1004 1009 7ff6110e5f41-7ff6110e5f47 1003->1009 1011 7ff6110e5f4b-7ff6110e5fbf call 7ff6110ea4d0 * 4 call 7ff6110e2b5c call 7ff6110e6114 * 2 1004->1011 1007->983 1009->1011 1011->990 1015->984 1016->1007
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5EAA
                                                                • Part of subcall function 00007FF6110E55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110E560C
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5EBB
                                                                • Part of subcall function 00007FF6110E5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110E55AC
                                                              • _get_daylight.LIBCMT ref: 00007FF6110E5ECC
                                                                • Part of subcall function 00007FF6110E55C8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110E55DC
                                                                • Part of subcall function 00007FF6110DA948: RtlFreeHeap.NTDLL(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA95E
                                                                • Part of subcall function 00007FF6110DA948: GetLastError.KERNEL32(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA968
                                                              • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6110E610C), ref: 00007FF6110E5EF3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 3458911817-239921721
                                                              • Opcode ID: 6f2171165b001c2744b9d494c76d2a7753c36df5ed5d67f3075860c83c0dbe14
                                                              • Instruction ID: d27e2f8c1a202fc08c69637094a6daa75e5b0c638ab4b1840b7f5e79a7258523
                                                              • Opcode Fuzzy Hash: 6f2171165b001c2744b9d494c76d2a7753c36df5ed5d67f3075860c83c0dbe14
                                                              • Instruction Fuzzy Hash: 6E51C436E1DA428AE710DF23D8811AAB769FB88FA5F404536EA0DC7795EF3CE5418740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                                                              • Instruction ID: 5d6fd48a3e897d2eda9c7036457357240d2cca0529a241a6604ff7c3606ed958
                                                              • Opcode Fuzzy Hash: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                                                              • Instruction Fuzzy Hash: 7BF0C222E19B4286F7A08B60B4897667394AB84B3AF440335DAAE42AD4DF3CD149CA04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentFeaturePresentProcessProcessor
                                                              • String ID:
                                                              • API String ID: 1010374628-0
                                                              • Opcode ID: 537422541fbed36a77ddee3a41e978a3695e14332b64c7d8d0a2d6c09592a1ae
                                                              • Instruction ID: 6689dc22ad79d97e67dcda6284aec0db5439ce38b165c6233501d9f81e52e843
                                                              • Opcode Fuzzy Hash: 537422541fbed36a77ddee3a41e978a3695e14332b64c7d8d0a2d6c09592a1ae
                                                              • Instruction Fuzzy Hash: D802ED21F1EE5680FF51EB1394012B9668CAF45FB2F498634ED6DC63DAEE7CA6518300

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 331 7ff6110c1950-7ff6110c198b call 7ff6110c45c0 334 7ff6110c1991-7ff6110c19d1 call 7ff6110c7f90 331->334 335 7ff6110c1c4e-7ff6110c1c72 call 7ff6110cc550 331->335 340 7ff6110c19d7-7ff6110c19e7 call 7ff6110d06d4 334->340 341 7ff6110c1c3b-7ff6110c1c3e call 7ff6110d004c 334->341 346 7ff6110c19e9-7ff6110c1a03 call 7ff6110d4f08 call 7ff6110c2910 340->346 347 7ff6110c1a08-7ff6110c1a24 call 7ff6110d039c 340->347 344 7ff6110c1c43-7ff6110c1c4b 341->344 344->335 346->341 353 7ff6110c1a45-7ff6110c1a5a call 7ff6110d4f28 347->353 354 7ff6110c1a26-7ff6110c1a40 call 7ff6110d4f08 call 7ff6110c2910 347->354 361 7ff6110c1a5c-7ff6110c1a76 call 7ff6110d4f08 call 7ff6110c2910 353->361 362 7ff6110c1a7b-7ff6110c1b05 call 7ff6110c1c80 * 2 call 7ff6110d06d4 call 7ff6110d4f44 353->362 354->341 361->341 375 7ff6110c1b0a-7ff6110c1b14 362->375 376 7ff6110c1b35-7ff6110c1b4e call 7ff6110d039c 375->376 377 7ff6110c1b16-7ff6110c1b30 call 7ff6110d4f08 call 7ff6110c2910 375->377 383 7ff6110c1b50-7ff6110c1b6a call 7ff6110d4f08 call 7ff6110c2910 376->383 384 7ff6110c1b6f-7ff6110c1b8b call 7ff6110d0110 376->384 377->341 383->341 391 7ff6110c1b9e-7ff6110c1bac 384->391 392 7ff6110c1b8d-7ff6110c1b99 call 7ff6110c2710 384->392 391->341 393 7ff6110c1bb2-7ff6110c1bb9 391->393 392->341 396 7ff6110c1bc1-7ff6110c1bc7 393->396 398 7ff6110c1be0-7ff6110c1bef 396->398 399 7ff6110c1bc9-7ff6110c1bd6 396->399 398->398 400 7ff6110c1bf1-7ff6110c1bfa 398->400 399->400 401 7ff6110c1c0f 400->401 402 7ff6110c1bfc-7ff6110c1bff 400->402 404 7ff6110c1c11-7ff6110c1c24 401->404 402->401 403 7ff6110c1c01-7ff6110c1c04 402->403 403->401 405 7ff6110c1c06-7ff6110c1c09 403->405 406 7ff6110c1c26 404->406 407 7ff6110c1c2d-7ff6110c1c39 404->407 405->401 408 7ff6110c1c0b-7ff6110c1c0d 405->408 406->407 407->341 407->396 408->404
                                                              APIs
                                                                • Part of subcall function 00007FF6110C7F90: _fread_nolock.LIBCMT ref: 00007FF6110C803A
                                                              • _fread_nolock.LIBCMT ref: 00007FF6110C1A1B
                                                                • Part of subcall function 00007FF6110C2910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF6110C1B6A), ref: 00007FF6110C295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock$CurrentProcess
                                                              • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                              • API String ID: 2397952137-3497178890
                                                              • Opcode ID: 6a04d0c4c8a0b99f23b16d6d676f1581d6c74e17851155a383b4fbd0f348e88e
                                                              • Instruction ID: 18537fc44c2e7869d7b3c42020e39dcabd1c305e9bbc22947ae2e3d9763014a1
                                                              • Opcode Fuzzy Hash: 6a04d0c4c8a0b99f23b16d6d676f1581d6c74e17851155a383b4fbd0f348e88e
                                                              • Instruction Fuzzy Hash: A8818271E09E86C6EB20DB25D0443F923A8EF48FA6F444471E98DC7B96DE3CE5458B60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 409 7ff6110c1600-7ff6110c1611 410 7ff6110c1613-7ff6110c161c call 7ff6110c1050 409->410 411 7ff6110c1637-7ff6110c1651 call 7ff6110c45c0 409->411 418 7ff6110c162e-7ff6110c1636 410->418 419 7ff6110c161e-7ff6110c1629 call 7ff6110c2710 410->419 416 7ff6110c1653-7ff6110c1681 call 7ff6110d4f08 call 7ff6110c2910 411->416 417 7ff6110c1682-7ff6110c169c call 7ff6110c45c0 411->417 426 7ff6110c169e-7ff6110c16b3 call 7ff6110c2710 417->426 427 7ff6110c16b8-7ff6110c16cf call 7ff6110d06d4 417->427 419->418 433 7ff6110c1821-7ff6110c1824 call 7ff6110d004c 426->433 434 7ff6110c16d1-7ff6110c16f4 call 7ff6110d4f08 call 7ff6110c2910 427->434 435 7ff6110c16f9-7ff6110c16fd 427->435 443 7ff6110c1829-7ff6110c183b 433->443 448 7ff6110c1819-7ff6110c181c call 7ff6110d004c 434->448 436 7ff6110c16ff-7ff6110c170b call 7ff6110c1210 435->436 437 7ff6110c1717-7ff6110c1737 call 7ff6110d4f44 435->437 445 7ff6110c1710-7ff6110c1712 436->445 449 7ff6110c1761-7ff6110c176c 437->449 450 7ff6110c1739-7ff6110c175c call 7ff6110d4f08 call 7ff6110c2910 437->450 445->448 448->433 451 7ff6110c1802-7ff6110c180a call 7ff6110d4f30 449->451 452 7ff6110c1772-7ff6110c1777 449->452 462 7ff6110c180f-7ff6110c1814 450->462 451->462 455 7ff6110c1780-7ff6110c17a2 call 7ff6110d039c 452->455 464 7ff6110c17a4-7ff6110c17bc call 7ff6110d0adc 455->464 465 7ff6110c17da-7ff6110c17e6 call 7ff6110d4f08 455->465 462->448 470 7ff6110c17be-7ff6110c17c1 464->470 471 7ff6110c17c5-7ff6110c17d8 call 7ff6110d4f08 464->471 472 7ff6110c17ed-7ff6110c17f8 call 7ff6110c2910 465->472 470->455 474 7ff6110c17c3 470->474 471->472 477 7ff6110c17fd 472->477 474->477 477->451
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                              • API String ID: 2050909247-1550345328
                                                              • Opcode ID: bad4f66b2396e12d0ef35d42e6ebff520b547dc5d9fe1b27e2bc8e6725e1335c
                                                              • Instruction ID: caad8ba7708135f91e5aceb603b65dc1f39a39247de3f0491415d0dcb36ea780
                                                              • Opcode Fuzzy Hash: bad4f66b2396e12d0ef35d42e6ebff520b547dc5d9fe1b27e2bc8e6725e1335c
                                                              • Instruction Fuzzy Hash: E1518F21F09E4392EB10AB5294402BA63A8BF44FB6F444571EE4CC7BD6DE3CE655CB20

                                                              Control-flow Graph

                                                              APIs
                                                              • GetTempPathW.KERNEL32(?,?,00000000,00007FF6110C3CBB), ref: 00007FF6110C8704
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00007FF6110C3CBB), ref: 00007FF6110C870A
                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00007FF6110C3CBB), ref: 00007FF6110C874C
                                                                • Part of subcall function 00007FF6110C8830: GetEnvironmentVariableW.KERNEL32(00007FF6110C388E), ref: 00007FF6110C8867
                                                                • Part of subcall function 00007FF6110C8830: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF6110C8889
                                                                • Part of subcall function 00007FF6110D8238: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110D8251
                                                                • Part of subcall function 00007FF6110C2810: MessageBoxW.USER32 ref: 00007FF6110C28EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Environment$CreateCurrentDirectoryExpandMessagePathProcessStringsTempVariable_invalid_parameter_noinfo
                                                              • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                              • API String ID: 3563477958-1339014028
                                                              • Opcode ID: 191653d34e5a06968e8282251bef030903df87164e49fe651f79a53b4d97858f
                                                              • Instruction ID: 3ca8e7e43aede2e3ba0f68be47715ba50933b10ca12248737f62779556ee86bc
                                                              • Opcode Fuzzy Hash: 191653d34e5a06968e8282251bef030903df87164e49fe651f79a53b4d97858f
                                                              • Instruction Fuzzy Hash: 4D41A511E1AE4244FB10EB66A5553FA1299AF85FF2F404172ED0DC77D6EE3CE6058710

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 756 7ff6110c1210-7ff6110c126d call 7ff6110cbd80 759 7ff6110c126f-7ff6110c1296 call 7ff6110c2710 756->759 760 7ff6110c1297-7ff6110c12af call 7ff6110d4f44 756->760 765 7ff6110c12b1-7ff6110c12cf call 7ff6110d4f08 call 7ff6110c2910 760->765 766 7ff6110c12d4-7ff6110c12e4 call 7ff6110d4f44 760->766 778 7ff6110c1439-7ff6110c144e call 7ff6110cba60 call 7ff6110d4f30 * 2 765->778 772 7ff6110c1309-7ff6110c131b 766->772 773 7ff6110c12e6-7ff6110c1304 call 7ff6110d4f08 call 7ff6110c2910 766->773 774 7ff6110c1320-7ff6110c1345 call 7ff6110d039c 772->774 773->778 784 7ff6110c1431 774->784 785 7ff6110c134b-7ff6110c1355 call 7ff6110d0110 774->785 793 7ff6110c1453-7ff6110c146d 778->793 784->778 785->784 792 7ff6110c135b-7ff6110c1367 785->792 794 7ff6110c1370-7ff6110c1398 call 7ff6110ca1c0 792->794 797 7ff6110c1416-7ff6110c142c call 7ff6110c2710 794->797 798 7ff6110c139a-7ff6110c139d 794->798 797->784 799 7ff6110c1411 798->799 800 7ff6110c139f-7ff6110c13a9 798->800 799->797 802 7ff6110c13d4-7ff6110c13d7 800->802 803 7ff6110c13ab-7ff6110c13b9 call 7ff6110d0adc 800->803 804 7ff6110c13d9-7ff6110c13e7 call 7ff6110e9e30 802->804 805 7ff6110c13ea-7ff6110c13ef 802->805 809 7ff6110c13be-7ff6110c13c1 803->809 804->805 805->794 808 7ff6110c13f5-7ff6110c13f8 805->808 811 7ff6110c140c-7ff6110c140f 808->811 812 7ff6110c13fa-7ff6110c13fd 808->812 813 7ff6110c13cf-7ff6110c13d2 809->813 814 7ff6110c13c3-7ff6110c13cd call 7ff6110d0110 809->814 811->784 812->797 816 7ff6110c13ff-7ff6110c1407 812->816 813->797 814->805 814->813 816->774
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                              • API String ID: 2050909247-2813020118
                                                              • Opcode ID: ef842027a1d970694cc0f789b50cc720652ec9763b74026d17365e7fd9a410f4
                                                              • Instruction ID: 1daa984b9e0e51c282886b97ce891a613d326d3e8dad7befb38614746c729dc0
                                                              • Opcode Fuzzy Hash: ef842027a1d970694cc0f789b50cc720652ec9763b74026d17365e7fd9a410f4
                                                              • Instruction Fuzzy Hash: 3851C462E09E4285EB20AB12A4403BA6299FF85FB6F844175ED4DC7BD5EF3CE541CB10

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,00007FF6110C3804), ref: 00007FF6110C36E1
                                                              • GetLastError.KERNEL32(?,00007FF6110C3804), ref: 00007FF6110C36EB
                                                                • Part of subcall function 00007FF6110C2C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2C9E
                                                                • Part of subcall function 00007FF6110C2C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2D63
                                                                • Part of subcall function 00007FF6110C2C50: MessageBoxW.USER32 ref: 00007FF6110C2D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                                                              • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                              • API String ID: 3187769757-2863816727
                                                              • Opcode ID: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                                                              • Instruction ID: 0bcac69a01d7d47729a784eb61092369836ac2bce19a70d45c27b771ce529e04
                                                              • Opcode Fuzzy Hash: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                                                              • Instruction Fuzzy Hash: EF219561F1DE4281FB319725E8153BA2358BF88B76F404272E65DC65D5EE2CE705CB10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 846 7ff6110dba5c-7ff6110dba82 847 7ff6110dba84-7ff6110dba98 call 7ff6110d4ee8 call 7ff6110d4f08 846->847 848 7ff6110dba9d-7ff6110dbaa1 846->848 862 7ff6110dbe8e 847->862 849 7ff6110dbe77-7ff6110dbe83 call 7ff6110d4ee8 call 7ff6110d4f08 848->849 850 7ff6110dbaa7-7ff6110dbaae 848->850 869 7ff6110dbe89 call 7ff6110da8e0 849->869 850->849 853 7ff6110dbab4-7ff6110dbae2 850->853 853->849 856 7ff6110dbae8-7ff6110dbaef 853->856 859 7ff6110dbaf1-7ff6110dbb03 call 7ff6110d4ee8 call 7ff6110d4f08 856->859 860 7ff6110dbb08-7ff6110dbb0b 856->860 859->869 865 7ff6110dbe73-7ff6110dbe75 860->865 866 7ff6110dbb11-7ff6110dbb17 860->866 867 7ff6110dbe91-7ff6110dbea8 862->867 865->867 866->865 870 7ff6110dbb1d-7ff6110dbb20 866->870 869->862 870->859 873 7ff6110dbb22-7ff6110dbb47 870->873 874 7ff6110dbb7a-7ff6110dbb81 873->874 875 7ff6110dbb49-7ff6110dbb4b 873->875 879 7ff6110dbb83-7ff6110dbbab call 7ff6110dd5fc call 7ff6110da948 * 2 874->879 880 7ff6110dbb56-7ff6110dbb6d call 7ff6110d4ee8 call 7ff6110d4f08 call 7ff6110da8e0 874->880 877 7ff6110dbb72-7ff6110dbb78 875->877 878 7ff6110dbb4d-7ff6110dbb54 875->878 882 7ff6110dbbf8-7ff6110dbc0f 877->882 878->877 878->880 907 7ff6110dbbad-7ff6110dbbc3 call 7ff6110d4f08 call 7ff6110d4ee8 879->907 908 7ff6110dbbc8-7ff6110dbbf3 call 7ff6110dc284 879->908 911 7ff6110dbd00 880->911 885 7ff6110dbc11-7ff6110dbc19 882->885 886 7ff6110dbc8a-7ff6110dbc94 call 7ff6110e391c 882->886 885->886 890 7ff6110dbc1b-7ff6110dbc1d 885->890 898 7ff6110dbd1e 886->898 899 7ff6110dbc9a-7ff6110dbcaf 886->899 890->886 894 7ff6110dbc1f-7ff6110dbc35 890->894 894->886 900 7ff6110dbc37-7ff6110dbc43 894->900 902 7ff6110dbd23-7ff6110dbd43 ReadFile 898->902 899->898 904 7ff6110dbcb1-7ff6110dbcc3 GetConsoleMode 899->904 900->886 905 7ff6110dbc45-7ff6110dbc47 900->905 909 7ff6110dbe3d-7ff6110dbe46 GetLastError 902->909 910 7ff6110dbd49-7ff6110dbd51 902->910 904->898 912 7ff6110dbcc5-7ff6110dbccd 904->912 905->886 906 7ff6110dbc49-7ff6110dbc61 905->906 906->886 913 7ff6110dbc63-7ff6110dbc6f 906->913 907->911 908->882 918 7ff6110dbe63-7ff6110dbe66 909->918 919 7ff6110dbe48-7ff6110dbe5e call 7ff6110d4f08 call 7ff6110d4ee8 909->919 910->909 915 7ff6110dbd57 910->915 920 7ff6110dbd03-7ff6110dbd0d call 7ff6110da948 911->920 912->902 917 7ff6110dbccf-7ff6110dbcf1 ReadConsoleW 912->917 913->886 922 7ff6110dbc71-7ff6110dbc73 913->922 926 7ff6110dbd5e-7ff6110dbd73 915->926 928 7ff6110dbcf3 GetLastError 917->928 929 7ff6110dbd12-7ff6110dbd1c 917->929 923 7ff6110dbe6c-7ff6110dbe6e 918->923 924 7ff6110dbcf9-7ff6110dbcfb call 7ff6110d4e7c 918->924 919->911 920->867 922->886 932 7ff6110dbc75-7ff6110dbc85 922->932 923->920 924->911 926->920 934 7ff6110dbd75-7ff6110dbd80 926->934 928->924 929->926 932->886 939 7ff6110dbd82-7ff6110dbd9b call 7ff6110db674 934->939 940 7ff6110dbda7-7ff6110dbdaf 934->940 946 7ff6110dbda0-7ff6110dbda2 939->946 943 7ff6110dbdb1-7ff6110dbdc3 940->943 944 7ff6110dbe2b-7ff6110dbe38 call 7ff6110db4b4 940->944 947 7ff6110dbdc5 943->947 948 7ff6110dbe1e-7ff6110dbe26 943->948 944->946 946->920 950 7ff6110dbdca-7ff6110dbdd1 947->950 948->920 951 7ff6110dbdd3-7ff6110dbdd7 950->951 952 7ff6110dbe0d-7ff6110dbe18 950->952 953 7ff6110dbdf3 951->953 954 7ff6110dbdd9-7ff6110dbde0 951->954 952->948 956 7ff6110dbdf9-7ff6110dbe09 953->956 954->953 955 7ff6110dbde2-7ff6110dbde6 954->955 955->953 957 7ff6110dbde8-7ff6110dbdf1 955->957 956->950 958 7ff6110dbe0b 956->958 957->956 958->948
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 1c0df5e74df0118619baac061aee596465bcef498cfc928fc9eaa168a483e3b3
                                                              • Instruction ID: 4d709fecefc4a32557007c3d3547fbfc156ee8ceb2d2b16290388c38dfba4c07
                                                              • Opcode Fuzzy Hash: 1c0df5e74df0118619baac061aee596465bcef498cfc928fc9eaa168a483e3b3
                                                              • Instruction Fuzzy Hash: 0FC1D122E0CF8692EF609B1594402BD7B98FF86FA2F564131EA4E83791DE7CE8458711

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID:
                                                              • API String ID: 995526605-0
                                                              • Opcode ID: 1c88e2159774aae00215e56fe2a2a719af09135261df6dbcfc7a62e4558c2eb4
                                                              • Instruction ID: d86ee28be9f342e0f3320249d91f46223112bc93becaf6d936cf9e474f66f48e
                                                              • Opcode Fuzzy Hash: 1c88e2159774aae00215e56fe2a2a719af09135261df6dbcfc7a62e4558c2eb4
                                                              • Instruction Fuzzy Hash: 56212131E0CE4242EB509B56B54432AA7A8EF85BB1F500276EA6DC3AE4DE7CD5458B10

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00007FF6110C8570: GetCurrentProcess.KERNEL32 ref: 00007FF6110C8590
                                                                • Part of subcall function 00007FF6110C8570: OpenProcessToken.ADVAPI32 ref: 00007FF6110C85A3
                                                                • Part of subcall function 00007FF6110C8570: GetTokenInformation.KERNELBASE ref: 00007FF6110C85C8
                                                                • Part of subcall function 00007FF6110C8570: GetLastError.KERNEL32 ref: 00007FF6110C85D2
                                                                • Part of subcall function 00007FF6110C8570: GetTokenInformation.KERNELBASE ref: 00007FF6110C8612
                                                                • Part of subcall function 00007FF6110C8570: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF6110C862E
                                                                • Part of subcall function 00007FF6110C8570: CloseHandle.KERNEL32 ref: 00007FF6110C8646
                                                              • LocalFree.KERNEL32(?,00007FF6110C3C55), ref: 00007FF6110C916C
                                                              • LocalFree.KERNEL32(?,00007FF6110C3C55), ref: 00007FF6110C9175
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                              • API String ID: 6828938-1529539262
                                                              • Opcode ID: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                                                              • Instruction ID: fc37dee18e39c35d2389aac78964ed7b38314b370461149401f62d09ca8ba98c
                                                              • Opcode Fuzzy Hash: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                                                              • Instruction Fuzzy Hash: 4F216221E08F4282F7109B11E5153EA6269FF88BA2F854075EA4DC3B96EF3CD945CB60

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateDirectoryW.KERNELBASE(00000000,?,00007FF6110C352C,?,00000000,00007FF6110C3F23), ref: 00007FF6110C7F32
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory
                                                              • String ID: %.*s$%s%c$\
                                                              • API String ID: 4241100979-1685191245
                                                              • Opcode ID: 302ffdc47f1f131389ecc473fe7ae023bae846d875cccfc6523225b15fd92315
                                                              • Instruction ID: 77fb9fe61113a1ba0f12eb6318f701e13e4c85915a3454d4c5a31c3452212a07
                                                              • Opcode Fuzzy Hash: 302ffdc47f1f131389ecc473fe7ae023bae846d875cccfc6523225b15fd92315
                                                              • Instruction Fuzzy Hash: 8531C321E19EC645EB618B21E4503EA6258EB84FF1F400230EA6D877C9DE3CD6418B10
                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6110DCF4B), ref: 00007FF6110DD07C
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6110DCF4B), ref: 00007FF6110DD107
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                                                              • Instruction ID: 298b361d8f9ad7fcba3a2675adc013880639242238416bb59fdef6401c0e3626
                                                              • Opcode Fuzzy Hash: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                                                              • Instruction Fuzzy Hash: 5D91A136E18E5295FB609F7594402BD2BA8FB44FA9F144139EE0E97AC4DF38D482C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_isindst
                                                              • String ID:
                                                              • API String ID: 4170891091-0
                                                              • Opcode ID: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                                                              • Instruction ID: c157b27fe9a6a5a635e67c1bc495e1174ecd1db6ef88c5617344a99437bf3c9b
                                                              • Opcode Fuzzy Hash: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                                                              • Instruction Fuzzy Hash: 3B512872F04A1186EF14DF6499516BC37A9AB44B7AF104239DD1DD2AE5DF38A903C701
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                              • String ID:
                                                              • API String ID: 2780335769-0
                                                              • Opcode ID: f2931e55a17fed7c801103cab28c1f7fd047901bf7fa79ea6702d423310ad099
                                                              • Instruction ID: c98ab4f207ff439a0ff7d20e0302926adfcd92ac607372235d8456b7f8773515
                                                              • Opcode Fuzzy Hash: f2931e55a17fed7c801103cab28c1f7fd047901bf7fa79ea6702d423310ad099
                                                              • Instruction Fuzzy Hash: E8518A22E08B418AFB10CFB1D4513BD37B9AB48FA9F118435DE0D9B689DF39D5818710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 1279662727-0
                                                              • Opcode ID: 8f3d5377b4ca72f71b0fe910297a4b2920b1cd85568e136600ee028e7f718979
                                                              • Instruction ID: ca455b37083484bc123871110d4622b4f55877a2a2ee93772afa474792202eae
                                                              • Opcode Fuzzy Hash: 8f3d5377b4ca72f71b0fe910297a4b2920b1cd85568e136600ee028e7f718979
                                                              • Instruction Fuzzy Hash: B5418522E18B8183EB548B61A5503797374FF99BB5F109335EA9C83AD1DF7DA5E08700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 3251591375-0
                                                              • Opcode ID: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                                                              • Instruction ID: e94f1a0c293cd97ab1db7d2fd251b4715009b854b3614ff17ffef03d994289c9
                                                              • Opcode Fuzzy Hash: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                                                              • Instruction Fuzzy Hash: 20316E21E0CE0741FF14BB65D6523F9128AAF81FA6F4440B4E90EC72D7DE2DA905CB60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                                                              • Instruction ID: 802d0431231ea52929b41809b69b658c0e476d3af969a192f3e312e7000a3025
                                                              • Opcode Fuzzy Hash: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                                                              • Instruction Fuzzy Hash: 1B51E765F0AA4186FF28DA36940067A6699AF84FF6F188734ED6D837DDCE3CD4418600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                                                              • Instruction ID: 533349028989eefd35fbded713cc8502f64578a322ed060746e5a91407da63c7
                                                              • Opcode Fuzzy Hash: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                                                              • Instruction Fuzzy Hash: DB110122A08E9281DF208B26A914069A365BB42FF0F544335EE7D8BBE8CF3CD1108700
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6110D5839), ref: 00007FF6110D5957
                                                              • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6110D5839), ref: 00007FF6110D596D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Time$System$FileLocalSpecific
                                                              • String ID:
                                                              • API String ID: 1707611234-0
                                                              • Opcode ID: 497c6f3b45805196ef8f930e068bad9451f3f50de380bc241881b145e929bf5b
                                                              • Instruction ID: 3de461258809df078174c9be0dce8ae694c1d8012a808b60eeb860869be19bfc
                                                              • Opcode Fuzzy Hash: 497c6f3b45805196ef8f930e068bad9451f3f50de380bc241881b145e929bf5b
                                                              • Instruction Fuzzy Hash: FB119E32A0CA1282EB548B15A45113AF7B4FB85F72F500236FAAEC19E8EF3DD455DB10
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA95E
                                                              • GetLastError.KERNEL32(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA968
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 46e6024f15a2f57ad5ff64688e0fe3cec5898f8577aba2f63b046adc8766ef53
                                                              • Instruction ID: b3160ba86dfcfbfd31c452938659edad459086f6ce7f9ee1554dbbf40ab0d957
                                                              • Opcode Fuzzy Hash: 46e6024f15a2f57ad5ff64688e0fe3cec5898f8577aba2f63b046adc8766ef53
                                                              • Instruction Fuzzy Hash: 40E08C10F1EE0293FF09ABF3A84A17952586F88F22F454430D80DC22A2EE2C69818320
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?,?,?,00007FF6110DA9D5,?,?,00000000,00007FF6110DAA8A), ref: 00007FF6110DABC6
                                                              • GetLastError.KERNEL32(?,?,?,00007FF6110DA9D5,?,?,00000000,00007FF6110DAA8A), ref: 00007FF6110DABD0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                                                              • Instruction ID: ac545ef8855779c5c53b39482b3d3adada035ae380a6297a8e646a1bef6d6619
                                                              • Opcode Fuzzy Hash: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                                                              • Instruction Fuzzy Hash: 28219611F18F8281FFA457519494379168AAF84FB2F085639EA2EC77D2CE6CE5914300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                                                              • Instruction ID: 6becd0bc9113ed1deeaee64aecc98165863e2438ad7ef17f37fff9c337fefdd5
                                                              • Opcode Fuzzy Hash: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                                                              • Instruction Fuzzy Hash: EE41B032D18E4587EF348A29A54127977A8EF5AFA2F100131EA8EC36D1CF7DE442CB51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID:
                                                              • API String ID: 840049012-0
                                                              • Opcode ID: 450e6ba6509814850f3d50d55481b616261610bd67d5020dacef3c1ece41cf35
                                                              • Instruction ID: 0baaf3bef9e7347d2e8b1350572b1cde57347be25b6c2bcdf06f833d29b7f0b9
                                                              • Opcode Fuzzy Hash: 450e6ba6509814850f3d50d55481b616261610bd67d5020dacef3c1ece41cf35
                                                              • Instruction Fuzzy Hash: A121B121F18E5246FF909A2269043FA9649BF45FF5F984471FE0C87786CE7DE141CA14
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                                                              • Instruction ID: b33e4adbf72e69b54d6036a952aa2162623fb1ebbe17858fef65128486c5e1d6
                                                              • Opcode Fuzzy Hash: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                                                              • Instruction Fuzzy Hash: 5631A422E18E5285FF51AB6588413BC6A98BF81FB6F420135EA6DC77D2CF7CE4418711
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction ID: 43b5a92200e0574e1ef1a0226e0a738d1fd8c1505b3088056d14ce5974757af9
                                                              • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction Fuzzy Hash: 8F116021E1CA4282EF60AF1194012BDA278BF85FA6F444431FE8CDBA96DF3EE4408740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                                                              • Instruction ID: d3410ac1754bf2cac8ebcac0e9b9a323edfd914d0d7d3b4a46a0822e0a97515e
                                                              • Opcode Fuzzy Hash: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                                                              • Instruction Fuzzy Hash: 3C21D472E08E4186EB618F2AE84037976A5FB84F65F144234EB5DC76D9DF3CD5018B00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction ID: f45d2446f01d50f6c5ea25f0fc1773c28a6f532bf0dbeeed424c4138eef5a1b3
                                                              • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction Fuzzy Hash: 0E01A161E08B4180EF04DF5299015A9A6A9BF85FF1F484631EE5C93BDACE3CD5418300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: eb4e03bbc0b04cbc85d5aa4284f536322b5632f0a5d263bd1b62b358e696f9c3
                                                              • Instruction ID: 2899e89d0bb54beb0ee93d3f077c5a828f1bfec5f1782f7fea9387f9d7d6e2de
                                                              • Opcode Fuzzy Hash: eb4e03bbc0b04cbc85d5aa4284f536322b5632f0a5d263bd1b62b358e696f9c3
                                                              • Instruction Fuzzy Hash: B5019E20E1DEC380FFB56B2166021BA559CAF44FF9F8446B5EA5CC26C6EF7CE4514200
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 3541b91b086c77dfe17527b78ee7977ece0d5fdea915d925a3ffaee66e22a6c2
                                                              • Instruction ID: 26a35afc04c803c80c871d0680bfd3c8a4875efbee03156fcc9b5250b5f3e633
                                                              • Opcode Fuzzy Hash: 3541b91b086c77dfe17527b78ee7977ece0d5fdea915d925a3ffaee66e22a6c2
                                                              • Instruction Fuzzy Hash: 67E0C260E0CE0387FF113AA504832B810284F99B62F810432ED0CC62C3ED2C6944A221
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF6110DB32A,?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A), ref: 00007FF6110DEBED
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 0190c006dd090f1dc8136ef035d08a675b61e1fdbed98732a32380f018d60316
                                                              • Instruction ID: bdcaca6510e38b430c9916bd8e4d077b0712466d7032802a38a515a8be44231a
                                                              • Opcode Fuzzy Hash: 0190c006dd090f1dc8136ef035d08a675b61e1fdbed98732a32380f018d60316
                                                              • Instruction Fuzzy Hash: 45F04954F09E2680FF59666698553B612985F88FB2F488530C90FC63D2EE1CB8818230
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FF6110D0C90,?,?,?,00007FF6110D22FA,?,?,?,?,?,00007FF6110D3AE9), ref: 00007FF6110DD63A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                                                              • Instruction ID: 6c40a49807b530c7819fb28ab1018a4298a37ebc52eff445332cf343a62064ac
                                                              • Opcode Fuzzy Hash: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                                                              • Instruction Fuzzy Hash: C8F0F811F1DA4685FF656BB258457B9129C5FC8FB2F084730DD2EC66C2EE2CA48086A0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                              • API String ID: 199729137-3427451314
                                                              • Opcode ID: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                                                              • Instruction ID: 7f57a7a3159f317925fdc772557d03662e1677694ca49ab5179aa23cf7d884c5
                                                              • Opcode Fuzzy Hash: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                                                              • Instruction Fuzzy Hash: 2102A864E0EF0791FB159B9BB8106B82769EF18F76F441475E42EC6260EF3CB6498720
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                              • API String ID: 808467561-2761157908
                                                              • Opcode ID: 7da0388417e7c773b0aab48e07e342724827a26e5879d16e5decf6c79e081c8c
                                                              • Instruction ID: e9ead577ef15adf49083518f8b94ab5dd0422fd7b914ac694481abb5f7d85f00
                                                              • Opcode Fuzzy Hash: 7da0388417e7c773b0aab48e07e342724827a26e5879d16e5decf6c79e081c8c
                                                              • Instruction Fuzzy Hash: 71B2E372E19A828BE7258E67D4407FD37A9FB44B9AF415135DA0DD7A84DF38EA00CB40
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C842B
                                                              • RemoveDirectoryW.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C84AE
                                                              • DeleteFileW.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C84CD
                                                              • FindNextFileW.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C84DB
                                                              • FindClose.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C84EC
                                                              • RemoveDirectoryW.KERNEL32(?,00007FF6110C8919,00007FF6110C3FA5), ref: 00007FF6110C84F5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                              • String ID: %s\*
                                                              • API String ID: 1057558799-766152087
                                                              • Opcode ID: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                                                              • Instruction ID: 315b593c3756077f34f728fe57711df28b5d410c885c79b36459aeafdc6fcc49
                                                              • Opcode Fuzzy Hash: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                                                              • Instruction Fuzzy Hash: 02418221E0DD4285EB209B25E4442BA63A9FB94F76F800277E99DC36D4EF3CD645CB14
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                              • API String ID: 0-2665694366
                                                              • Opcode ID: 55880860ec2df9374ed9e05eb7c1f9660e2769407a38999da05ffb99d6c3dc89
                                                              • Instruction ID: 11e7fa4116a3bda1b26842e04aadaedc8a6d667bfd832cc1f64f6bdc28f9d9b9
                                                              • Opcode Fuzzy Hash: 55880860ec2df9374ed9e05eb7c1f9660e2769407a38999da05ffb99d6c3dc89
                                                              • Instruction Fuzzy Hash: ED52B172E18AA68BE7A48F14D458BBE3BADEB44751F014139E64A877C0EF3DD844CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                                                              • Instruction ID: 76cf2bef266b4b1d039325d69c7da7d90df5fe7ca5eeff27bf4875aba7f6b268
                                                              • Opcode Fuzzy Hash: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                                                              • Instruction Fuzzy Hash: E2315672A09F8186EB608F61E8403ED7364FB84B55F444439DA4D87B94DF3CD648C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                                                              • Instruction ID: b5d90ed2bc5e8de2c13f5545729ed0324c77e4ec155883f0ae02d7f521889fe1
                                                              • Opcode Fuzzy Hash: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                                                              • Instruction Fuzzy Hash: 49316436A18F8186DB60CF26E8402AE73A8FBC8B65F540139EA9D87B55DF3CD545CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 2227656907-0
                                                              • Opcode ID: ee5daded1920a45b930385d49f4c9fb7106de6f00b6358014c2482279c1420ad
                                                              • Instruction ID: a2cc39af17be820b93c93822586bdf10e1db4a14f4146ca75fd0fc8e64e80929
                                                              • Opcode Fuzzy Hash: ee5daded1920a45b930385d49f4c9fb7106de6f00b6358014c2482279c1420ad
                                                              • Instruction Fuzzy Hash: 5CB1B422F1AE9681EF619B2395001F963A9EB84FF5F445132EA5D87BD5EE3CE641C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                                                              • Instruction ID: 1f8f35b0e15f72d7d1d777fe05308d5beaac4b83bf66c74145f7ff262ebe49b3
                                                              • Opcode Fuzzy Hash: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                                                              • Instruction Fuzzy Hash: 4E117C22F15F068AEB00CF71E8452B933A8FB19B69F440E35EA2D867A4DF3CD1948340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy_s
                                                              • String ID:
                                                              • API String ID: 1502251526-0
                                                              • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction ID: 47a4c94c3cdf6cbb9257b9177e7fb66b0c70a7ba61b036348bdabdae56201185
                                                              • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction Fuzzy Hash: 90C11472F1EA8687D724CF1BA04466ABBA5F784B95F418134DB4A87784DF3DEA00CB40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $header crc mismatch$unknown header flags set
                                                              • API String ID: 0-1127688429
                                                              • Opcode ID: fcf6ea83c7a46010d3591867e81b0f53761d3f113121264a3729654d2d1b513f
                                                              • Instruction ID: 6a0c04cdd7604141a425151ed202b5e0aab56527dc676630885d7a7164fd5871
                                                              • Opcode Fuzzy Hash: fcf6ea83c7a46010d3591867e81b0f53761d3f113121264a3729654d2d1b513f
                                                              • Instruction Fuzzy Hash: A9F18172E08AD58BE7A58B14C088B3E3AADFF44B55F0545B8DA4987390EF38E585CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise_clrfp
                                                              • String ID:
                                                              • API String ID: 15204871-0
                                                              • Opcode ID: a4cc0e8a2f7e024105bf8074fef1866164229a93701b52dcf00f6f20498becf3
                                                              • Instruction ID: 5a00bba0c94c6a5871993156674ad7292c02ccf9bfbacadffac5c05ff34eb4a8
                                                              • Opcode Fuzzy Hash: a4cc0e8a2f7e024105bf8074fef1866164229a93701b52dcf00f6f20498becf3
                                                              • Instruction Fuzzy Hash: 7BB17A73A01B898BEB19CF2BC8463683BA4F784F58F188822DA5D837A4DF39D551C700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $
                                                              • API String ID: 0-227171996
                                                              • Opcode ID: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
                                                              • Instruction ID: 77e93e1dff16f68affb55e44efc0b4ae46fce3c01e227b7d65a2244d79ed2ab4
                                                              • Opcode Fuzzy Hash: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
                                                              • Instruction Fuzzy Hash: D5E1A0B2E0CE4686EF689F29905017D33A8FF45F6AF245235DA0E8B794DF29E851C701
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: incorrect header check$invalid window size
                                                              • API String ID: 0-900081337
                                                              • Opcode ID: 7e7bac63e97a7e962ac1d8bc37368dc0e110af78d4507200a91f80e7c7b94e68
                                                              • Instruction ID: 3b2c10686e5169a24e4df7d2be9c3b6709cafdddb7a1756fd8873a315d7a16b0
                                                              • Opcode Fuzzy Hash: 7e7bac63e97a7e962ac1d8bc37368dc0e110af78d4507200a91f80e7c7b94e68
                                                              • Instruction Fuzzy Hash: 09919672E18AC587E7A48A14C458B7E3AADFB44BA1F114179DA4A867C0DF3CE580CF10
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: e+000$gfff
                                                              • API String ID: 0-3030954782
                                                              • Opcode ID: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
                                                              • Instruction ID: eee954effcf5e60080dba9460c652094ab488323f3c66175937446f73e75d7d4
                                                              • Opcode Fuzzy Hash: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
                                                              • Instruction Fuzzy Hash: 20517862F18AD186EB258E35D80076DBB99F744FA5F488231DB9C87AC5CE3DD440C700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: gfffffff
                                                              • API String ID: 0-1523873471
                                                              • Opcode ID: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                                                              • Instruction ID: ec74aa548f65c67c57652d0f53ad7b1fcf6d3b71136f61dc9ac6f83b0bbadec3
                                                              • Opcode Fuzzy Hash: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                                                              • Instruction Fuzzy Hash: 38A14662E08BCA86EF21CF25A4007AD7B99AB55FA4F059132DE4D877C5DE3DE501C701
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: TMP
                                                              • API String ID: 3215553584-3125297090
                                                              • Opcode ID: 09cdd7cf7fc9e7e425d724a32e8c9d3bd5c12dba7606eca5b930980d9b4d1239
                                                              • Instruction ID: 3ddcf8150935d920c671633190c2c8508428f79fd9446ac6c7a923ebb1f39487
                                                              • Opcode Fuzzy Hash: 09cdd7cf7fc9e7e425d724a32e8c9d3bd5c12dba7606eca5b930980d9b4d1239
                                                              • Instruction Fuzzy Hash: 1951B215F09E0341FF64AB2769021BAA2986F44FF6F484436DE5EC77D6EE3CE6424204
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: 1f9e0516fd534d967cb731c121838b59470578846d262458ea046ba55ab40ebf
                                                              • Instruction ID: a37d16eab2b35c793baccf5dcea4d9380573078417045312e7711cc306b92000
                                                              • Opcode Fuzzy Hash: 1f9e0516fd534d967cb731c121838b59470578846d262458ea046ba55ab40ebf
                                                              • Instruction Fuzzy Hash: 28B09220E1BE02C6FB0A2B226C8721922A87F48B21F980138C00CC0330DE2C21F59710
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5eca4e5ff3e7205525bf20f3b63783aa462e3e7adb0228d62bb7e98ab9f5e9bb
                                                              • Instruction ID: 0d91e15097a9136ee5584d3d71a39020b91e64fb0a45be80f4351e72a5a6d9fa
                                                              • Opcode Fuzzy Hash: 5eca4e5ff3e7205525bf20f3b63783aa462e3e7adb0228d62bb7e98ab9f5e9bb
                                                              • Instruction Fuzzy Hash: 92D1AEA6E0CE4286EF688E29845027D27A8FF09F69F158235CE0D9B7D5DF39E845C740
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e75d751cc15dfd510e55d83c6141b0e8cb11d18cbed01e0c543b372a0114c593
                                                              • Instruction ID: 6594f01c164f03b08fb4ec6e8ca8a5403a1c2f254c57e3c1bacd702169e49093
                                                              • Opcode Fuzzy Hash: e75d751cc15dfd510e55d83c6141b0e8cb11d18cbed01e0c543b372a0114c593
                                                              • Instruction Fuzzy Hash: E6C1AE766181E08BD289EB29E47947A73D1F78930EB95406BEF87477C5CB3CA414DB20
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
                                                              • Instruction ID: 10b3545441bd1933a2c2a3a4ff47931c136c77457a41d2adc427847ebd0ff918
                                                              • Opcode Fuzzy Hash: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
                                                              • Instruction Fuzzy Hash: 7CB16B72D08B9586EB65CF29C05023C3BA8FB49F69F294235DA4E87399CF39D841C744
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
                                                              • Instruction ID: 32d498837f501568205c6252df8a8280b6015b0ee04d2cf60f69613f85859711
                                                              • Opcode Fuzzy Hash: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
                                                              • Instruction Fuzzy Hash: 5E81C472E08B9186EF74CF19944537A7A95FB49BE4F544235DA8D83B99DF3CE8408B00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 403f67b08c5d8b9127b9d27d37b93e2a1e0a746a19683c5483168a42cc689f1f
                                                              • Instruction ID: 89781018cf4d40889af477d494a37798d02020049c64b0bb155c07f4cb93da23
                                                              • Opcode Fuzzy Hash: 403f67b08c5d8b9127b9d27d37b93e2a1e0a746a19683c5483168a42cc689f1f
                                                              • Instruction Fuzzy Hash: 81614C32F1EA4246FB748A3BA81067D6689AF44F72F140239D61DC3AC5DE7DEA00CB00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                              • Instruction ID: a228ef92ef1ce72751b83cceb328c0868551bd4b55fa9426b0ce0964d921a90d
                                                              • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                              • Instruction Fuzzy Hash: 54519276E18E5186EB248B29D04033877A9EB45F79F284131CE8D977A4DF3AE853C780
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                              • Instruction ID: b3df56d4a959312b8cd2e46945abf5e5a0fe8d20c165a6ef392d217c260ca4b2
                                                              • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                              • Instruction Fuzzy Hash: 6951727AE18E5186EB648B29C44023837A5FB69F79F258131DE8D97794CF3AE843C740
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                              • Instruction ID: b70a91a727ae7582d2a7ea0075f490c32ab52a698dea2ab63e336b4d4a7a2501
                                                              • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                              • Instruction Fuzzy Hash: B2518076E18E5182EB249B29D04037833A9EB59F79F244231DE8D97798CF3AE853C740
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                              • Instruction ID: 62bdd3cd456c3245a3c4b27006d222aae4ca4b07404924332af68f0e81bb49dc
                                                              • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                              • Instruction Fuzzy Hash: C8517176E18E5586EB248F29C05023837A9EB45F79F245131DE4D97794DF3AE883C740
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                              • Instruction ID: e4df3c0846b6d713b3f66cab1aaf40765d26182bc8a63d1baaf0e48a3714399b
                                                              • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                              • Instruction Fuzzy Hash: 7F515E76E18A5186EB248B29D04523C27B9EB45F79F254131CE4D977A8CF3AE843C780
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                              • Instruction ID: 5bc2ced10991e3982640025640766f30969cafba89168da766b4db7341777bef
                                                              • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                              • Instruction Fuzzy Hash: CC518436E18E5585EB248B29D04423837A9EB58F79F244131DE4D977A9CF3AE843C740
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                              • Instruction ID: a6cdb2e4bcfd49793a5c9f791cd98da321cbbc3b7774ddb8f6f9ea21ddb1fdee
                                                              • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                              • Instruction Fuzzy Hash: 8941A462C09F8A05EFB9991805086B436A89F22FB3D5892B4DDADD73D7CD0F6587C210
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 1c7003d4bfacf113f63307708dabd17e5ede6cda44dccf6aa27d02a6b9ea0481
                                                              • Instruction ID: 3b7f57490d4f0e4495d2f4443645ee59772f03684998014a3891b7cfa266b427
                                                              • Opcode Fuzzy Hash: 1c7003d4bfacf113f63307708dabd17e5ede6cda44dccf6aa27d02a6b9ea0481
                                                              • Instruction Fuzzy Hash: 8A410432B14E5582EF04CF2AD915569B3AAFB48FE0B499036EE1DD7B58DE3DD4828304
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b8cddb4ee5dd57f1c7573491c8f445712dd312cb7e9e547cfd0f9c072f4c0c7
                                                              • Instruction ID: 8cb5680ab53d488bb3c777d0794dc49dbfa000f32106a3c8a24c9fb4fa4d8b75
                                                              • Opcode Fuzzy Hash: 2b8cddb4ee5dd57f1c7573491c8f445712dd312cb7e9e547cfd0f9c072f4c0c7
                                                              • Instruction Fuzzy Hash: 83319332F19F4281EB649B26A84017E66DDAB85FA1F144239EA9D93BD5DF3CD1028704
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
                                                              • Instruction ID: 51c129abbf64f57bccfcd4a138ff07ab62fb8e3833e401a1d24d134d7a8f9e51
                                                              • Opcode Fuzzy Hash: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
                                                              • Instruction Fuzzy Hash: 6EF04471B2C6958AEB989F69A44362A77D4F708790F409039D58DC7B04DE3C90618F04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c3909751b2697c6481bc0460501d6177e5cf72f77169ad8285d6e0cd944102a
                                                              • Instruction ID: c4a43700a9767572ecf5a7d61c331448fab854b6519ae838b24f90d8ecdf0a78
                                                              • Opcode Fuzzy Hash: 3c3909751b2697c6481bc0460501d6177e5cf72f77169ad8285d6e0cd944102a
                                                              • Instruction Fuzzy Hash: 64A00231D0DC0BD0E7448B02E8901392338FF54B22B804075E00DD50B59F3CA504D760
                                                              APIs
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C5840
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C5852
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C5889
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C589B
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C58B4
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C58C6
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C58DF
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C58F1
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C590D
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C591F
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C593B
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C594D
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C5969
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C597B
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C5997
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C59A9
                                                              • GetProcAddress.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C59C5
                                                              • GetLastError.KERNEL32(?,00007FF6110C64CF,?,00007FF6110C336E), ref: 00007FF6110C59D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                              • API String ID: 199729137-653951865
                                                              • Opcode ID: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                                                              • Instruction ID: 7bc1c394c474a7255306a4eeb88af8b7a031846944806862fea1d62ca540cf55
                                                              • Opcode Fuzzy Hash: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                                                              • Instruction Fuzzy Hash: 2422B364E0AF0792FB15DB57A9146B523ACBF04F76F845475D42EC2260FF3EB6488620
                                                              APIs
                                                                • Part of subcall function 00007FF6110C9390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6110C45F4,00000000,00007FF6110C1985), ref: 00007FF6110C93C9
                                                              • ExpandEnvironmentStringsW.KERNEL32(?,00007FF6110C86B7,?,?,00000000,00007FF6110C3CBB), ref: 00007FF6110C822C
                                                                • Part of subcall function 00007FF6110C2810: MessageBoxW.USER32 ref: 00007FF6110C28EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                              • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                              • API String ID: 1662231829-930877121
                                                              • Opcode ID: 9187bed43bf71c5340eadf58a1920dd2feb36a2730cc38c17813087cef3183ed
                                                              • Instruction ID: e18d6e03d20ae17400245d927bb6120cd8cee20301a5e755bc3cd8d00ced00db
                                                              • Opcode Fuzzy Hash: 9187bed43bf71c5340eadf58a1920dd2feb36a2730cc38c17813087cef3183ed
                                                              • Instruction Fuzzy Hash: 9451F811E1DE4381FB109B26E8553BE6359EF84FB2F444472EA0EC26D5EE3CE6058B24
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                              • String ID: P%
                                                              • API String ID: 2147705588-2959514604
                                                              • Opcode ID: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction ID: 00798d56c99e5d985458be40c8c3a900d24c95214b8e5864841f985893924062
                                                              • Opcode Fuzzy Hash: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction Fuzzy Hash: B751E766A04FA186D7349F26E4181BAB7A1F798B62F004135EFDE83694DF3CD185DB20
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$BlockCreateErrorLastReasonShutdown
                                                              • String ID: Needs to remove its temporary files.
                                                              • API String ID: 3975851968-2863640275
                                                              • Opcode ID: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                                                              • Instruction ID: ec03d303cc9f796647d1e17691b8e075b6bee44df29fdc8c9beedd8abea3b907
                                                              • Opcode Fuzzy Hash: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                                                              • Instruction Fuzzy Hash: E3217421F09E4282E7458B7BA8442796298EF89FB2F584171DE2DC3394DE2CD6518624
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: -$:$f$p$p
                                                              • API String ID: 3215553584-2013873522
                                                              • Opcode ID: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction ID: cd04413ae724e8277cddbe8d2686e3a51dce4760b079f25182cd66caf494ac2c
                                                              • Opcode Fuzzy Hash: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction Fuzzy Hash: 8112B571E0CA4386FF609E14D9542BA76AAFB50F72F844135E689C7AC4DF3CE5848B04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: f$f$p$p$f
                                                              • API String ID: 3215553584-1325933183
                                                              • Opcode ID: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction ID: f496ba4e3fb556e064b13ad7c8fff5fa35686fa7a6d2f4de4c48b19586b12a50
                                                              • Opcode Fuzzy Hash: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction Fuzzy Hash: CA128761E0CA43C6FF245A14E0546B977AAFB40F66FD88135E69A879C8DF7CE4808B50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 51ed2069dcc77bc9e1fc174e345b607b152f4ecc3aa0b3ffe6b3f57d60af99b5
                                                              • Instruction ID: 74337cc19775f23cd1a98368caacd0eeea705370b65dabb9c963787a454eb6d9
                                                              • Opcode Fuzzy Hash: 51ed2069dcc77bc9e1fc174e345b607b152f4ecc3aa0b3ffe6b3f57d60af99b5
                                                              • Instruction Fuzzy Hash: 7D418C21F09E5286EB10DB12A8047BA6399FF84FE6F544472ED4CC7B96DE3CE5058B60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 3b696d39ae73abef91bd768ebae40dec3d094c79cc79aec13009923dda40fe1e
                                                              • Instruction ID: 19731c2c383304c5526fed25c46d8bd2c69a971ee4960a806e613e14831cc427
                                                              • Opcode Fuzzy Hash: 3b696d39ae73abef91bd768ebae40dec3d094c79cc79aec13009923dda40fe1e
                                                              • Instruction Fuzzy Hash: D2418F21E08E42C6EB10DB2294406F97398FF54FA5F484972ED4D87B9ADE3CE542CB60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                                                              • Instruction ID: 2dd3d0bf58a1f14225d832aebdd3ceb69d5137ad22f146525847ab23c5d8204d
                                                              • Opcode Fuzzy Hash: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                                                              • Instruction Fuzzy Hash: 54D1A272E08F518AEB209F25D4403AD7BA8FB45BA9F100175EE4D97796CF38E881CB51
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF6110DF0AA,?,?,0000021763657C48,00007FF6110DAD53,?,?,?,00007FF6110DAC4A,?,?,?,00007FF6110D5F3E), ref: 00007FF6110DEE8C
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF6110DF0AA,?,?,0000021763657C48,00007FF6110DAD53,?,?,?,00007FF6110DAC4A,?,?,?,00007FF6110D5F3E), ref: 00007FF6110DEE98
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                                                              • Instruction ID: 365e625d6362eb986838d322f8dee4b9c15cbe5da6ed1a19ceeab866f18c67f9
                                                              • Opcode Fuzzy Hash: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                                                              • Instruction Fuzzy Hash: DE41A121F19E2281EF16DB16A8006752399BF49FB2F894539ED1DC7794EF3CE9458304
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2C9E
                                                              • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2D63
                                                              • MessageBoxW.USER32 ref: 00007FF6110C2D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentFormatProcess
                                                              • String ID: %ls: $<FormatMessageW failed.>$Error$[PYI-%d:ERROR]
                                                              • API String ID: 3940978338-251083826
                                                              • Opcode ID: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                                                              • Instruction ID: d68917172f1ca6cf069e6c37b4b4cd6eb98fe1128c55a30f9bc319466ac868ae
                                                              • Opcode Fuzzy Hash: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                                                              • Instruction Fuzzy Hash: FC31B822F08E4142E720AB26A8542AB6699BF88FA6F410135EF4DD3B59DF3CD656C710
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF6110CDF7A,?,?,?,00007FF6110CDC6C,?,?,?,00007FF6110CD869), ref: 00007FF6110CDD4D
                                                              • GetLastError.KERNEL32(?,?,?,00007FF6110CDF7A,?,?,?,00007FF6110CDC6C,?,?,?,00007FF6110CD869), ref: 00007FF6110CDD5B
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF6110CDF7A,?,?,?,00007FF6110CDC6C,?,?,?,00007FF6110CD869), ref: 00007FF6110CDD85
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF6110CDF7A,?,?,?,00007FF6110CDC6C,?,?,?,00007FF6110CD869), ref: 00007FF6110CDDF3
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF6110CDF7A,?,?,?,00007FF6110CDC6C,?,?,?,00007FF6110CD869), ref: 00007FF6110CDDFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                                                              • Instruction ID: 0064f86eae20d725bbf74a872b10fe18959218fa4e0a8fc8881a8c6f55291a41
                                                              • Opcode Fuzzy Hash: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                                                              • Instruction Fuzzy Hash: 93318121F1AE4291EF12AB06A4007B9239CFF48FB6F594575ED1D86384DF3CE4448760
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                                                              • API String ID: 2050909247-2434346643
                                                              • Opcode ID: 2df6df0904ecf2e68063807813f252f2c523520ae69ca8fe89000ee1ae80a761
                                                              • Instruction ID: c7f3da6b464188bf14072569819f558757a03e5e11dc1e587e18f037b4ce57f3
                                                              • Opcode Fuzzy Hash: 2df6df0904ecf2e68063807813f252f2c523520ae69ca8fe89000ee1ae80a761
                                                              • Instruction Fuzzy Hash: 9D41AF31E19E8791EB20DB21E8542EA6329FF44B61F800172EA5C83695EF3CF619CB50
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(00000000,?,?,?,00000000,00007FF6110C351A,?,00000000,00007FF6110C3F23), ref: 00007FF6110C2AA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 0$WARNING$Warning$Warning [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-2900015858
                                                              • Opcode ID: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                                                              • Instruction ID: 2a088cbf8fc932345fb973e15d9fad5860502d0a6764f737665b7a1d240f8917
                                                              • Opcode Fuzzy Hash: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                                                              • Instruction Fuzzy Hash: B421A132A19F8182E7209B55F8817E66398FB88BA1F400132FE8D83659DF7CD2458A40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: a42b9cf7ed1ffe71ebcf97f5a72f2c90d2921d4b6bb9ef7954fc9d2fe8c6feaf
                                                              • Instruction ID: ff1c7ac685b9c6934a6a84d0016facfb02c2e295a79126f35239161fd063402c
                                                              • Opcode Fuzzy Hash: a42b9cf7ed1ffe71ebcf97f5a72f2c90d2921d4b6bb9ef7954fc9d2fe8c6feaf
                                                              • Instruction Fuzzy Hash: E0215E24E0DE4382FF6863329A52179564A6F45FB2F448738E93EC7AC6DE2CB8518701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                                                              • Instruction ID: 8ac8d34a352b84f020d6a35977ac9ef0e5856e39be38c99e325dff10f43fa6f2
                                                              • Opcode Fuzzy Hash: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                                                              • Instruction Fuzzy Hash: 30118E21E19E4686E7608B53E85532962A8FB88FF6F400234EA6DC77A4DF3CDA148744
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C8EFD
                                                              • K32EnumProcessModules.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C8F5A
                                                                • Part of subcall function 00007FF6110C9390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6110C45F4,00000000,00007FF6110C1985), ref: 00007FF6110C93C9
                                                              • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C8FE5
                                                              • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C9044
                                                              • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C9055
                                                              • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF6110C3FB1), ref: 00007FF6110C906A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                              • String ID:
                                                              • API String ID: 3462794448-0
                                                              • Opcode ID: 0184f5a771bb2c28f933eba3e4018dda16e38d059dd6d010c17659477659ba58
                                                              • Instruction ID: 2b49a58c8798c70b3d6de66a077707166961274294ddb1ec87bdcf3b1565a129
                                                              • Opcode Fuzzy Hash: 0184f5a771bb2c28f933eba3e4018dda16e38d059dd6d010c17659477659ba58
                                                              • Instruction Fuzzy Hash: 1C41A362E19E8285EB309B12A5003BA7398FB84FE6F454175EF5D97789EE3CE501CB10
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB2D7
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB30D
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB33A
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB34B
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB35C
                                                              • SetLastError.KERNEL32(?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A,?,?,?,?,00007FF6110D718F), ref: 00007FF6110DB377
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 1c08c83365d44066401784e1b70b71c7670d14ff4fb682678828c33d1612b477
                                                              • Instruction ID: e1cb422faf963471925f084204eab3d1e29e9bdec96e8038672871de4dd52ae7
                                                              • Opcode Fuzzy Hash: 1c08c83365d44066401784e1b70b71c7670d14ff4fb682678828c33d1612b477
                                                              • Instruction Fuzzy Hash: 17115E20E0CE4282FF6867265A5117D564A9F45FB2F048734ED3EC76D6DE2CA8525301
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF6110C1B6A), ref: 00007FF6110C295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: %s: %s$Error$Error [ANSI Fallback]$[PYI-%d:ERROR]
                                                              • API String ID: 2050909247-2962405886
                                                              • Opcode ID: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                                                              • Instruction ID: e2af788ce864ceac45b1e5206895006d84ef73243a18b72b6c976e7fea1776cc
                                                              • Opcode Fuzzy Hash: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                                                              • Instruction Fuzzy Hash: 99310832F19E8552E710A766A8402E76298BF88BF5F400132FE8DC3799EF3CD546C610
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                              • String ID: Unhandled exception in script
                                                              • API String ID: 3081866767-2699770090
                                                              • Opcode ID: 851ce5d4a208b56cb63585478e484d0f9d6918564d04618497f061aba15d8534
                                                              • Instruction ID: 2d591b29e1aa11f85cdd113233a07d5365f2b8898766e45096133dceb467ab0a
                                                              • Opcode Fuzzy Hash: 851ce5d4a208b56cb63585478e484d0f9d6918564d04618497f061aba15d8534
                                                              • Instruction Fuzzy Hash: 31317572E19E8285EB20DF22E8552FA6364FF88BA9F440135EA4E87B59DF3CD145C710
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,FFFFFFFF,00000000,00007FF6110C918F,?,00007FF6110C3C55), ref: 00007FF6110C2BA0
                                                              • MessageBoxW.USER32 ref: 00007FF6110C2C2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentMessageProcess
                                                              • String ID: WARNING$Warning$[PYI-%d:%ls]
                                                              • API String ID: 1672936522-3797743490
                                                              • Opcode ID: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                                                              • Instruction ID: dd5984e2f8dbc524548ad039373bab93129a678c78a7a8c99e4a3a3ad19d8b20
                                                              • Opcode Fuzzy Hash: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                                                              • Instruction Fuzzy Hash: 2C21B062B09F4182E7119B15F8447EA73A8FB88BA1F400136EE8D97B59EF3CD255C750
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,?,00000000,00007FF6110C1B99), ref: 00007FF6110C2760
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: ERROR$Error$Error [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-1591803126
                                                              • Opcode ID: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                                                              • Instruction ID: a4442065f277984c687ea427431c35dc999c4b209cf2ce8ce72e85eeefc41148
                                                              • Opcode Fuzzy Hash: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                                                              • Instruction Fuzzy Hash: CC219232E19F8182E720DB55F8817EA6398FB88BA5F400135FE8D93659DF7CD2458B50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                                                              • Instruction ID: 88c1418f7316f47dfd0e9e70c25684aae85bd25ac2de5f248340137511ce6663
                                                              • Opcode Fuzzy Hash: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                                                              • Instruction Fuzzy Hash: DCF06261F0AF0781EF108B26E48537A6328AF49F72F540235DA7E861E4DF2CD148C350
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction ID: 3b90ad92eab95511a51467ba0a186924c0fc0fa62eed8cf2530af37b6e31409f
                                                              • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction Fuzzy Hash: CA119132F5EE0301FB64117BE4A23791058AF59B72E089634FB6ED62DAEE6CAA414100
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,00007FF6110DA5A3,?,?,00000000,00007FF6110DA83E,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DB3AF
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110DA5A3,?,?,00000000,00007FF6110DA83E,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DB3CE
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110DA5A3,?,?,00000000,00007FF6110DA83E,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DB3F6
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110DA5A3,?,?,00000000,00007FF6110DA83E,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DB407
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF6110DA5A3,?,?,00000000,00007FF6110DA83E,?,?,?,?,?,00007FF6110DA7CA), ref: 00007FF6110DB418
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 44f6b3e63c936746b9124b5af5da9c753e88c88086b63197a25bc1506e4861c0
                                                              • Instruction ID: d382858003a08e08d4079a3b3f3de52adf33b7a801279c7dc3bf64318079200c
                                                              • Opcode Fuzzy Hash: 44f6b3e63c936746b9124b5af5da9c753e88c88086b63197a25bc1506e4861c0
                                                              • Instruction Fuzzy Hash: 04112E20F0CE4282FF68A726995127965895F45FB2F488334E93EC77D6DE2CF8528301
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 92671db20a050c4f2636db97a8291f7b9cbb2c044339a59ef12305351f814945
                                                              • Instruction ID: 14ebc45b24863582b71698aac288560662e3c4b821ccb317dc0e6a28f01ac6a6
                                                              • Opcode Fuzzy Hash: 92671db20a050c4f2636db97a8291f7b9cbb2c044339a59ef12305351f814945
                                                              • Instruction Fuzzy Hash: FB110C25E08E0782FF686262485217E154A5F46F72F148738E93ECA6D6DD2CB8514315
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: verbose
                                                              • API String ID: 3215553584-579935070
                                                              • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction ID: 49e9952057b896356444bf16cdf82c5b8b7dd1e0672634888e70f53a1538a10f
                                                              • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction Fuzzy Hash: A491C032E08E4681FF618E25D85137E37A9AB44FA6F484136DA9EC73D6DE3DE8458301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                              • API String ID: 3215553584-1196891531
                                                              • Opcode ID: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                                                              • Instruction ID: bae8b9333d7d956619bcd370b7a5b9d5250aebbb0e66c0a7f89d6d4262f6aa38
                                                              • Opcode Fuzzy Hash: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                                                              • Instruction Fuzzy Hash: F781B072E08A4385FF64AF29810027836A9AF11FAAF55C039CA1DD72C5CF2DE9039703
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 2395640692-1018135373
                                                              • Opcode ID: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                                                              • Instruction ID: aae15b6cc099106f07497fd23a5be592cd1af9ac406fe467b82614a1ab3aa3cb
                                                              • Opcode Fuzzy Hash: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                                                              • Instruction Fuzzy Hash: 2451A032E19E428ADB148B15D444B7D7399FB44FA9F108275EA4D87784EF7CE841CB90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                                                              • Instruction ID: c10e9d20dfcb96a6dccaef3171cd3c8e4b59388ba85b0ddced1a1ae264e8ce72
                                                              • Opcode Fuzzy Hash: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                                                              • Instruction Fuzzy Hash: 4F518F72E08A4286EB748B21904436977A8EB55FA6F14817ADA4D87BC5CF3CE450CB13
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                                                              • Instruction ID: d5c49967752c917c335bc5206e5a2346adc7a9df4aefd3284e29114b48a60d40
                                                              • Opcode Fuzzy Hash: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                                                              • Instruction Fuzzy Hash: F8619132D08BC585DB308B15E4403AABBA4FB85BA5F144225EB9C83B99CF7CD190CB11
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Message
                                                              • String ID: ERROR$Error$[PYI-%d:%ls]
                                                              • API String ID: 2030045667-255084403
                                                              • Opcode ID: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                                                              • Instruction ID: da7874628e2a496b5b272422ee31edaee0b93a5ad2992f07d56cbcc3b3899357
                                                              • Opcode Fuzzy Hash: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                                                              • Instruction Fuzzy Hash: E621AE62B09F4182E7219B15F8447EA73A8EB88BA1F400136EE8D93659EF3CD259C750
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                                                              • Instruction ID: 54bbccfe7a8fca24320a666dfacbb39a2068a69ed441d4c63e95689c435677f6
                                                              • Opcode Fuzzy Hash: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                                                              • Instruction Fuzzy Hash: C8D11372F09E818AEB10CF65C5442AC77B9FB14BA9B00423ADE5ED7B89DE38D406C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$DialogInvalidateRect
                                                              • String ID:
                                                              • API String ID: 1956198572-0
                                                              • Opcode ID: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction ID: 8a90202cb0dc1fff66367969d8b1727c8ac412a1fffbcfd70a0403426cd9c58d
                                                              • Opcode Fuzzy Hash: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction Fuzzy Hash: 1511C625E0C94282F755876BE5443795296EB94FA1F444031EE4D47F9ACD3DD5818610
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo
                                                              • String ID: ?
                                                              • API String ID: 1286766494-1684325040
                                                              • Opcode ID: 21862b7f5a6063227688de7d7fc5fbfc7fa1fb1d7946118fe9e576ba790fa6aa
                                                              • Instruction ID: 481316a532037d8c3595f55affa686e7f089f86f1f2e69c8e127de15a0ba5961
                                                              • Opcode Fuzzy Hash: 21862b7f5a6063227688de7d7fc5fbfc7fa1fb1d7946118fe9e576ba790fa6aa
                                                              • Instruction Fuzzy Hash: A4417626E0AA8246FB608B23D41137A6768EB80FB5F104635EF5C86AD5EF3DD5418B00
                                                              APIs
                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6110D9046
                                                                • Part of subcall function 00007FF6110DA948: RtlFreeHeap.NTDLL(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA95E
                                                                • Part of subcall function 00007FF6110DA948: GetLastError.KERNEL32(?,?,?,00007FF6110E2D22,?,?,?,00007FF6110E2D5F,?,?,00000000,00007FF6110E3225,?,?,?,00007FF6110E3157), ref: 00007FF6110DA968
                                                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6110CCBA5), ref: 00007FF6110D9064
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                              • String ID: C:\Users\user\Desktop\HxYqlJEUcq.exe
                                                              • API String ID: 3580290477-521089148
                                                              • Opcode ID: 136b352ca89953b7aac46d199a587659114d0cf60bae53edf27061cb20026a80
                                                              • Instruction ID: fe71fc60095c8c6f50eb071a6f1c697eb047df1c849ac987ab016ac38774d645
                                                              • Opcode Fuzzy Hash: 136b352ca89953b7aac46d199a587659114d0cf60bae53edf27061cb20026a80
                                                              • Instruction Fuzzy Hash: 52415B36E08F5286EB15DF25E8410BD67A9EB84FE1B554039EA4EC7B85EF3CE4918300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                                                              • Instruction ID: de9d47c94056247cdf68515bbf8eb09f628a160aaf4e851da2dff994e340f726
                                                              • Opcode Fuzzy Hash: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                                                              • Instruction Fuzzy Hash: DF41B322B19E4581DB209F25E8443AA7768FB88BA5F404135EE4EC7798DF3CD541C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory
                                                              • String ID: :
                                                              • API String ID: 1611563598-336475711
                                                              • Opcode ID: 9aa1b1c0966d0181e71a7442aa19fd9d8a3a06258be719e39fc35e3b215e25b0
                                                              • Instruction ID: e3e136ee3620b79158aa815a68de871c1a2bd46acdab687cba4745281145565e
                                                              • Opcode Fuzzy Hash: 9aa1b1c0966d0181e71a7442aa19fd9d8a3a06258be719e39fc35e3b215e25b0
                                                              • Instruction Fuzzy Hash: 7821F872E08A8181EF20DB21D04427D73B9FB88F95F468039D68DC3A94DF7CE9468B51
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                                                              • Instruction ID: 8400e50e29352a01cef7cb3123c9876fa75983e4e21eeadc9ef654aed3eb9616
                                                              • Opcode Fuzzy Hash: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                                                              • Instruction Fuzzy Hash: 34115B32A09F8182EB218F16E440269B7E9FB88F99F184234EB8D47768DF3CC5518B00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2984857612.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000000.00000002.2984810097.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984930781.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2984986982.00007FF611102000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2985080029.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: DriveType_invalid_parameter_noinfo
                                                              • String ID: :
                                                              • API String ID: 2595371189-336475711
                                                              • Opcode ID: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                                                              • Instruction ID: 60f545bc030b4f9774788fa84b4302b355d646eebde63be0eff3b8507ceb29c9
                                                              • Opcode Fuzzy Hash: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                                                              • Instruction Fuzzy Hash: 1201A721E1CA0386FB20DF62946527E23A4FF44F66F850436E98DC2695DF3CD6448B14

                                                              Execution Graph

                                                              Execution Coverage:3.4%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:1.1%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:74
                                                              execution_graph 132798 7ffe0136e825 132801 7ffe0136f2f0 132798->132801 132800 7ffe0136e836 132802 7ffe0136f306 132801->132802 132803 7ffe0136f335 132801->132803 132802->132800 132804 7ffe0136f3b8 132803->132804 132805 7ffe0136f3f6 132803->132805 132808 7ffe01370610 132803->132808 132804->132800 132821 7ffe013715c0 132805->132821 132809 7ffe01370631 132808->132809 132815 7ffe013706fa 132808->132815 132810 7ffe013715c0 6 API calls 132809->132810 132809->132815 132811 7ffe01370681 132810->132811 132831 7ffe01370a30 132811->132831 132814 7ffe01370a30 7 API calls 132816 7ffe0137069f 132814->132816 132815->132803 132816->132815 132819 7ffe01370942 MoveWindow 132816->132819 132837 7ffe013d5610 132816->132837 132846 7ffe0136c040 8 API calls 132816->132846 132847 7ffe013d5850 8 API calls 132816->132847 132819->132816 132822 7ffe013715db 132821->132822 132829 7ffe01371699 132822->132829 132879 7ffe013718e0 memset memset 132822->132879 132825 7ffe0137163a 132827 7ffe01371663 memcpy memset 132825->132827 132825->132829 132826 7ffe013716b8 132828 7ffe013716e3 memcpy memset 132826->132828 132830 7ffe0137171a 132826->132830 132827->132829 132828->132830 132829->132830 132880 7ffe013718e0 memset memset 132829->132880 132830->132804 132832 7ffe01370a71 132831->132832 132834 7ffe01370cd9 memcpy 132832->132834 132836 7ffe01370d6b 132832->132836 132834->132832 132848 7ffe013ffb70 132836->132848 132838 7ffe013d5637 132837->132838 132845 7ffe013d565b 132837->132845 132841 7ffe013d565d 132838->132841 132842 7ffe013d5653 132838->132842 132838->132845 132839 7ffe013ffb70 6 API calls 132840 7ffe013d56c6 132839->132840 132840->132816 132864 7ffe0131d140 132841->132864 132857 7ffe0131f430 132842->132857 132845->132839 132846->132816 132847->132816 132849 7ffe013ffb79 132848->132849 132850 7ffe0137068f 132849->132850 132851 7ffe013ffbc4 IsProcessorFeaturePresent 132849->132851 132850->132814 132852 7ffe013ffbdc 132851->132852 132853 7ffe013ffbe3 capture_previous_context 132851->132853 132852->132853 132856 7ffe013ffb90 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 132853->132856 132858 7ffe0131f45d 132857->132858 132859 7ffe0131f46a 132858->132859 132869 7ffe0131d8b0 132858->132869 132861 7ffe0131f473 132859->132861 132862 7ffe0131f4d3 ShowWindow 132859->132862 132861->132845 132862->132861 132865 7ffe0131d16e ShowWindow 132864->132865 132868 7ffe0131d166 132864->132868 132865->132868 132866 7ffe013ffb70 6 API calls 132867 7ffe0131d2ad 132866->132867 132867->132845 132868->132866 132871 7ffe0131d8db 132869->132871 132870 7ffe0131da2d 132870->132859 132871->132870 132872 7ffe0131d955 GetModuleHandleW 132871->132872 132873 7ffe0131d964 132871->132873 132872->132873 132874 7ffe0131d98b GetModuleHandleW 132873->132874 132875 7ffe0131d99a LoadIconW 132873->132875 132878 7ffe0131d9b1 132873->132878 132874->132875 132877 7ffe0131da0b LoadCursorW RegisterClassW 132875->132877 132876 7ffe0131da76 132876->132859 132877->132870 132878->132876 132878->132877 132879->132825 132880->132826 132881 7ffe01325d60 132883 7ffe01325d71 132881->132883 132885 7ffe01325d7b 132881->132885 132882 7ffe01327417 132883->132882 132887 7ffe01327463 132883->132887 132896 7ffe013273db 132883->132896 132900 7ffe013273f1 132883->132900 132884 7ffe013273fa 132914 7ffe01327680 41 API calls 132884->132914 132886 7ffe01325df0 132885->132886 132891 7ffe01325da8 SendMessageW 132885->132891 132889 7ffe0132746e 132887->132889 132890 7ffe01327600 132887->132890 132894 7ffe01327479 132889->132894 132895 7ffe013275dd 132889->132895 132918 7ffe013282c0 8 API calls 132890->132918 132891->132886 132892 7ffe0132740e 132897 7ffe01327412 132892->132897 132898 7ffe0132744d DefWindowProcW 132892->132898 132894->132884 132899 7ffe01327482 132894->132899 132895->132882 132902 7ffe013275e6 132895->132902 132896->132882 132896->132900 132901 7ffe01327448 132896->132901 132897->132882 132898->132882 132899->132898 132904 7ffe0132748b ImmGetContext 132899->132904 132900->132882 132900->132884 132915 7ffe01327960 30 API calls 132901->132915 132917 7ffe01327680 41 API calls 132902->132917 132904->132898 132906 7ffe01327499 ImmGetCompositionStringW 132904->132906 132907 7ffe013274b7 ImmGetCompositionStringW 132906->132907 132908 7ffe013275cc ImmReleaseContext 132906->132908 132910 7ffe013274eb 132907->132910 132908->132882 132916 7ffe0131ba40 11 API calls 132910->132916 132912 7ffe01327564 GetTickCount 132913 7ffe0132757e 132912->132913 132913->132908 132914->132892 132915->132898 132916->132912 132917->132897 132918->132882 132919 7ffdff309080 132921 7ffdff3090ba 132919->132921 132923 7ffdff3090f1 132921->132923 132931 7ffdff2fcea0 132921->132931 133002 7ffdff3a21a0 132923->133002 132925 7ffdff309120 132969 7ffdff309480 132925->132969 132927 7ffdff3091dc _errno 132927->132923 132928 7ffdff309143 132928->132927 132929 7ffdff309158 132928->132929 132929->132923 132930 7ffdff309480 167 API calls 132929->132930 132930->132923 132932 7ffdff2fcef8 132931->132932 132934 7ffdff2fceea 132931->132934 132933 7ffdff2fcf2f 132932->132933 132932->132934 132935 7ffdff2fcf59 132933->132935 133100 7ffdff2fe420 131 API calls 132933->133100 132956 7ffdff2fcf25 132934->132956 133098 7ffdff355130 116 API calls 132934->133098 132944 7ffdff2fd000 132935->132944 132935->132956 133101 7ffdff2fe3a0 _errno 132935->133101 132938 7ffdff2fcf1a 133099 7ffdff34cb20 53 API calls 132938->133099 132941 7ffdff2fcf96 132941->132944 133102 7ffdff2fec30 127 API calls 132941->133102 132943 7ffdff2fcfa4 132943->132944 132946 7ffdff2fcfad 132943->132946 132945 7ffdff2fd21e 132944->132945 132947 7ffdff2fd1e0 132944->132947 132948 7ffdff2fd0f0 132944->132948 133103 7ffdff2fe3a0 _errno 132946->133103 132947->132956 133011 7ffdff2fd730 132947->133011 132949 7ffdff2fd136 132948->132949 132958 7ffdff2fd11f 132948->132958 132952 7ffdff2fd13d 132949->132952 132959 7ffdff2fd160 132949->132959 133106 7ffdff2fc7d0 TlsGetValue 132952->133106 132954 7ffdff2fcfc1 132954->132956 133104 7ffdff2fec30 127 API calls 132954->133104 132956->132925 133105 7ffdff2fd370 670 API calls 132958->133105 132959->132956 132961 7ffdff2fd1a9 132959->132961 132962 7ffdff2fd1bd 132959->132962 133107 7ffdff2fd5a0 671 API calls 132959->133107 133108 7ffdff2fd370 670 API calls 132961->133108 133109 7ffdff338170 39 API calls 132962->133109 132965 7ffdff2fd1c6 133110 7ffdff34cb20 53 API calls 132965->133110 132967 7ffdff2fd1d2 133111 7ffdff2fe1b0 128 API calls 132967->133111 132970 7ffdff309495 132969->132970 132972 7ffdff3095b4 132969->132972 132971 7ffdff30949d 132970->132971 132970->132972 133338 7ffdff3054d0 TlsGetValue 132971->133338 132984 7ffdff309480 167 API calls 132972->132984 132995 7ffdff3409a5 132972->132995 132999 7ffdff340982 132972->132999 133370 7ffdff3412c0 69 API calls 132972->133370 133371 7ffdff341050 53 API calls 132972->133371 133372 7ffdff340af0 166 API calls 132972->133372 132976 7ffdff30955b 132981 7ffdff3057b0 50 API calls 132976->132981 132977 7ffdff3094b9 132978 7ffdff3094fc 132977->132978 132983 7ffdff3094ea 132977->132983 132990 7ffdff309521 132977->132990 133360 7ffdff3412c0 69 API calls 132977->133360 132978->132976 132980 7ffdff309517 132978->132980 132978->132990 133363 7ffdff3057b0 TlsGetValue 132980->133363 132985 7ffdff30951c 132981->132985 133361 7ffdff341050 53 API calls 132983->133361 132984->132972 132985->132928 132990->132976 132992 7ffdff309578 132990->132992 132991 7ffdff3094f2 133362 7ffdff340af0 166 API calls 132991->133362 132994 7ffdff309591 132992->132994 133368 7ffdff340af0 166 API calls 132992->133368 133000 7ffdff3095a6 132994->133000 133369 7ffdff305840 50 API calls 132994->133369 132995->132999 133373 7ffdff305840 50 API calls 132995->133373 132999->132928 133001 7ffdff3057b0 50 API calls 133000->133001 133001->132985 133003 7ffdff3a21a9 133002->133003 133004 7ffdff3a21f4 IsProcessorFeaturePresent 133003->133004 133005 7ffdff3091cf 133003->133005 133006 7ffdff3a220c 133004->133006 133380 7ffdff3a23e8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 133006->133380 133008 7ffdff3a221f 133381 7ffdff3a21c0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 133008->133381 133012 7ffdff2fd79b 133011->133012 133069 7ffdff2fd7a5 133011->133069 133012->133069 133161 7ffdff3613e0 133012->133161 133013 7ffdff2fdcff 133015 7ffdff2fde26 133013->133015 133017 7ffdff2fdd42 133013->133017 133190 7ffdff2fe1b0 128 API calls 133015->133190 133016 7ffdff2fdbfd _errno 133021 7ffdff2fdc0d 133016->133021 133187 7ffdff336560 29 API calls 133017->133187 133018 7ffdff2fdd01 133026 7ffdff2fdd18 133018->133026 133185 7ffdff3610c0 28 API calls 133018->133185 133019 7ffdff2fdbf8 133019->133013 133019->133018 133024 7ffdff2fdcf7 133019->133024 133027 7ffdff2fdc74 133021->133027 133031 7ffdff3613e0 28 API calls 133021->133031 133023 7ffdff2fdb5c _errno 133030 7ffdff2fdb6f 133023->133030 133184 7ffdff336360 53 API calls 133024->133184 133025 7ffdff2fde2e 133034 7ffdff2fde3b 133025->133034 133035 7ffdff2fde4a 133025->133035 133065 7ffdff2fdb28 133025->133065 133186 7ffdff361580 24 API calls 133026->133186 133027->133019 133183 7ffdff336360 53 API calls 133027->133183 133028 7ffdff2fdd47 133188 7ffdff2fe1b0 128 API calls 133028->133188 133036 7ffdff2fdbd3 133030->133036 133041 7ffdff3613e0 28 API calls 133030->133041 133038 7ffdff2fdc20 133031->133038 133191 7ffdff34cb20 53 API calls 133034->133191 133192 7ffdff338170 39 API calls 133035->133192 133036->133019 133180 7ffdff336360 53 API calls 133036->133180 133048 7ffdff2fdc69 133038->133048 133049 7ffdff2fdc76 _errno 133038->133049 133039 7ffdff2fdd54 133189 7ffdff347710 LeaveCriticalSection LeaveCriticalSection TlsGetValue 133039->133189 133044 7ffdff2fdb7e 133041->133044 133044->133049 133055 7ffdff2fdbc8 133044->133055 133181 7ffdff352d50 166 API calls 133048->133181 133182 7ffdff347040 strerror 133049->133182 133051 7ffdff2fde57 133193 7ffdff34cb20 53 API calls 133051->133193 133179 7ffdff352d50 166 API calls 133055->133179 133065->132956 133069->133016 133069->133019 133069->133021 133069->133023 133069->133030 133070 7ffdff2fde7f 133069->133070 133073 7ffdff2fdb00 133069->133073 133096 7ffdff2fdac2 133069->133096 133112 7ffdff2f9850 133069->133112 133127 7ffdff2f7c40 133069->133127 133173 7ffdff2fdeb0 69 API calls 133069->133173 133174 7ffdff2fc7d0 TlsGetValue 133069->133174 133073->133065 133074 7ffdff2fdb2f 133073->133074 133078 7ffdff2fdb20 133073->133078 133075 7ffdff2fdb46 133074->133075 133177 7ffdff3610c0 28 API calls 133074->133177 133178 7ffdff361580 24 API calls 133075->133178 133176 7ffdff336360 53 API calls 133078->133176 133096->133073 133175 7ffdff2fc7d0 TlsGetValue 133096->133175 133098->132938 133099->132956 133100->132935 133101->132941 133102->132943 133103->132954 133104->132956 133105->132956 133107->132959 133108->132956 133109->132965 133110->132967 133111->132956 133113 7ffdff2f9878 133112->133113 133114 7ffdff2f98a8 133113->133114 133115 7ffdff2f98a1 133113->133115 133120 7ffdff2f98a6 133113->133120 133210 7ffdff352700 30 API calls 133114->133210 133209 7ffdff262970 29 API calls 133115->133209 133118 7ffdff2f98c6 133118->133069 133120->133118 133123 7ffdff2f9a45 133120->133123 133194 7ffdff2f9af0 133120->133194 133211 7ffdff262d20 166 API calls 133120->133211 133212 7ffdff3610c0 28 API calls 133120->133212 133122 7ffdff2f9a8a 133122->133118 133214 7ffdff3610c0 28 API calls 133122->133214 133123->133118 133123->133122 133213 7ffdff3610c0 28 API calls 133123->133213 133128 7ffdff2f7cb8 133127->133128 133129 7ffdff2f7cbd 133127->133129 133330 7ffdff2f7b10 28 API calls 133128->133330 133130 7ffdff2f7cde memchr 133129->133130 133153 7ffdff2f7cf3 133129->133153 133130->133153 133132 7ffdff3a21a0 8 API calls 133133 7ffdff2f812c 133132->133133 133133->133069 133134 7ffdff2f80d3 133135 7ffdff2f8107 _errno 133134->133135 133160 7ffdff2f80cc 133134->133160 133135->133160 133136 7ffdff2f7d70 memcpy 133136->133153 133137 7ffdff2f8140 133138 7ffdff3613e0 28 API calls 133137->133138 133150 7ffdff2f818a 133138->133150 133139 7ffdff2f8203 133140 7ffdff2f825f 133139->133140 133144 7ffdff2f8239 133139->133144 133146 7ffdff2f821f 133139->133146 133140->133069 133141 7ffdff2f7ffc memcpy 133141->133153 133142 7ffdff2f81f7 133333 7ffdff36cde0 TlsGetValue memcpy memcpy 133142->133333 133147 7ffdff2f8250 133144->133147 133335 7ffdff3610c0 28 API calls 133144->133335 133145 7ffdff2f8271 133337 7ffdff2fac30 56 API calls 133145->133337 133334 7ffdff336360 53 API calls 133146->133334 133336 7ffdff361580 24 API calls 133147->133336 133150->133139 133150->133142 133150->133145 133151 7ffdff2f8227 133151->133069 133153->133134 133153->133136 133153->133137 133153->133141 133154 7ffdff2f7fb4 memchr 133153->133154 133156 7ffdff2f80bf 133153->133156 133153->133160 133331 7ffdff3610c0 28 API calls 133153->133331 133154->133153 133156->133160 133332 7ffdff3610c0 28 API calls 133156->133332 133159 7ffdff2f82d0 133159->133069 133160->133132 133162 7ffdff36140c TlsGetValue 133161->133162 133163 7ffdff3613ed TlsAlloc 133161->133163 133165 7ffdff361429 GetLastError 133162->133165 133166 7ffdff361437 133162->133166 133163->133162 133165->133166 133167 7ffdff360d70 22 API calls 133166->133167 133171 7ffdff361441 133166->133171 133167->133171 133168 7ffdff361529 133168->133069 133169 7ffdff3614c1 LeaveCriticalSection 133169->133168 133170 7ffdff3614d7 GetProcessHeap HeapAlloc 133169->133170 133172 7ffdff3614fd 133170->133172 133171->133168 133171->133169 133171->133171 133172->133168 133172->133172 133173->133069 133176->133065 133177->133075 133178->133065 133179->133036 133180->133019 133181->133027 133183->133019 133184->133013 133185->133026 133186->133013 133187->133028 133188->133039 133190->133025 133191->133065 133192->133051 133193->133065 133195 7ffdff2f9b3f 133194->133195 133197 7ffdff2fa155 133195->133197 133215 7ffdff3530b0 133195->133215 133200 7ffdff2fa109 133224 7ffdff352700 30 API calls 133200->133224 133201 7ffdff2f9dd8 133201->133197 133201->133200 133204 7ffdff2fa0b8 memcpy 133201->133204 133203 7ffdff2fa13e 133203->133120 133205 7ffdff2fa0e1 133204->133205 133223 7ffdff352700 30 API calls 133205->133223 133207 7ffdff2fa0f4 133208 7ffdff2f9af0 112 API calls 133207->133208 133208->133200 133209->133120 133210->133120 133211->133120 133212->133120 133213->133122 133214->133118 133216 7ffdff2f9bea 133215->133216 133218 7ffdff3530b9 133215->133218 133222 7ffdff2fa180 69 API calls 133216->133222 133217 7ffdff35319a 133218->133217 133219 7ffdff35313c 133218->133219 133225 7ffdff3516b0 133218->133225 133219->133216 133220 7ffdff353167 memmove 133219->133220 133220->133216 133222->133201 133223->133207 133224->133203 133226 7ffdff3516e0 133225->133226 133227 7ffdff351726 133226->133227 133228 7ffdff35173e TlsAlloc 133226->133228 133229 7ffdff35175d TlsGetValue 133226->133229 133289 7ffdff351945 133226->133289 133230 7ffdff3519c2 TlsAlloc 133227->133230 133231 7ffdff3519e1 TlsGetValue 133227->133231 133242 7ffdff3517df 133227->133242 133227->133289 133228->133229 133228->133242 133238 7ffdff351775 GetLastError 133229->133238 133247 7ffdff351788 133229->133247 133230->133231 133230->133242 133239 7ffdff3519f9 GetLastError 133231->133239 133248 7ffdff351a0c 133231->133248 133232 7ffdff351c64 TlsAlloc 133233 7ffdff351c83 TlsGetValue 133232->133233 133232->133242 133237 7ffdff351c9b GetLastError 133233->133237 133250 7ffdff351cae 133233->133250 133241 7ffdff351ca9 133237->133241 133237->133242 133238->133242 133243 7ffdff351783 133238->133243 133240 7ffdff351a07 133239->133240 133239->133242 133245 7ffdff360d70 22 API calls 133240->133245 133244 7ffdff360d70 22 API calls 133241->133244 133242->133219 133290 7ffdff360d70 133243->133290 133244->133250 133245->133248 133247->133242 133249 7ffdff351807 GetProcessHeap HeapReAlloc 133247->133249 133255 7ffdff3517b6 133247->133255 133248->133242 133253 7ffdff351abc GetProcessHeap HeapReAlloc 133248->133253 133254 7ffdff351a39 133248->133254 133249->133227 133250->133242 133251 7ffdff351d63 133250->133251 133252 7ffdff351d1d GetProcessHeap HeapReAlloc 133250->133252 133251->133242 133258 7ffdff351d76 memcpy 133251->133258 133252->133242 133253->133289 133254->133242 133256 7ffdff351b14 memcpy 133254->133256 133254->133289 133255->133227 133255->133242 133257 7ffdff35185e memcpy 133255->133257 133259 7ffdff351b37 TlsAlloc 133256->133259 133260 7ffdff351b56 TlsGetValue 133256->133260 133261 7ffdff35187f TlsAlloc 133257->133261 133262 7ffdff35189e TlsGetValue 133257->133262 133263 7ffdff351d99 TlsAlloc 133258->133263 133264 7ffdff351db8 TlsGetValue 133258->133264 133259->133242 133259->133260 133268 7ffdff351b81 133260->133268 133269 7ffdff351b6e GetLastError 133260->133269 133261->133242 133261->133262 133270 7ffdff3518c9 133262->133270 133271 7ffdff3518b6 GetLastError 133262->133271 133263->133242 133263->133264 133272 7ffdff351dde 133264->133272 133273 7ffdff351dd0 GetLastError 133264->133273 133268->133242 133280 7ffdff351ba8 GetProcessHeap HeapFree 133268->133280 133284 7ffdff351bfa 133268->133284 133269->133242 133274 7ffdff351b7c 133269->133274 133270->133242 133281 7ffdff3518e9 GetProcessHeap HeapFree 133270->133281 133283 7ffdff351954 133270->133283 133271->133242 133275 7ffdff3518c4 133271->133275 133276 7ffdff351de8 133272->133276 133279 7ffdff360d70 22 API calls 133272->133279 133273->133242 133273->133272 133277 7ffdff360d70 22 API calls 133274->133277 133278 7ffdff360d70 22 API calls 133275->133278 133276->133242 133282 7ffdff351e0d GetProcessHeap HeapFree 133276->133282 133286 7ffdff351e40 133276->133286 133277->133268 133278->133270 133279->133276 133280->133289 133281->133227 133282->133242 133283->133227 133321 7ffdff361890 LeaveCriticalSection 133283->133321 133284->133289 133322 7ffdff361890 LeaveCriticalSection 133284->133322 133286->133242 133323 7ffdff361890 LeaveCriticalSection 133286->133323 133289->133232 133289->133233 133289->133242 133291 7ffdff360d8d 133290->133291 133292 7ffdff360ea7 133290->133292 133293 7ffdff360dad 133291->133293 133294 7ffdff360d96 InitializeCriticalSection 133291->133294 133324 7ffdff3a0df0 133292->133324 133300 7ffdff360e9a LeaveCriticalSection 133293->133300 133301 7ffdff360dc7 malloc 133293->133301 133294->133293 133296 7ffdff360eac 133297 7ffdff360eb4 GetProcessHeap HeapAlloc 133296->133297 133298 7ffdff360f2f 133296->133298 133299 7ffdff360ed3 memset 133297->133299 133305 7ffdff360f42 133297->133305 133298->133247 133302 7ffdff3a0960 133299->133302 133300->133292 133303 7ffdff360dde InitializeCriticalSection malloc 133301->133303 133310 7ffdff360f4f 133301->133310 133304 7ffdff360eef LeaveCriticalSection GetCurrentThreadId TlsSetValue 133302->133304 133306 7ffdff360e09 InitializeCriticalSection 133303->133306 133303->133310 133304->133298 133304->133310 133305->133310 133307 7ffdff360e30 malloc 133306->133307 133309 7ffdff360e7e InitializeCriticalSection 133307->133309 133307->133310 133309->133300 133309->133307 133311 7ffdff360f81 TlsAlloc 133310->133311 133312 7ffdff360fa0 TlsGetValue 133311->133312 133316 7ffdff3610a4 133311->133316 133314 7ffdff360fbd GetLastError 133312->133314 133315 7ffdff360fcb 133312->133315 133314->133315 133314->133316 133317 7ffdff360fd5 GetProcessHeap HeapAlloc 133315->133317 133318 7ffdff360d70 3 API calls 133315->133318 133320 7ffdff361012 133317->133320 133318->133317 133320->133247 133321->133227 133322->133289 133323->133242 133325 7ffdff3a0e18 TlsGetValue 133324->133325 133326 7ffdff3a0dfd TlsAlloc 133324->133326 133328 7ffdff3a0e35 GetLastError 133325->133328 133329 7ffdff3a0e3f 133325->133329 133326->133325 133326->133329 133328->133329 133329->133296 133330->133129 133331->133153 133332->133160 133333->133139 133334->133151 133335->133147 133336->133140 133337->133159 133341 7ffdff3054f9 133338->133341 133339 7ffdff30555a 133340 7ffdff30557b TlsGetValue 133339->133340 133354 7ffdff3056cc 133339->133354 133346 7ffdff305599 133340->133346 133341->133339 133342 7ffdff305536 133341->133342 133343 7ffdff3056f2 133341->133343 133374 7ffdff361d40 49 API calls 133342->133374 133344 7ffdff3055e5 133344->133343 133349 7ffdff305679 LeaveCriticalSection 133344->133349 133346->133343 133346->133344 133347 7ffdff3055c2 133346->133347 133375 7ffdff361d40 49 API calls 133347->133375 133350 7ffdff30569a 133349->133350 133351 7ffdff3056b8 133349->133351 133350->133351 133376 7ffdff3610c0 28 API calls 133350->133376 133351->133354 133377 7ffdff2d1d10 49 API calls 133351->133377 133355 7ffdff305720 TlsGetValue 133354->133355 133356 7ffdff305743 133355->133356 133357 7ffdff305768 133356->133357 133358 7ffdff30578b 133356->133358 133378 7ffdff361d40 49 API calls 133357->133378 133358->132977 133360->132983 133361->132991 133362->132978 133364 7ffdff3057d3 133363->133364 133365 7ffdff3057f8 133364->133365 133366 7ffdff30581b 133364->133366 133379 7ffdff361d40 49 API calls 133365->133379 133366->132985 133368->132994 133369->133000 133370->132972 133371->132972 133372->132972 133373->132999 133374->133339 133375->133344 133376->133350 133377->133354 133378->133358 133379->133366 133380->133008 133382 7ffe0139ea8b 133388 7ffe0139e730 133382->133388 133385 7ffe0139eb1e MoveWindow 133385->133388 133386 7ffe013d5610 13 API calls 133386->133388 133387 7ffe0139ebe3 133388->133385 133388->133386 133388->133387 133389 7ffe0136c040 8 API calls 133388->133389 133390 7ffe013d5850 8 API calls 133388->133390 133389->133388 133390->133388 133391 7ffe0136b120 133392 7ffe0136b136 133391->133392 133393 7ffe013d5610 13 API calls 133392->133393 133394 7ffe0136b174 133392->133394 133393->133394 133395 7ffdff26a910 133396 7ffdff26a923 133395->133396 133397 7ffdff26a93c 133395->133397 133436 7ffdff2ec570 166 API calls 133396->133436 133402 7ffdff2c5580 133397->133402 133400 7ffdff26a932 133401 7ffdff26a941 133403 7ffdff3613e0 28 API calls 133402->133403 133409 7ffdff2c55a0 133403->133409 133404 7ffdff2c5735 LeaveCriticalSection 133437 7ffdff2c47f0 133404->133437 133408 7ffdff2c5753 133421 7ffdff2c576d 133408->133421 133485 7ffdff2ba4a0 116 API calls 133408->133485 133409->133404 133411 7ffdff3613e0 28 API calls 133409->133411 133416 7ffdff2c56a4 memcpy 133409->133416 133419 7ffdff2c572d 133409->133419 133423 7ffdff2c58a5 133409->133423 133410 7ffdff2c57fd 133413 7ffdff2c586a 133410->133413 133487 7ffdff3125e0 116 API calls 133410->133487 133411->133409 133488 7ffdff34cb20 53 API calls 133413->133488 133415 7ffdff2c5875 133489 7ffdff2ea980 133415->133489 133416->133409 133418 7ffdff2c587e 133418->133401 133419->133404 133421->133410 133422 7ffdff2c57db 133421->133422 133421->133423 133422->133410 133486 7ffdff2b9ec0 53 API calls 133422->133486 133427 7ffdff2c5902 LeaveCriticalSection 133423->133427 133432 7ffdff2c58e0 133423->133432 133427->133432 133428 7ffdff2c597e LeaveCriticalSection 133429 7ffdff2c599e 133428->133429 133431 7ffdff2c59b3 LeaveCriticalSection 133429->133431 133430 7ffdff2c58ed 133430->133401 133431->133401 133432->133428 133432->133430 133433 7ffdff2c5976 133432->133433 133503 7ffdff3610c0 28 API calls 133432->133503 133504 7ffdff3610c0 28 API calls 133433->133504 133436->133400 133438 7ffdff36e710 83 API calls 133437->133438 133439 7ffdff2c4821 133438->133439 133440 7ffdff2c4844 133439->133440 133546 7ffdff313d50 116 API calls 133439->133546 133505 7ffdff2bb590 28 API calls 133440->133505 133443 7ffdff3613e0 28 API calls 133456 7ffdff2c4883 133443->133456 133445 7ffdff2c4bc5 133446 7ffdff2c4bf3 133445->133446 133570 7ffdff336360 53 API calls 133445->133570 133458 7ffdff36e710 133446->133458 133449 7ffdff313d50 116 API calls 133449->133456 133451 7ffdff336360 53 API calls 133451->133456 133452 7ffdff2c4b7f 133452->133445 133569 7ffdff336360 53 API calls 133452->133569 133453 7ffdff2e7430 strchr strrchr strrchr 133453->133456 133456->133443 133456->133449 133456->133451 133456->133452 133456->133453 133506 7ffdff305c50 133456->133506 133547 7ffdff33ec20 178 API calls 133456->133547 133548 7ffdff33fbb0 70 API calls 133456->133548 133549 7ffdff352020 29 API calls 133456->133549 133550 7ffdff2baf30 133456->133550 133474 7ffdff36e520 133458->133474 133460 7ffdff36e913 133461 7ffdff3a21a0 8 API calls 133460->133461 133463 7ffdff36e927 133461->133463 133463->133408 133464 7ffdff36e8e3 133643 7ffdff352020 29 API calls 133464->133643 133466 7ffdff36e8ef LeaveCriticalSection 133466->133460 133467 7ffdff36e8d4 133636 7ffdff2d1c10 133467->133636 133471 7ffdff36e603 memcpy 133472 7ffdff36e688 133471->133472 133471->133474 133632 7ffdff36e310 62 API calls 133472->133632 133474->133458 133474->133460 133474->133464 133474->133467 133474->133471 133481 7ffdff36e63a 133474->133481 133629 7ffdff3610c0 28 API calls 133474->133629 133634 7ffdff36e310 62 API calls 133474->133634 133635 7ffdff36e270 53 API calls 133474->133635 133475 7ffdff36e696 133633 7ffdff36e270 53 API calls 133475->133633 133477 7ffdff36e67b LeaveCriticalSection 133477->133472 133478 7ffdff36e6a1 LeaveCriticalSection 133478->133408 133480 7ffdff36e66f 133631 7ffdff3610c0 28 API calls 133480->133631 133481->133477 133481->133480 133630 7ffdff3610c0 28 API calls 133481->133630 133484 7ffdff36e677 133484->133477 133485->133421 133487->133410 133488->133415 133498 7ffdff2ea994 133489->133498 133490 7ffdff2eab1e 133491 7ffdff2eab4e 133490->133491 133492 7ffdff2eab46 133490->133492 133493 7ffdff2eab30 GetProcessHeap HeapFree 133490->133493 133491->133418 133646 7ffdff3610c0 28 API calls 133492->133646 133493->133491 133495 7ffdff2eaa1f TlsAlloc 133495->133498 133499 7ffdff2eab87 133495->133499 133496 7ffdff2eaa46 TlsGetValue 133497 7ffdff2eaa56 GetLastError 133496->133497 133496->133498 133497->133498 133497->133499 133498->133490 133498->133495 133498->133496 133498->133499 133500 7ffdff360d70 22 API calls 133498->133500 133501 7ffdff2eaa94 GetProcessHeap HeapFree 133498->133501 133645 7ffdff361890 LeaveCriticalSection 133498->133645 133499->133418 133500->133498 133501->133498 133503->133433 133504->133428 133505->133456 133507 7ffdff305c83 133506->133507 133508 7ffdff305c88 133507->133508 133509 7ffdff305d1a 133507->133509 133511 7ffdff309480 167 API calls 133507->133511 133508->133456 133572 7ffdff307ac0 190 API calls 133509->133572 133513 7ffdff305ca8 133511->133513 133512 7ffdff305d21 133514 7ffdff305dbd 133512->133514 133515 7ffdff305d2d 133512->133515 133516 7ffdff305d04 133513->133516 133517 7ffdff305cad 133513->133517 133518 7ffdff309480 167 API calls 133514->133518 133519 7ffdff305da7 133515->133519 133522 7ffdff3613e0 28 API calls 133515->133522 133516->133509 133520 7ffdff305cb6 _errno 133516->133520 133517->133520 133526 7ffdff305cc7 133517->133526 133521 7ffdff305dca 133518->133521 133519->133456 133523 7ffdff305cff 133520->133523 133524 7ffdff305f71 133521->133524 133527 7ffdff3613e0 28 API calls 133521->133527 133529 7ffdff305d37 133522->133529 133523->133456 133524->133523 133581 7ffdff336360 53 API calls 133524->133581 133526->133523 133571 7ffdff305fe0 129 API calls 133526->133571 133531 7ffdff305deb 133527->133531 133528 7ffdff305fcb 133529->133528 133573 7ffdff34cb20 53 API calls 133529->133573 133533 7ffdff305f43 133531->133533 133574 7ffdff305fe0 129 API calls 133531->133574 133533->133524 133535 7ffdff305f73 133533->133535 133537 7ffdff305f69 133533->133537 133538 7ffdff305f8a 133535->133538 133579 7ffdff3610c0 28 API calls 133535->133579 133536 7ffdff305e41 133544 7ffdff305e5b 133536->133544 133575 7ffdff313d50 116 API calls 133536->133575 133578 7ffdff336360 53 API calls 133537->133578 133580 7ffdff361580 24 API calls 133538->133580 133544->133533 133576 7ffdff352020 29 API calls 133544->133576 133577 7ffdff3125e0 116 API calls 133544->133577 133546->133440 133547->133456 133548->133456 133549->133456 133551 7ffdff2baf51 133550->133551 133556 7ffdff2bb065 133550->133556 133552 7ffdff2baf63 133551->133552 133586 7ffdff2ba4a0 116 API calls 133551->133586 133554 7ffdff2baf98 133552->133554 133557 7ffdff2baf67 133552->133557 133587 7ffdff3610c0 28 API calls 133552->133587 133582 7ffdff2ea700 133554->133582 133555 7ffdff2bb0aa 133555->133456 133556->133555 133591 7ffdff2ba4a0 116 API calls 133556->133591 133557->133456 133560 7ffdff2bafb2 133561 7ffdff2bb021 133560->133561 133562 7ffdff2bb017 133560->133562 133566 7ffdff2bb01f 133560->133566 133563 7ffdff2bb038 133561->133563 133589 7ffdff3610c0 28 API calls 133561->133589 133588 7ffdff336360 53 API calls 133562->133588 133590 7ffdff361580 24 API calls 133563->133590 133566->133456 133569->133445 133570->133446 133571->133523 133572->133512 133573->133519 133574->133536 133575->133544 133576->133544 133577->133544 133578->133524 133579->133538 133580->133524 133581->133523 133583 7ffdff2ea727 133582->133583 133584 7ffdff2ea7d2 133583->133584 133592 7ffdff2eb0a0 133583->133592 133584->133560 133586->133552 133587->133554 133588->133566 133589->133563 133590->133566 133591->133555 133593 7ffdff2eb0c1 133592->133593 133594 7ffdff2eb0d9 133592->133594 133593->133584 133595 7ffdff2eb12b GetProcessHeap HeapAlloc 133594->133595 133596 7ffdff2eb1a9 133594->133596 133597 7ffdff2eb13f 133595->133597 133596->133597 133603 7ffdff2eb245 133596->133603 133598 7ffdff2eb149 memset 133597->133598 133604 7ffdff2eb15a 133597->133604 133598->133604 133599 7ffdff2eb22a 133599->133584 133600 7ffdff2eb20c GetProcessHeap HeapFree 133600->133599 133601 7ffdff2eb222 133621 7ffdff3610c0 28 API calls 133601->133621 133603->133603 133605 7ffdff2eb31c 133603->133605 133622 7ffdff352020 29 API calls 133603->133622 133604->133599 133604->133600 133604->133601 133605->133584 133607 7ffdff2eb29e 133623 7ffdff2eb330 638 API calls 133607->133623 133609 7ffdff2eb2b1 133610 7ffdff2eb2f6 133609->133610 133624 7ffdff34cbd0 36 API calls 133609->133624 133611 7ffdff2eb30a 133610->133611 133628 7ffdff336360 53 API calls 133610->133628 133611->133584 133614 7ffdff2eb2c3 133615 7ffdff2eb2d8 133614->133615 133616 7ffdff2eb2cd 133614->133616 133626 7ffdff34cbd0 36 API calls 133615->133626 133625 7ffdff34cbd0 36 API calls 133616->133625 133619 7ffdff2eb2d2 133627 7ffdff34c9d0 37 API calls 133619->133627 133621->133599 133622->133607 133623->133609 133624->133614 133625->133619 133626->133619 133627->133610 133628->133611 133629->133474 133630->133480 133631->133484 133632->133475 133633->133478 133634->133474 133635->133474 133637 7ffdff2d1c2f 133636->133637 133638 7ffdff2d1c4a LeaveCriticalSection 133637->133638 133641 7ffdff2d1c79 133637->133641 133638->133641 133639 7ffdff2d1cf4 LeaveCriticalSection 133640 7ffdff2d1cd7 133640->133639 133641->133639 133641->133640 133644 7ffdff3610c0 28 API calls 133641->133644 133643->133466 133644->133639 133645->133498 133646->133491 133647 7ffe0136922d 133652 7ffe01369240 133647->133652 133648 7ffe01369278 strncmp 133648->133652 133649 7ffe013692bb strncmp 133649->133652 133650 7ffe013692fd strncmp 133650->133652 133651 7ffe01369375 strncmp 133651->133652 133652->133648 133652->133649 133652->133650 133652->133651 133653 7ffe0136933c strncmp 133652->133653 133654 7ffe013693af 133652->133654 133653->133652 133675 7ffe013d4cd0 strrchr 133654->133675 133657 7ffe0139c3b0 638 API calls 133658 7ffe013694ab 133657->133658 133659 7ffe013694f6 133658->133659 133683 7ffe0139c3b0 133658->133683 133661 7ffe01369513 133659->133661 133690 7ffe013116f0 133659->133690 133663 7ffe0136953b 133661->133663 133664 7ffe0139c3b0 638 API calls 133661->133664 133674 7ffe01369749 133661->133674 133665 7ffe01369559 133663->133665 133666 7ffe0139c3b0 638 API calls 133663->133666 133664->133663 133667 7ffe0136959c 133665->133667 133707 7ffe013d3230 16 API calls 133665->133707 133666->133665 133670 7ffe013695f9 133667->133670 133667->133674 133708 7ffe013d38f0 9 API calls 133667->133708 133671 7ffe01369678 memset 133670->133671 133670->133674 133672 7ffe013696c4 133671->133672 133709 7ffe01358200 133672->133709 133676 7ffe013d4d68 133675->133676 133680 7ffe013d4d11 133675->133680 133677 7ffe013d4d89 strncpy 133676->133677 133681 7ffe013d4d9f 133676->133681 133677->133681 133678 7ffe013ffb70 6 API calls 133679 7ffe01369405 133678->133679 133679->133657 133679->133658 133679->133674 133680->133678 133681->133680 133722 7ffe013d4320 7 API calls 133681->133722 133684 7ffe0139c3e9 133683->133684 133685 7ffe0139c402 strchr 133684->133685 133723 7ffe0139d260 133684->133723 133687 7ffe0139c424 133685->133687 133688 7ffe0139c555 strncpy 133687->133688 133689 7ffe0139c576 133687->133689 133688->133689 133689->133659 133691 7ffe0131173e 133690->133691 133693 7ffe0131171c 133690->133693 135475 7ffe013114b0 __stdio_common_vsscanf 133691->135475 133702 7ffe01311739 133693->133702 135429 7ffe01311510 133693->135429 133694 7ffe01311752 133697 7ffe01311785 IsWindow 133694->133697 133694->133702 133696 7ffe013ffb70 6 API calls 133698 7ffe01311958 133696->133698 133699 7ffe013117ef SendMessageW 133697->133699 133697->133702 133698->133661 133700 7ffe0131180f SendMessageW 133699->133700 133701 7ffe01311859 133699->133701 133703 7ffe013118c7 133700->133703 133704 7ffe0131182a 133700->133704 133701->133704 133705 7ffe01311890 wsprintfW MessageBoxW 133701->133705 133702->133696 133706 7ffe01311510 67 API calls 133703->133706 133704->133702 133705->133703 133706->133704 133707->133667 133708->133670 133710 7ffe0135823b 133709->133710 133715 7ffe01358240 133709->133715 133711 7ffe01358200 638 API calls 133710->133711 133711->133715 133712 7ffe013ffb70 6 API calls 133713 7ffe0135839f 133712->133713 133713->133674 133714 7ffe0139c3b0 638 API calls 133714->133715 133715->133714 133717 7ffe0135838d 133715->133717 133718 7ffe013583b3 133715->133718 135482 7ffe0131b180 strcmp 133715->135482 133717->133712 133718->133717 133720 7ffe013583f9 133718->133720 135483 7ffe01302ca0 __stdio_common_vsprintf printf 133718->135483 133720->133717 135484 7ffe01302ca0 __stdio_common_vsprintf printf 133720->135484 133722->133680 133724 7ffe0139d29b 133723->133724 133725 7ffe0139d2b1 133724->133725 133731 7ffe0139d830 133724->133731 133727 7ffe0139d260 637 API calls 133725->133727 133729 7ffe0139d2d5 133725->133729 133727->133729 133728 7ffe0139d583 memcpy 133730 7ffe0139d5ac 133728->133730 133729->133728 133729->133730 133730->133685 133735 7ffe0139d85b 133731->133735 133738 7ffdff2553ef 133735->133738 133935 7ffdff25646c 133735->133935 133739 7ffdff2553fb 133738->133739 133740 7ffdff255461 LeaveCriticalSection 133739->133740 133741 7ffdff255478 133740->133741 133742 7ffdff3613e0 28 API calls 133741->133742 133743 7ffdff2554a3 133742->133743 133744 7ffdff3613e0 28 API calls 133743->133744 133745 7ffdff2556f2 133744->133745 133746 7ffdff3613e0 28 API calls 133745->133746 133814 7ffdff257507 133745->133814 133747 7ffdff25577c 133746->133747 133748 7ffdff3613e0 28 API calls 133747->133748 133749 7ffdff2557aa 133748->133749 133750 7ffdff3613e0 28 API calls 133749->133750 133751 7ffdff25581b 133750->133751 133752 7ffdff3613e0 28 API calls 133751->133752 133753 7ffdff25588d 133752->133753 133754 7ffdff3613e0 28 API calls 133753->133754 133755 7ffdff25590b 133754->133755 133756 7ffdff3613e0 28 API calls 133755->133756 133757 7ffdff255936 133756->133757 133758 7ffdff255953 _wgetenv 133757->133758 133757->133814 133759 7ffdff3613e0 28 API calls 133758->133759 133760 7ffdff255b01 GetCurrentThreadId _wgetenv 133759->133760 133761 7ffdff255b60 133760->133761 134061 7ffdff2d3320 133761->134061 133763 7ffdff255d11 133764 7ffdff3613e0 28 API calls 133763->133764 133765 7ffdff255d24 133764->133765 134069 7ffdff254f40 TlsGetValue 133765->134069 133767 7ffdff255d7e 133768 7ffdff255db2 LeaveCriticalSection 133767->133768 133769 7ffdff3a0df0 3 API calls 133768->133769 133770 7ffdff255e88 TlsGetValue 133769->133770 133772 7ffdff255eb4 133770->133772 133771 7ffdff255fdb 134078 7ffdff2cbe00 133771->134078 133774 7ffdff255edd 133772->133774 133779 7ffdff255ef6 133772->133779 133801 7ffdff25741f 133772->133801 134660 7ffdff361d40 49 API calls 133774->134660 133777 7ffdff2cbe00 621 API calls 133778 7ffdff256007 133777->133778 133780 7ffdff2cbe00 621 API calls 133778->133780 133779->133771 133779->133801 133934 7ffdff2ea700 621 API calls 133779->133934 133781 7ffdff25601d 133780->133781 133782 7ffdff2cbe00 621 API calls 133781->133782 133783 7ffdff256033 133782->133783 134134 7ffdff302140 133783->134134 133789 7ffdff2574c7 134683 7ffdff34cbd0 36 API calls 133789->134683 133798 7ffdff2574e7 134684 7ffdff34cbd0 36 API calls 133798->134684 134682 7ffdff34cbd0 36 API calls 133801->134682 133934->133779 133936 7ffdff2564a4 133935->133936 133937 7ffdff2564ef strstr 133936->133937 133939 7ffdff2565a6 133936->133939 133938 7ffdff25650b 133937->133938 133938->133939 133941 7ffdff25658a strstr 133938->133941 133940 7ffdff31a7f0 632 API calls 133939->133940 133946 7ffdff25667b 133939->133946 133940->133946 133941->133939 133942 7ffdff2567bb 133944 7ffdff31a7f0 632 API calls 133942->133944 133960 7ffdff25743e 133942->133960 133943 7ffdff256703 strstr 133943->133946 133956 7ffdff2567f1 133944->133956 133945 7ffdff31a7f0 632 API calls 133945->133946 133946->133942 133946->133943 133946->133945 133946->133960 133947 7ffdff256960 133948 7ffdff2ed460 632 API calls 133947->133948 133949 7ffdff256968 133948->133949 133950 7ffdff2cfa10 632 API calls 133949->133950 133951 7ffdff256970 133950->133951 133952 7ffdff2b6eb0 632 API calls 133951->133952 133953 7ffdff25698d 133952->133953 133955 7ffdff3613e0 28 API calls 133953->133955 133954 7ffdff25689f strstr 133954->133956 133957 7ffdff256992 133955->133957 133956->133947 133956->133954 133956->133960 133958 7ffdff3613e0 28 API calls 133957->133958 133975 7ffdff257507 133957->133975 133959 7ffdff2569db 133958->133959 133962 7ffdff3613e0 28 API calls 133959->133962 133959->133975 135426 7ffdff34cbd0 36 API calls 133960->135426 133966 7ffdff256a27 133962->133966 133963 7ffdff2574c7 135427 7ffdff34cbd0 36 API calls 133963->135427 133965 7ffdff256a9f 133968 7ffdff256ab6 133965->133968 135406 7ffdff336360 53 API calls 133965->135406 133966->133965 133966->133975 135405 7ffdff336360 53 API calls 133966->135405 133970 7ffdff3613e0 28 API calls 133968->133970 133972 7ffdff256ace 133970->133972 133971 7ffdff2574e7 135428 7ffdff34cbd0 36 API calls 133971->135428 133974 7ffdff3613e0 28 API calls 133972->133974 133972->133975 133976 7ffdff256b19 133974->133976 133976->133975 133977 7ffdff3613e0 28 API calls 133976->133977 133978 7ffdff256b65 133977->133978 133978->133960 133979 7ffdff256be3 133978->133979 135407 7ffdff336360 53 API calls 133978->135407 133981 7ffdff256bfa 133979->133981 135408 7ffdff336360 53 API calls 133979->135408 133983 7ffdff3377f0 34 API calls 133981->133983 133984 7ffdff256c17 133983->133984 133985 7ffdff3613e0 28 API calls 133984->133985 133986 7ffdff256c1f 133985->133986 133986->133975 133987 7ffdff3613e0 28 API calls 133986->133987 133988 7ffdff256c6b 133987->133988 133988->133975 133989 7ffdff256cd4 133988->133989 135409 7ffdff336360 53 API calls 133988->135409 133990 7ffdff256ce8 133989->133990 135410 7ffdff336360 53 API calls 133989->135410 133993 7ffdff3377f0 34 API calls 133990->133993 133994 7ffdff256cf2 133993->133994 133995 7ffdff3613e0 28 API calls 133994->133995 133996 7ffdff256cfa 133995->133996 133996->133975 133997 7ffdff3613e0 28 API calls 133996->133997 133998 7ffdff256d46 133997->133998 133998->133975 133999 7ffdff256dc6 133998->133999 135411 7ffdff336360 53 API calls 133998->135411 134001 7ffdff256dda 133999->134001 135412 7ffdff336360 53 API calls 133999->135412 134003 7ffdff3613e0 28 API calls 134001->134003 134004 7ffdff256ddf 134003->134004 134004->133975 134005 7ffdff3613e0 28 API calls 134004->134005 134006 7ffdff256e27 134005->134006 134006->133960 134007 7ffdff256eaf 134006->134007 135413 7ffdff336360 53 API calls 134006->135413 134009 7ffdff3613e0 28 API calls 134007->134009 134010 7ffdff256ec7 134009->134010 134010->133975 134011 7ffdff3613e0 28 API calls 134010->134011 134012 7ffdff256f0f 134011->134012 134012->133975 134014 7ffdff256f95 134012->134014 135414 7ffdff336360 53 API calls 134012->135414 134014->133960 134015 7ffdff367870 61 API calls 134014->134015 134016 7ffdff256fe8 134015->134016 134017 7ffdff256ff4 134016->134017 135415 7ffdff3610c0 28 API calls 134016->135415 134019 7ffdff393730 316 API calls 134017->134019 134020 7ffdff256ffc 134019->134020 134021 7ffdff3613e0 28 API calls 134020->134021 134022 7ffdff257001 134021->134022 134022->133960 134023 7ffdff3613e0 28 API calls 134022->134023 134024 7ffdff257043 134023->134024 134024->133975 134025 7ffdff3613e0 28 API calls 134024->134025 134026 7ffdff25708f 134025->134026 134026->133975 134027 7ffdff2570fe 134026->134027 135416 7ffdff336360 53 API calls 134026->135416 134029 7ffdff257115 134027->134029 135417 7ffdff336360 53 API calls 134027->135417 135418 7ffdff342e30 638 API calls 134029->135418 134032 7ffdff257141 135419 7ffdff342e30 638 API calls 134032->135419 134034 7ffdff25715e 134034->133960 134035 7ffdff257169 134034->134035 134035->133971 134036 7ffdff2571e2 134035->134036 134036->133971 134062 7ffdff2d3338 134061->134062 134063 7ffdff2d3450 134062->134063 134064 7ffdff3613e0 28 API calls 134062->134064 134065 7ffdff2d3379 134064->134065 134066 7ffdff3613e0 28 API calls 134065->134066 134067 7ffdff2d33ad 134066->134067 134068 7ffdff2d342d LeaveCriticalSection 134067->134068 134068->133763 134071 7ffdff254f72 134069->134071 134070 7ffdff254fb6 134073 7ffdff254fcd GetCurrentThreadId 134070->134073 134074 7ffdff255035 134070->134074 134071->134070 134072 7ffdff254f9d 134071->134072 134071->134074 134685 7ffdff361d40 49 API calls 134072->134685 134076 7ffdff254ffc 134073->134076 134077 7ffdff25500f LeaveCriticalSection 134076->134077 134077->133767 134686 7ffdff36cde0 TlsGetValue memcpy memcpy 134078->134686 134080 7ffdff2cbe9f 134687 7ffdff36cde0 TlsGetValue memcpy memcpy 134080->134687 134082 7ffdff2cbeaf 134688 7ffdff36cde0 TlsGetValue memcpy memcpy 134082->134688 134084 7ffdff2cbec3 134085 7ffdff2cbef1 134084->134085 134087 7ffdff2cbed5 134084->134087 134690 7ffdff36cde0 TlsGetValue memcpy memcpy 134085->134690 134689 7ffdff36cde0 TlsGetValue memcpy memcpy 134087->134689 134088 7ffdff2cbf07 134691 7ffdff36a980 117 API calls 134088->134691 134093 7ffdff2cbf1b 134094 7ffdff2cc53c 134093->134094 134095 7ffdff2cbf82 memcpy 134093->134095 134096 7ffdff2cbee8 134093->134096 134692 7ffdff361210 TlsGetValue 134093->134692 134693 7ffdff36cde0 TlsGetValue memcpy memcpy 134093->134693 134702 7ffdff34cbd0 36 API calls 134094->134702 134095->134093 134096->134094 134097 7ffdff2cc3bc 134096->134097 134694 7ffdff36cde0 TlsGetValue memcpy memcpy 134096->134694 134099 7ffdff2cc3ce 134097->134099 134699 7ffdff3610c0 28 API calls 134097->134699 134102 7ffdff2cc3f7 134099->134102 134700 7ffdff3610c0 28 API calls 134099->134700 134106 7ffdff2cc4b2 134102->134106 134107 7ffdff2cc423 TlsAlloc 134102->134107 134108 7ffdff2cc442 TlsGetValue 134102->134108 134103 7ffdff2cc142 134105 7ffdff3613e0 28 API calls 134103->134105 134132 7ffdff2cc147 134105->134132 134109 7ffdff3a21a0 8 API calls 134106->134109 134107->134108 134124 7ffdff2cc583 134107->134124 134113 7ffdff2cc45a GetLastError 134108->134113 134114 7ffdff2cc468 134108->134114 134112 7ffdff255ff1 134109->134112 134111 7ffdff2cc3a9 134698 7ffdff2cb000 118 API calls 134111->134698 134112->133777 134113->134114 134113->134124 134116 7ffdff2cc472 134114->134116 134117 7ffdff360d70 22 API calls 134114->134117 134118 7ffdff2cc48f 134116->134118 134116->134124 134117->134116 134119 7ffdff2cc498 GetProcessHeap HeapFree 134118->134119 134122 7ffdff2cc4df 134118->134122 134119->134106 134122->134106 134701 7ffdff361890 LeaveCriticalSection 134122->134701 134123 7ffdff3613e0 28 API calls 134123->134132 134703 7ffdff260340 28 API calls 134124->134703 134126 7ffdff2cc1d2 memcpy 134126->134132 134127 7ffdff2cc233 memcpy 134127->134132 134128 7ffdff2baf30 630 API calls 134128->134132 134129 7ffdff258d90 strstr 134129->134132 134132->134094 134132->134111 134132->134123 134132->134124 134132->134126 134132->134127 134132->134128 134132->134129 134695 7ffdff36d190 30 API calls 134132->134695 134696 7ffdff36cde0 TlsGetValue memcpy memcpy 134132->134696 134697 7ffdff258510 638 API calls 134132->134697 134135 7ffdff2cbe00 636 API calls 134134->134135 134137 7ffdff30215f 134135->134137 134139 7ffdff3613e0 28 API calls 134137->134139 134140 7ffdff302206 memcpy 134137->134140 134141 7ffdff2baf30 636 API calls 134137->134141 134142 7ffdff3022f2 134137->134142 134144 7ffdff302330 134137->134144 134145 7ffdff302290 memcpy 134137->134145 134139->134137 134140->134137 134141->134137 134704 7ffdff2cb000 118 API calls 134142->134704 134143 7ffdff30239c 134144->134143 134146 7ffdff302377 134144->134146 134705 7ffdff3610c0 28 API calls 134144->134705 134145->134137 134146->134143 134706 7ffdff336360 53 API calls 134146->134706 134660->133779 134682->133789 134683->133798 134684->133814 134685->134070 134686->134080 134687->134082 134688->134084 134689->134096 134690->134088 134691->134093 134693->134093 134694->134103 134695->134132 134696->134132 134697->134132 134698->134097 134699->134099 134700->134102 134701->134106 134702->134124 134705->134146 134706->134143 135405->133965 135406->133968 135407->133979 135408->133981 135409->133989 135410->133990 135411->133999 135412->134001 135413->134007 135414->134014 135415->134017 135416->134027 135417->134029 135418->134032 135419->134034 135426->133963 135427->133971 135428->133975 135430 7ffe01311530 SendMessageW SendMessageW SendMessageW 135429->135430 135434 7ffe013115b6 135429->135434 135431 7ffe013115a9 135430->135431 135431->135434 135432 7ffe01311658 135432->133702 135433 7ffe0131ecac GetFocus 135435 7ffe0131ecd5 GetForegroundWindow 135433->135435 135437 7ffe0131ece0 IsWindow 135433->135437 135434->135432 135434->135433 135435->135437 135438 7ffe0131f07f SetWindowLongPtrW 135437->135438 135439 7ffe0131ed2f 135437->135439 135440 7ffe0131f0a7 SetWindowLongPtrW 135438->135440 135441 7ffe0131f0bc SetParent 135438->135441 135439->135438 135440->135441 135442 7ffe0131f0d2 SendMessageW SendMessageW 135441->135442 135443 7ffe0131f1ac 135441->135443 135442->135443 135446 7ffe0131f110 GetDesktopWindow 135442->135446 135444 7ffe0131f1bf SendMessageW 135443->135444 135445 7ffe0131f231 135443->135445 135444->135445 135449 7ffe0131f1d9 SendMessageW 135444->135449 135447 7ffe0131f247 SetWindowPos 135445->135447 135448 7ffe0131f26a 135445->135448 135446->135443 135450 7ffe0131f11f SetWindowLongPtrW 135446->135450 135447->135448 135476 7ffe0131f560 135448->135476 135454 7ffe0131f20f 135449->135454 135452 7ffe0131f198 SetMenu DestroyWindow 135450->135452 135461 7ffe0131f139 135450->135461 135452->135443 135453 7ffe0131f274 135455 7ffe0131f29e 135453->135455 135456 7ffe0131f289 SendMessageW 135453->135456 135481 7ffe01391730 40 API calls 135454->135481 135458 7ffe0131f2c1 135455->135458 135459 7ffe0131f2ab SendMessageW 135455->135459 135456->135455 135462 7ffe0131f339 135458->135462 135463 7ffe0131f2cd SendMessageW 135458->135463 135459->135458 135460 7ffe0131f217 SendMessageW 135460->135445 135461->135452 135467 7ffe0131f16f SetParent 135461->135467 135465 7ffe0131f345 SetMenu 135462->135465 135474 7ffe0131f35d 135462->135474 135464 7ffe0131f2ed 135463->135464 135468 7ffe0131d140 7 API calls 135464->135468 135465->135474 135466 7ffe0131f3b2 SetActiveWindow 135470 7ffe0131f40e 135466->135470 135467->135461 135468->135462 135471 7ffe013ffb70 6 API calls 135470->135471 135472 7ffe0131f41e 135471->135472 135472->133702 135473 7ffe0131f560 ShowWindow 135473->135474 135474->135466 135474->135473 135475->133694 135477 7ffe0131f577 135476->135477 135480 7ffe0131f585 135476->135480 135477->135453 135478 7ffe0131f5b4 ShowWindow 135479 7ffe0131f5c5 135478->135479 135479->135453 135480->135478 135480->135479 135481->135460 135482->133715 135483->133720 135484->133717 135485 7ffe01326209 135486 7ffe01326327 135485->135486 135489 7ffe01326212 135485->135489 135487 7ffe01326329 DefWindowProcW 135486->135487 135488 7ffe01326340 135487->135488 135489->135486 135489->135488 135490 7ffe013262ea SendMessageW 135489->135490 135492 7ffe01326293 135489->135492 135490->135488 135491 7ffe01326300 135490->135491 135491->135492 135492->135486 135492->135488 135493 7ffe01326305 135492->135493 135494 7ffe013262d4 SetFocus 135492->135494 135497 7ffe01327680 41 API calls 135493->135497 135494->135488 135496 7ffe0132631e 135496->135487 135496->135488 135497->135496 135498 7ffe013fe6c0 135499 7ffe013fe6d9 135498->135499 135500 7ffe013fe71f 135498->135500 135506 7ffe0131b6a0 135499->135506 135507 7ffe0131b6ed CreateBitmap 135506->135507 135509 7ffe0131b845 135507->135509 135510 7ffe0131b76b GetDC CreateDIBSection ReleaseDC 135507->135510 135513 7ffe013ffb70 6 API calls 135509->135513 135510->135509 135511 7ffe0131b7dd 135510->135511 135511->135509 135512 7ffe0131b7e5 GetLastError FormatMessageW 135511->135512 135512->135509 135514 7ffe0131b822 MessageBoxW LocalFree 135512->135514 135515 7ffe0131b86f 135513->135515 135514->135509 135516 7ffe013ecae0 135515->135516 135517 7ffe013ecbf2 135516->135517 135519 7ffe013ecae9 135516->135519 135521 7ffe013fe370 37 API calls 135517->135521 135518 7ffe013ecae0 17 API calls 135518->135519 135519->135517 135519->135518 135522 7ffe013d91c0 135519->135522 135521->135500 135529 7ffe013d9020 135522->135529 135524 7ffe013d933d 135525 7ffe013ffb70 6 API calls 135524->135525 135526 7ffe013d934a 135525->135526 135526->135519 135530 7ffe013d9041 135529->135530 135531 7ffe013d9069 135530->135531 135534 7ffe0130ebb0 6 API calls 135530->135534 135531->135524 135533 7ffe0130ecc0 SetBkMode SelectPalette RealizePalette ReleaseDC DeleteDC 135531->135533 135533->135524 135534->135531 135535 7ffe013d7420 GetWindowLongPtrW 135536 7ffe013d74a6 135535->135536 135541 7ffe013d7462 135535->135541 135540 7ffe013d7500 GetSysColor 135536->135540 135536->135541 135537 7ffe013d75e7 DefWindowProcW 135538 7ffe013ffb70 6 API calls 135537->135538 135539 7ffe013d7607 135538->135539 135543 7ffe01302ca0 __stdio_common_vsprintf printf 135540->135543 135541->135537 135543->135536 135544 7ff6110d5628 135545 7ff6110d5642 135544->135545 135546 7ff6110d565f 135544->135546 135569 7ff6110d4ee8 11 API calls _get_daylight 135545->135569 135546->135545 135548 7ff6110d5672 CreateFileW 135546->135548 135550 7ff6110d56dc 135548->135550 135551 7ff6110d56a6 135548->135551 135549 7ff6110d5647 135570 7ff6110d4f08 11 API calls _get_daylight 135549->135570 135573 7ff6110d5c04 46 API calls 3 library calls 135550->135573 135572 7ff6110d577c 59 API calls 3 library calls 135551->135572 135555 7ff6110d56b4 135558 7ff6110d56d1 CloseHandle 135555->135558 135559 7ff6110d56bb CloseHandle 135555->135559 135556 7ff6110d56e1 135560 7ff6110d56e5 135556->135560 135561 7ff6110d5710 135556->135561 135557 7ff6110d564f 135571 7ff6110da8e0 37 API calls _invalid_parameter_noinfo 135557->135571 135563 7ff6110d565a 135558->135563 135559->135563 135574 7ff6110d4e7c 11 API calls 2 library calls 135560->135574 135575 7ff6110d59c4 51 API calls 135561->135575 135566 7ff6110d571d 135576 7ff6110d5b00 21 API calls _fread_nolock 135566->135576 135568 7ff6110d56ef 135568->135563 135569->135549 135570->135557 135571->135563 135572->135555 135573->135556 135574->135568 135575->135566 135576->135568 135577 7ffdff24e778 135578 7ffdff24e794 135577->135578 135579 7ffdff24e788 135577->135579 135593 7ffdff24e950 135578->135593 135583 7ffdff24eb20 135579->135583 135582 7ffdff24e78d 135602 7ffdff24e100 135583->135602 135586 7ffdff24e100 28 API calls 135587 7ffdff24eb60 135586->135587 135589 7ffdff24ecdd 135587->135589 135606 7ffdff24f580 135587->135606 135589->135582 135591 7ffdff24f580 37 API calls 135592 7ffdff24eb9e 135591->135592 135592->135589 135592->135591 135617 7ffdff24f320 135592->135617 135594 7ffdff24e100 28 API calls 135593->135594 135595 7ffdff24e971 135594->135595 135596 7ffdff24eaf3 135595->135596 135597 7ffdff24e100 28 API calls 135595->135597 135596->135582 135598 7ffdff24e990 135597->135598 135598->135596 135599 7ffdff24f320 37 API calls 135598->135599 135601 7ffdff24e9c1 135599->135601 135600 7ffdff24f320 37 API calls 135600->135601 135601->135596 135601->135600 135603 7ffdff24e134 135602->135603 135604 7ffdff24e120 135602->135604 135603->135586 135603->135589 135628 7ffdff24f850 135604->135628 135607 7ffdff24f5dc 135606->135607 135645 7ffdff24fc10 135607->135645 135609 7ffdff24f640 135610 7ffdff24f6d7 135609->135610 135611 7ffdff24f659 135609->135611 135616 7ffdff24f7aa 135609->135616 135612 7ffdff24fc10 37 API calls 135610->135612 135614 7ffdff24f6d5 135610->135614 135610->135616 135613 7ffdff24fc10 37 API calls 135611->135613 135611->135614 135611->135616 135612->135610 135613->135611 135615 7ffdff24fc10 37 API calls 135614->135615 135614->135616 135615->135616 135616->135592 135618 7ffdff24f362 135617->135618 135619 7ffdff24fc10 37 API calls 135618->135619 135620 7ffdff24f3c6 135619->135620 135621 7ffdff24f450 135620->135621 135623 7ffdff24f449 135620->135623 135626 7ffdff24f3ea 135620->135626 135627 7ffdff24f4fb 135620->135627 135622 7ffdff24fc10 37 API calls 135621->135622 135621->135623 135622->135621 135624 7ffdff24fc10 37 API calls 135623->135624 135623->135627 135624->135627 135625 7ffdff24fc10 37 API calls 135625->135626 135626->135623 135626->135625 135627->135592 135631 7ffdff24f897 135628->135631 135629 7ffdff24f89d 135629->135603 135630 7ffdff24f9e1 135632 7ffdff24f9ef 135630->135632 135641 7ffdff3610c0 28 API calls 135630->135641 135631->135629 135631->135630 135640 7ffdff3610c0 28 API calls 135631->135640 135633 7ffdff24f9fd 135632->135633 135642 7ffdff3610c0 28 API calls 135632->135642 135637 7ffdff24fa0b 135633->135637 135643 7ffdff3610c0 28 API calls 135633->135643 135637->135629 135644 7ffdff3610c0 28 API calls 135637->135644 135640->135630 135641->135632 135642->135633 135643->135637 135644->135629 135647 7ffdff24fc4a 135645->135647 135648 7ffdff24fec9 135645->135648 135646 7ffdff24feb3 135646->135648 135649 7ffdff24ffcc memcmp 135646->135649 135647->135646 135651 7ffdff2500c0 37 API calls 135647->135651 135648->135609 135649->135646 135649->135648 135651->135647 135652 7ff6110c2fe0 135653 7ff6110c2ff0 135652->135653 135654 7ff6110c3041 135653->135654 135655 7ff6110c302b 135653->135655 135658 7ff6110c3061 135654->135658 135663 7ff6110c3077 __std_exception_copy 135654->135663 135714 7ff6110c2710 54 API calls _log10_special 135655->135714 135657 7ff6110c3037 __std_exception_copy 135716 7ff6110cc550 135657->135716 135715 7ff6110c2710 54 API calls _log10_special 135658->135715 135663->135657 135664 7ff6110c3349 135663->135664 135667 7ff6110c3333 135663->135667 135669 7ff6110c330d 135663->135669 135671 7ff6110c3207 135663->135671 135680 7ff6110c1470 135663->135680 135710 7ff6110c1c80 135663->135710 135731 7ff6110c2710 54 API calls _log10_special 135664->135731 135730 7ff6110c2710 54 API calls _log10_special 135667->135730 135729 7ff6110c2710 54 API calls _log10_special 135669->135729 135672 7ff6110c3273 135671->135672 135725 7ff6110da404 37 API calls 2 library calls 135671->135725 135674 7ff6110c3290 135672->135674 135675 7ff6110c329e 135672->135675 135726 7ff6110da404 37 API calls 2 library calls 135674->135726 135727 7ff6110c2dd0 37 API calls 135675->135727 135678 7ff6110c329c 135728 7ff6110c2500 54 API calls __std_exception_copy 135678->135728 135732 7ff6110c45c0 135680->135732 135683 7ff6110c14bc 135742 7ff6110d06d4 135683->135742 135684 7ff6110c149b 135772 7ff6110c2710 54 API calls _log10_special 135684->135772 135687 7ff6110c14ab 135687->135663 135688 7ff6110c14d1 135689 7ff6110c14d5 135688->135689 135690 7ff6110c14f8 135688->135690 135773 7ff6110d4f08 11 API calls _get_daylight 135689->135773 135694 7ff6110c1532 135690->135694 135695 7ff6110c1508 135690->135695 135692 7ff6110c14da 135774 7ff6110c2910 54 API calls _log10_special 135692->135774 135697 7ff6110c1538 135694->135697 135705 7ff6110c154b 135694->135705 135775 7ff6110d4f08 11 API calls _get_daylight 135695->135775 135746 7ff6110c1210 135697->135746 135698 7ff6110c1510 135776 7ff6110c2910 54 API calls _log10_special 135698->135776 135702 7ff6110c14f3 __std_exception_copy 135768 7ff6110d004c 135702->135768 135703 7ff6110c15c4 135703->135663 135705->135702 135706 7ff6110c15d6 135705->135706 135777 7ff6110d039c 135705->135777 135780 7ff6110d4f08 11 API calls _get_daylight 135706->135780 135708 7ff6110c15db 135781 7ff6110c2910 54 API calls _log10_special 135708->135781 135711 7ff6110c1ca5 135710->135711 136022 7ff6110d4984 135711->136022 135714->135657 135715->135657 135717 7ff6110cc559 135716->135717 135718 7ff6110c31fa 135717->135718 135719 7ff6110cc8e0 IsProcessorFeaturePresent 135717->135719 135720 7ff6110cc8f8 135719->135720 136045 7ff6110ccad8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 135720->136045 135722 7ff6110cc90b 136046 7ff6110cc8a0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 135722->136046 135725->135672 135726->135678 135727->135678 135728->135657 135729->135657 135730->135657 135731->135657 135733 7ff6110c45cc 135732->135733 135782 7ff6110c9390 135733->135782 135735 7ff6110c45f4 135736 7ff6110c9390 2 API calls 135735->135736 135737 7ff6110c4607 135736->135737 135787 7ff6110d5f94 135737->135787 135740 7ff6110cc550 _log10_special 8 API calls 135741 7ff6110c1493 135740->135741 135741->135683 135741->135684 135743 7ff6110d0704 135742->135743 135955 7ff6110d0464 135743->135955 135745 7ff6110d071d 135745->135688 135747 7ff6110c1268 135746->135747 135748 7ff6110c126f 135747->135748 135749 7ff6110c1297 135747->135749 135972 7ff6110c2710 54 API calls _log10_special 135748->135972 135752 7ff6110c12b1 135749->135752 135753 7ff6110c12d4 135749->135753 135751 7ff6110c1282 135751->135702 135973 7ff6110d4f08 11 API calls _get_daylight 135752->135973 135756 7ff6110c12e6 135753->135756 135766 7ff6110c1309 memcpy_s 135753->135766 135755 7ff6110c12b6 135974 7ff6110c2910 54 API calls _log10_special 135755->135974 135975 7ff6110d4f08 11 API calls _get_daylight 135756->135975 135759 7ff6110c12eb 135976 7ff6110c2910 54 API calls _log10_special 135759->135976 135760 7ff6110d039c _fread_nolock 53 API calls 135760->135766 135762 7ff6110c12cf __std_exception_copy 135762->135702 135763 7ff6110c13cf 135977 7ff6110c2710 54 API calls _log10_special 135763->135977 135766->135760 135766->135762 135766->135763 135767 7ff6110d0110 37 API calls 135766->135767 135968 7ff6110d0adc 135766->135968 135767->135766 135769 7ff6110d007c 135768->135769 135994 7ff6110cfe28 135769->135994 135771 7ff6110d0095 135771->135703 135772->135687 135773->135692 135774->135702 135775->135698 135776->135702 136006 7ff6110d03bc 135777->136006 135780->135708 135781->135702 135783 7ff6110c93b2 MultiByteToWideChar 135782->135783 135784 7ff6110c93d6 135782->135784 135783->135784 135786 7ff6110c93ec __std_exception_copy 135783->135786 135785 7ff6110c93f3 MultiByteToWideChar 135784->135785 135784->135786 135785->135786 135786->135735 135788 7ff6110d5ec8 135787->135788 135789 7ff6110d5eee 135788->135789 135792 7ff6110d5f21 135788->135792 135818 7ff6110d4f08 11 API calls _get_daylight 135789->135818 135791 7ff6110d5ef3 135819 7ff6110da8e0 37 API calls _invalid_parameter_noinfo 135791->135819 135794 7ff6110d5f34 135792->135794 135795 7ff6110d5f27 135792->135795 135806 7ff6110dac28 135794->135806 135820 7ff6110d4f08 11 API calls _get_daylight 135795->135820 135797 7ff6110c4616 135797->135740 135823 7ff6110e02d8 EnterCriticalSection 135806->135823 135818->135791 135819->135797 135820->135797 135956 7ff6110d04ce 135955->135956 135957 7ff6110d048e 135955->135957 135956->135957 135959 7ff6110d04da 135956->135959 135967 7ff6110da814 37 API calls 2 library calls 135957->135967 135966 7ff6110d546c EnterCriticalSection 135959->135966 135962 7ff6110d04b5 135962->135745 135967->135962 135969 7ff6110d0b0c 135968->135969 135978 7ff6110d082c 135969->135978 135971 7ff6110d0b2a 135971->135766 135972->135751 135973->135755 135974->135762 135975->135759 135976->135762 135977->135762 135979 7ff6110d084c 135978->135979 135984 7ff6110d0879 135978->135984 135980 7ff6110d0881 135979->135980 135981 7ff6110d0856 135979->135981 135979->135984 135985 7ff6110d076c 135980->135985 135992 7ff6110da814 37 API calls 2 library calls 135981->135992 135984->135971 135993 7ff6110d546c EnterCriticalSection 135985->135993 135992->135984 135995 7ff6110cfe43 135994->135995 135997 7ff6110cfe71 135994->135997 136005 7ff6110da814 37 API calls 2 library calls 135995->136005 135998 7ff6110cfe63 135997->135998 136004 7ff6110d546c EnterCriticalSection 135997->136004 135998->135771 136005->135998 136007 7ff6110d03b4 136006->136007 136008 7ff6110d03e6 136006->136008 136007->135705 136008->136007 136009 7ff6110d0432 136008->136009 136010 7ff6110d03f5 __scrt_get_show_window_mode 136008->136010 136019 7ff6110d546c EnterCriticalSection 136009->136019 136020 7ff6110d4f08 11 API calls _get_daylight 136010->136020 136014 7ff6110d040a 136021 7ff6110da8e0 37 API calls _invalid_parameter_noinfo 136014->136021 136020->136014 136021->136007 136026 7ff6110d49de 136022->136026 136023 7ff6110d4a03 136040 7ff6110da814 37 API calls 2 library calls 136023->136040 136025 7ff6110d4a3f 136041 7ff6110d2c10 49 API calls _invalid_parameter_noinfo 136025->136041 136026->136023 136026->136025 136028 7ff6110d4a2d 136032 7ff6110cc550 _log10_special 8 API calls 136028->136032 136029 7ff6110d4ad6 136030 7ff6110d4b1c 136029->136030 136034 7ff6110d4b40 136029->136034 136035 7ff6110d4af1 136029->136035 136037 7ff6110d4ae8 136029->136037 136044 7ff6110da948 11 API calls 2 library calls 136030->136044 136033 7ff6110c1cc8 136032->136033 136033->135663 136034->136030 136038 7ff6110d4b4a 136034->136038 136042 7ff6110da948 11 API calls 2 library calls 136035->136042 136037->136030 136037->136035 136043 7ff6110da948 11 API calls 2 library calls 136038->136043 136040->136028 136041->136029 136042->136028 136043->136028 136044->136028 136045->135722 136047 7ffe01326053 136048 7ffe0132605d 136047->136048 136061 7ffe01325f21 136047->136061 136063 7ffe0131e720 GetWindowLongPtrW 136048->136063 136050 7ffe01326065 136064 7ffe013120c0 136050->136064 136052 7ffe01325f47 GetWindowLongPtrW 136052->136061 136053 7ffe0132606e 136054 7ffe013262bd 136055 7ffe01326327 136054->136055 136057 7ffe01326305 136054->136057 136058 7ffe013262d4 SetFocus 136054->136058 136056 7ffe01326329 DefWindowProcW 136055->136056 136056->136053 136096 7ffe01327680 41 API calls 136057->136096 136058->136053 136061->136052 136061->136053 136061->136054 136095 7ffe0131e720 GetWindowLongPtrW 136061->136095 136062 7ffe0132631e 136062->136053 136062->136056 136063->136050 136065 7ffe01312101 memset SystemParametersInfoW 136064->136065 136066 7ffe013120fd 136064->136066 136067 7ffe01312273 SystemParametersInfoW 136065->136067 136068 7ffe01312137 CreateFontIndirectW 136065->136068 136066->136065 136069 7ffe01312292 CreateFontIndirectW 136067->136069 136070 7ffe013122bd 6 API calls 136067->136070 136097 7ffe01311ff0 136068->136097 136072 7ffe01311ff0 40 API calls 136069->136072 136074 7ffe01311ff0 40 API calls 136070->136074 136075 7ffe013122b4 DeleteObject 136072->136075 136077 7ffe0131237d DeleteObject 136074->136077 136075->136070 136076 7ffe01311ff0 40 API calls 136078 7ffe0131218a DeleteObject CreateFontIndirectW 136076->136078 136079 7ffe01312390 136077->136079 136080 7ffe013123bc 136077->136080 136081 7ffe01311ff0 40 API calls 136078->136081 136079->136080 136082 7ffe01312397 GetStockObject 136079->136082 136083 7ffe013ffb70 6 API calls 136080->136083 136084 7ffe013121b8 DeleteObject CreateFontIndirectW 136081->136084 136085 7ffe01311ff0 40 API calls 136082->136085 136086 7ffe013123cb 136083->136086 136087 7ffe01311ff0 40 API calls 136084->136087 136085->136079 136086->136053 136088 7ffe013121e6 DeleteObject CreateFontIndirectW 136087->136088 136089 7ffe01311ff0 40 API calls 136088->136089 136090 7ffe01312214 DeleteObject CreateFontIndirectW 136089->136090 136091 7ffe01311ff0 40 API calls 136090->136091 136092 7ffe0131223f DeleteObject CreateFontIndirectW 136091->136092 136093 7ffe01311ff0 40 API calls 136092->136093 136094 7ffe0131226a DeleteObject 136093->136094 136094->136067 136095->136061 136096->136062 136101 7ffe01312035 136097->136101 136107 7ffe01313b90 136101->136107 136105 7ffe013ffb70 6 API calls 136106 7ffe013120ad DeleteObject CreateFontIndirectW 136105->136106 136106->136076 136108 7ffe01313bd0 GetDC SelectObject GetTextMetricsW GetTextFaceW 136107->136108 136110 7ffe01313c2c 136108->136110 136128 7ffe01314040 136110->136128 136113 7ffe01313de5 GetCharWidthW 136115 7ffe01313df3 SelectObject ReleaseDC 136113->136115 136114 7ffe01313ded GetCharWidthA 136114->136115 136117 7ffe013ffb70 6 API calls 136115->136117 136118 7ffe0131207c 136117->136118 136119 7ffe01364810 136118->136119 136120 7ffe01364851 136119->136120 136121 7ffe0131208f 136120->136121 136150 7ffe01364380 40 API calls 136120->136150 136123 7ffe01313e50 136121->136123 136124 7ffe0131209b 136123->136124 136127 7ffe01313e74 136123->136127 136124->136105 136125 7ffe01313e90 DeleteObject 136126 7ffe01313eac DeleteObject 136125->136126 136125->136127 136126->136127 136127->136124 136127->136125 136129 7ffe0131408a SelectObject GetTextFaceW 136128->136129 136130 7ffe013140c4 136129->136130 136131 7ffe01314116 SelectObject 136130->136131 136132 7ffe0131412d 136131->136132 136133 7ffe01314151 memset 136132->136133 136137 7ffe0131419b 136132->136137 136138 7ffe01315270 SelectObject 136133->136138 136135 7ffe013ffb70 6 API calls 136136 7ffe01313d76 136135->136136 136136->136113 136136->136114 136137->136135 136139 7ffe013152e2 136138->136139 136140 7ffe013152ea GetFontData 136138->136140 136139->136140 136141 7ffe013155fa GetTextCharset 136140->136141 136145 7ffe01315326 136140->136145 136142 7ffe01315636 SelectObject 136141->136142 136147 7ffe013155f8 136141->136147 136143 7ffe013ffb70 6 API calls 136142->136143 136144 7ffe01315665 136143->136144 136144->136137 136145->136142 136146 7ffe01315363 GetFontData 136145->136146 136145->136147 136148 7ffe01315430 GetFontData 136145->136148 136149 7ffe013154cf GetFontData GetFontData 136145->136149 136146->136145 136147->136142 136148->136145 136149->136145 136150->136121 136151 7ffe01326073 136154 7ffe013253d0 136151->136154 136155 7ffe01325411 136154->136155 136156 7ffe01325432 IsWindowVisible 136155->136156 136157 7ffe0132541a GetWindowLongPtrW 136155->136157 136158 7ffe01325453 GetWindowPlacement 136156->136158 136163 7ffe0132544f 136156->136163 136157->136156 136169 7ffe0132553d 136157->136169 136158->136163 136159 7ffe013ffb70 6 API calls 136161 7ffe013256dc 136159->136161 136160 7ffe013254bf 136166 7ffe013254d0 GetClientRect MoveWindow 136160->136166 136160->136169 136162 7ffe013254b3 136170 7ffe0131d320 7 API calls 136162->136170 136163->136160 136163->136162 136164 7ffe013255a7 136163->136164 136167 7ffe013254ae 136163->136167 136168 7ffe0131d140 7 API calls 136164->136168 136166->136169 136167->136160 136167->136162 136168->136160 136169->136159 136170->136160 136171 7ffdff26ade0 136172 7ffdff26adf0 136171->136172 136173 7ffdff26ae28 136171->136173 136174 7ffdff26ae17 136172->136174 136175 7ffdff26adf6 136172->136175 136179 7ffdff26ae0d 136173->136179 136183 7ffdff2d1fa0 136173->136183 136174->136173 136345 7ffdff337e20 116 API calls 136174->136345 136344 7ffdff2ec570 166 API calls 136175->136344 136184 7ffdff2d1fb9 136183->136184 136347 7ffdff3a0a30 LeaveCriticalSection 136184->136347 136344->136179 136345->136173 136348 7ffdff24dca0 TlsGetValue 136349 7ffdff24dcfa 136348->136349 136350 7ffdff24dd25 memset 136349->136350 136352 7ffdff24e0d0 136349->136352 136355 7ffdff24dd44 136349->136355 136401 7ffdff361d40 49 API calls 136350->136401 136353 7ffdff3a21a0 8 API calls 136354 7ffdff24df99 136353->136354 136355->136352 136356 7ffdff24dd68 136355->136356 136358 7ffdff24de60 136355->136358 136359 7ffdff24df5c 136355->136359 136356->136353 136357 7ffdff24deb0 136360 7ffdff24deea 136357->136360 136361 7ffdff24e026 136357->136361 136358->136357 136366 7ffdff24de9b memset 136358->136366 136359->136356 136412 7ffdff3610c0 28 API calls 136359->136412 136362 7ffdff24f850 28 API calls 136360->136362 136385 7ffdff24e170 136361->136385 136365 7ffdff24df00 136362->136365 136367 7ffdff24e07d 136365->136367 136369 7ffdff24f850 28 API calls 136365->136369 136366->136357 136368 7ffdff24e095 136367->136368 136414 7ffdff3610c0 28 API calls 136367->136414 136370 7ffdff24e0bb 136368->136370 136375 7ffdff24fa50 28 API calls 136368->136375 136371 7ffdff24df23 136369->136371 136370->136352 136415 7ffdff3610c0 28 API calls 136370->136415 136373 7ffdff24df2f 136371->136373 136374 7ffdff24dfb0 136371->136374 136402 7ffdff24fa50 136373->136402 136413 7ffdff24e3c0 37 API calls 136374->136413 136375->136368 136379 7ffdff24e062 memcpy 136379->136367 136380 7ffdff24dfc3 136382 7ffdff24fa50 28 API calls 136380->136382 136381 7ffdff24df37 136381->136367 136381->136379 136381->136381 136383 7ffdff24dfcd 136382->136383 136384 7ffdff24fa50 28 API calls 136383->136384 136384->136381 136386 7ffdff24f850 28 API calls 136385->136386 136387 7ffdff24e1a7 136386->136387 136388 7ffdff24f580 37 API calls 136387->136388 136397 7ffdff24e24d 136387->136397 136389 7ffdff24e1f2 136388->136389 136390 7ffdff24fa50 28 API calls 136389->136390 136391 7ffdff24e1fd 136390->136391 136392 7ffdff24f850 28 API calls 136391->136392 136391->136397 136399 7ffdff24e277 136392->136399 136393 7ffdff24e2f6 136394 7ffdff24fa50 28 API calls 136393->136394 136394->136397 136395 7ffdff24f580 37 API calls 136395->136399 136396 7ffdff24f320 37 API calls 136396->136399 136397->136381 136398 7ffdff24e340 136400 7ffdff24fa50 28 API calls 136398->136400 136399->136393 136399->136395 136399->136396 136399->136397 136399->136398 136400->136397 136401->136355 136403 7ffdff24fa97 136402->136403 136405 7ffdff24fa5f 136402->136405 136403->136381 136404 7ffdff24fa6d 136407 7ffdff24fa7b 136404->136407 136417 7ffdff3610c0 28 API calls 136404->136417 136405->136404 136416 7ffdff3610c0 28 API calls 136405->136416 136409 7ffdff24fa89 136407->136409 136418 7ffdff3610c0 28 API calls 136407->136418 136409->136403 136419 7ffdff3610c0 28 API calls 136409->136419 136412->136356 136413->136380 136414->136368 136415->136352 136416->136404 136417->136407 136418->136409 136419->136403 136420 7ffe013d70b3 136424 7ffe013d70c3 136420->136424 136421 7ffe013d7233 136422 7ffe013ffb70 6 API calls 136421->136422 136423 7ffe013d72e0 136422->136423 136424->136421 136428 7ffe013e88c0 136424->136428 136426 7ffe013d7225 136426->136421 136448 7ffe01316580 136426->136448 136429 7ffe013e88f0 136428->136429 136453 7ffe013e8060 136429->136453 136431 7ffe013e89e8 136444 7ffe013e8b93 136431->136444 136445 7ffe013e8b59 136431->136445 136433 7ffe013e8bb9 136434 7ffe013e8bd7 LoadIconW LoadIconW LoadCursorW RegisterClassExW 136433->136434 136435 7ffe013e8bc5 GetModuleHandleW 136433->136435 136436 7ffe013e8cac CreateWindowExW SetWindowLongPtrW ShowWindow UpdateWindow 136434->136436 136437 7ffe013e8d1e 136434->136437 136435->136434 136436->136437 136510 7ffe013d8c40 136437->136510 136439 7ffe013e8d72 136521 7ffe013da280 23 API calls 136439->136521 136441 7ffe013e8d7d 136442 7ffe013ffb70 6 API calls 136441->136442 136443 7ffe013e8dad 136442->136443 136443->136426 136505 7ffe013ddc20 136444->136505 136518 7ffe013f5690 136445->136518 136447 7ffe013e8b77 136447->136426 136449 7ffe0131659f 136448->136449 136450 7ffe01316590 GetModuleHandleW 136448->136450 136523 7ffe013269b0 136449->136523 136450->136449 136454 7ffe013e808e 136453->136454 136455 7ffe013f5690 strchr 136454->136455 136456 7ffe013e80b3 136455->136456 136457 7ffe013f5690 strchr 136456->136457 136458 7ffe013e80d1 136457->136458 136459 7ffe013f5690 strchr 136458->136459 136460 7ffe013e80ef 136459->136460 136461 7ffe013f5690 strchr 136460->136461 136462 7ffe013e810d 136461->136462 136463 7ffe013f5690 strchr 136462->136463 136464 7ffe013e812b 136463->136464 136465 7ffe013f5690 strchr 136464->136465 136466 7ffe013e825c 136465->136466 136467 7ffe013f5690 strchr 136466->136467 136468 7ffe013e827a 136467->136468 136469 7ffe013f5690 strchr 136468->136469 136470 7ffe013e8298 136469->136470 136471 7ffe013f5690 strchr 136470->136471 136472 7ffe013e8355 136471->136472 136473 7ffe013f5690 strchr 136472->136473 136474 7ffe013e8373 136473->136474 136475 7ffe013f5690 strchr 136474->136475 136476 7ffe013e8391 136475->136476 136477 7ffe013f5690 strchr 136476->136477 136478 7ffe013e8424 136477->136478 136479 7ffe013f5690 strchr 136478->136479 136480 7ffe013e8442 136479->136480 136481 7ffe013f5690 strchr 136480->136481 136482 7ffe013e8511 136481->136482 136483 7ffe013f5690 strchr 136482->136483 136484 7ffe013e852f 136483->136484 136485 7ffe013f5690 strchr 136484->136485 136486 7ffe013e854d 136485->136486 136487 7ffe013f5690 strchr 136486->136487 136488 7ffe013e858c 136487->136488 136489 7ffe013f5690 strchr 136488->136489 136490 7ffe013e85aa 136489->136490 136491 7ffe013f5690 strchr 136490->136491 136492 7ffe013e8613 136491->136492 136493 7ffe013f5690 strchr 136492->136493 136494 7ffe013e8631 136493->136494 136495 7ffe013f5690 strchr 136494->136495 136496 7ffe013e869a 136495->136496 136497 7ffe013f5690 strchr 136496->136497 136498 7ffe013e86b8 136497->136498 136499 7ffe013f5690 strchr 136498->136499 136500 7ffe013e8721 136499->136500 136501 7ffe013f5690 strchr 136500->136501 136504 7ffe013e873f 136501->136504 136502 7ffe013e88a3 136502->136431 136503 7ffe013f5690 strchr 136503->136504 136504->136502 136504->136503 136507 7ffe013ddc3c 136505->136507 136506 7ffe013ddc44 136506->136433 136507->136506 136508 7ffe013f5690 strchr 136507->136508 136509 7ffe013ddee7 136508->136509 136509->136433 136512 7ffe013d8c64 136510->136512 136511 7ffe013d8c90 136511->136439 136512->136511 136513 7ffe013d8d89 CreateBitmap CreatePatternBrush 136512->136513 136514 7ffe013d8dd8 136513->136514 136515 7ffe013d8ef3 136514->136515 136516 7ffe013f5690 strchr 136514->136516 136515->136439 136517 7ffe013d8ed7 136516->136517 136517->136439 136522 7ffe013f5760 strchr 136518->136522 136520 7ffe013f56a7 136520->136447 136521->136441 136522->136520 136524 7ffe013269d5 InitCommonControlsEx 136523->136524 136532 7ffe01326ac2 136523->136532 136526 7ffe01326a0f RegisterClassW 136524->136526 136527 7ffe013269fe 136524->136527 136525 7ffe013ffb70 6 API calls 136528 7ffe013165a7 136525->136528 136529 7ffe01326a7b GetKeyboardLayout GetLocaleInfoW 136526->136529 136530 7ffe01326a6a 136526->136530 136527->136526 136528->136421 136531 7ffe01326aa0 TranslateCharsetInfo 136529->136531 136529->136532 136530->136529 136531->136532 136533 7ffe01326ab9 136531->136533 136532->136525 136535 7ffe013282c0 8 API calls 136533->136535 136535->136532 136536 7ff6110ccc3c 136557 7ff6110cce0c 136536->136557 136539 7ff6110ccd88 136708 7ff6110cd12c 7 API calls 2 library calls 136539->136708 136540 7ff6110ccc58 __scrt_acquire_startup_lock 136542 7ff6110ccd92 136540->136542 136547 7ff6110ccc76 __scrt_release_startup_lock 136540->136547 136709 7ff6110cd12c 7 API calls 2 library calls 136542->136709 136544 7ff6110ccc9b 136545 7ff6110ccd9d __FrameHandler3::FrameUnwindToEmptyState 136546 7ff6110ccd21 136563 7ff6110cd274 136546->136563 136547->136544 136547->136546 136705 7ff6110d9b2c 45 API calls 136547->136705 136549 7ff6110ccd26 136566 7ff6110c1000 136549->136566 136554 7ff6110ccd49 136554->136545 136707 7ff6110ccf90 7 API calls 136554->136707 136556 7ff6110ccd60 136556->136544 136558 7ff6110cce14 136557->136558 136559 7ff6110cce20 __scrt_dllmain_crt_thread_attach 136558->136559 136560 7ff6110ccc50 136559->136560 136561 7ff6110cce2d 136559->136561 136560->136539 136560->136540 136561->136560 136710 7ff6110cd888 7 API calls 2 library calls 136561->136710 136711 7ff6110ea4d0 136563->136711 136565 7ff6110cd28b GetStartupInfoW 136565->136549 136567 7ff6110c1009 136566->136567 136713 7ff6110d5484 136567->136713 136569 7ff6110c37fb 136720 7ff6110c36b0 136569->136720 136573 7ff6110cc550 _log10_special 8 API calls 136575 7ff6110c3ca7 136573->136575 136706 7ff6110cd2b8 GetModuleHandleW 136575->136706 136576 7ff6110c383c 136579 7ff6110c1c80 49 API calls 136576->136579 136577 7ff6110c391b 136578 7ff6110c45c0 108 API calls 136577->136578 136580 7ff6110c392b 136578->136580 136581 7ff6110c385b 136579->136581 136582 7ff6110c396a 136580->136582 136815 7ff6110c7f90 136580->136815 136792 7ff6110c8830 136581->136792 136824 7ff6110c2710 54 API calls _log10_special 136582->136824 136586 7ff6110c388e 136593 7ff6110c38bb __std_exception_copy 136586->136593 136814 7ff6110c89a0 40 API calls __std_exception_copy 136586->136814 136587 7ff6110c395d 136588 7ff6110c3984 136587->136588 136589 7ff6110c3962 136587->136589 136592 7ff6110c1c80 49 API calls 136588->136592 136591 7ff6110d004c 74 API calls 136589->136591 136591->136582 136594 7ff6110c39a3 136592->136594 136596 7ff6110c8830 14 API calls 136593->136596 136604 7ff6110c38de __std_exception_copy 136593->136604 136598 7ff6110c1950 115 API calls 136594->136598 136596->136604 136597 7ff6110c3a0b 136827 7ff6110c89a0 40 API calls __std_exception_copy 136597->136827 136600 7ff6110c39ce 136598->136600 136600->136581 136602 7ff6110c39de 136600->136602 136601 7ff6110c3a17 136828 7ff6110c89a0 40 API calls __std_exception_copy 136601->136828 136825 7ff6110c2710 54 API calls _log10_special 136602->136825 136608 7ff6110c390e __std_exception_copy 136604->136608 136826 7ff6110c8940 40 API calls __std_exception_copy 136604->136826 136606 7ff6110c3a23 136829 7ff6110c89a0 40 API calls __std_exception_copy 136606->136829 136609 7ff6110c8830 14 API calls 136608->136609 136610 7ff6110c3a3b 136609->136610 136611 7ff6110c3b2f 136610->136611 136613 7ff6110c3a60 __std_exception_copy 136610->136613 136831 7ff6110c2710 54 API calls _log10_special 136611->136831 136625 7ff6110c3aab 136613->136625 136830 7ff6110c8940 40 API calls __std_exception_copy 136613->136830 136615 7ff6110c8830 14 API calls 136616 7ff6110c3bf4 __std_exception_copy 136615->136616 136617 7ff6110c3d41 136616->136617 136618 7ff6110c3c46 136616->136618 136836 7ff6110c44e0 49 API calls 136617->136836 136619 7ff6110c3c50 136618->136619 136620 7ff6110c3cd4 136618->136620 136832 7ff6110c90e0 59 API calls _log10_special 136619->136832 136624 7ff6110c8830 14 API calls 136620->136624 136623 7ff6110c3d4f 136628 7ff6110c3d71 136623->136628 136629 7ff6110c3d65 136623->136629 136626 7ff6110c3ce0 136624->136626 136625->136615 136633 7ff6110c3c61 136626->136633 136635 7ff6110c3ced 136626->136635 136627 7ff6110c3c55 136631 7ff6110c3cb3 136627->136631 136627->136633 136630 7ff6110c1c80 49 API calls 136628->136630 136837 7ff6110c4630 136629->136837 136645 7ff6110c3d2b __std_exception_copy 136630->136645 136834 7ff6110c8660 86 API calls 2 library calls 136631->136834 136833 7ff6110c2710 54 API calls _log10_special 136633->136833 136639 7ff6110c1c80 49 API calls 136635->136639 136636 7ff6110c3dc4 136642 7ff6110c9390 2 API calls 136636->136642 136637 7ff6110c3cbb 136640 7ff6110c3cbf 136637->136640 136641 7ff6110c3cc8 136637->136641 136643 7ff6110c3d0b 136639->136643 136640->136633 136641->136645 136647 7ff6110c3dd7 SetDllDirectoryW 136642->136647 136644 7ff6110c3d12 136643->136644 136643->136645 136835 7ff6110c2710 54 API calls _log10_special 136644->136835 136645->136636 136646 7ff6110c3da7 SetDllDirectoryW LoadLibraryExW 136645->136646 136646->136636 136651 7ff6110c3e0a 136647->136651 136693 7ff6110c3e5a 136647->136693 136650 7ff6110c3808 __std_exception_copy 136650->136573 136653 7ff6110c8830 14 API calls 136651->136653 136652 7ff6110c4008 136655 7ff6110c4035 136652->136655 136656 7ff6110c4012 PostMessageW GetMessageW 136652->136656 136659 7ff6110c3e16 __std_exception_copy 136653->136659 136654 7ff6110c3f1b 136848 7ff6110c33c0 121 API calls 2 library calls 136654->136848 136805 7ff6110c3360 136655->136805 136656->136655 136658 7ff6110c3f23 136658->136650 136660 7ff6110c3f2b 136658->136660 136662 7ff6110c3ef2 136659->136662 136666 7ff6110c3e4e 136659->136666 136849 7ff6110c90c0 LocalFree 136660->136849 136847 7ff6110c8940 40 API calls __std_exception_copy 136662->136847 136666->136693 136840 7ff6110c6dc0 54 API calls _get_daylight 136666->136840 136669 7ff6110c404f 136851 7ff6110c6fc0 FreeLibrary 136669->136851 136675 7ff6110c405b 136678 7ff6110c3e6c 136841 7ff6110c7340 117 API calls 2 library calls 136678->136841 136682 7ff6110c3e81 136684 7ff6110c3ea2 136682->136684 136696 7ff6110c3e85 136682->136696 136842 7ff6110c6e00 120 API calls _log10_special 136682->136842 136684->136696 136843 7ff6110c71b0 125 API calls 136684->136843 136689 7ff6110c3eb7 136689->136696 136844 7ff6110c74f0 55 API calls 136689->136844 136690 7ff6110c3ee0 136846 7ff6110c6fc0 FreeLibrary 136690->136846 136693->136652 136693->136654 136696->136693 136845 7ff6110c2a50 54 API calls _log10_special 136696->136845 136705->136546 136706->136554 136707->136556 136708->136542 136709->136545 136710->136560 136712 7ff6110ea4c0 136711->136712 136712->136565 136712->136712 136716 7ff6110df480 136713->136716 136714 7ff6110df4d3 136852 7ff6110da814 37 API calls 2 library calls 136714->136852 136716->136714 136717 7ff6110df526 136716->136717 136853 7ff6110df358 71 API calls _fread_nolock 136717->136853 136719 7ff6110df4fc 136719->136569 136854 7ff6110cc850 136720->136854 136723 7ff6110c3710 136856 7ff6110c9280 FindFirstFileExW 136723->136856 136724 7ff6110c36eb GetLastError 136861 7ff6110c2c50 51 API calls _log10_special 136724->136861 136728 7ff6110c3706 136732 7ff6110cc550 _log10_special 8 API calls 136728->136732 136729 7ff6110c3723 136862 7ff6110c9300 CreateFileW GetFinalPathNameByHandleW CloseHandle 136729->136862 136730 7ff6110c377d 136864 7ff6110c9440 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 136730->136864 136735 7ff6110c37b5 136732->136735 136734 7ff6110c378b 136734->136728 136865 7ff6110c2810 49 API calls _log10_special 136734->136865 136735->136650 136742 7ff6110c1950 136735->136742 136736 7ff6110c3730 136737 7ff6110c3734 136736->136737 136738 7ff6110c374c __vcrt_FlsAlloc 136736->136738 136863 7ff6110c2810 49 API calls _log10_special 136737->136863 136738->136730 136741 7ff6110c3745 136741->136728 136743 7ff6110c45c0 108 API calls 136742->136743 136744 7ff6110c1985 136743->136744 136745 7ff6110c1c43 136744->136745 136746 7ff6110c7f90 83 API calls 136744->136746 136747 7ff6110cc550 _log10_special 8 API calls 136745->136747 136748 7ff6110c19cb 136746->136748 136749 7ff6110c1c5e 136747->136749 136750 7ff6110d06d4 73 API calls 136748->136750 136791 7ff6110c1a03 136748->136791 136749->136576 136749->136577 136752 7ff6110c19e5 136750->136752 136751 7ff6110d004c 74 API calls 136751->136745 136753 7ff6110c19e9 136752->136753 136754 7ff6110c1a08 136752->136754 136866 7ff6110d4f08 11 API calls _get_daylight 136753->136866 136756 7ff6110d039c _fread_nolock 53 API calls 136754->136756 136758 7ff6110c1a20 136756->136758 136757 7ff6110c19ee 136867 7ff6110c2910 54 API calls _log10_special 136757->136867 136760 7ff6110c1a45 136758->136760 136761 7ff6110c1a26 136758->136761 136765 7ff6110c1a5c 136760->136765 136766 7ff6110c1a7b 136760->136766 136868 7ff6110d4f08 11 API calls _get_daylight 136761->136868 136763 7ff6110c1a2b 136869 7ff6110c2910 54 API calls _log10_special 136763->136869 136870 7ff6110d4f08 11 API calls _get_daylight 136765->136870 136768 7ff6110c1c80 49 API calls 136766->136768 136770 7ff6110c1a92 136768->136770 136769 7ff6110c1a61 136871 7ff6110c2910 54 API calls _log10_special 136769->136871 136772 7ff6110c1c80 49 API calls 136770->136772 136773 7ff6110c1add 136772->136773 136774 7ff6110d06d4 73 API calls 136773->136774 136775 7ff6110c1b01 136774->136775 136776 7ff6110c1b35 136775->136776 136777 7ff6110c1b16 136775->136777 136779 7ff6110d039c _fread_nolock 53 API calls 136776->136779 136872 7ff6110d4f08 11 API calls _get_daylight 136777->136872 136781 7ff6110c1b4a 136779->136781 136780 7ff6110c1b1b 136873 7ff6110c2910 54 API calls _log10_special 136780->136873 136783 7ff6110c1b50 136781->136783 136784 7ff6110c1b6f 136781->136784 136874 7ff6110d4f08 11 API calls _get_daylight 136783->136874 136876 7ff6110d0110 37 API calls 2 library calls 136784->136876 136787 7ff6110c1b89 136787->136791 136877 7ff6110c2710 54 API calls _log10_special 136787->136877 136788 7ff6110c1b55 136875 7ff6110c2910 54 API calls _log10_special 136788->136875 136791->136751 136793 7ff6110c883a 136792->136793 136794 7ff6110c9390 2 API calls 136793->136794 136795 7ff6110c8859 GetEnvironmentVariableW 136794->136795 136796 7ff6110c88c2 136795->136796 136797 7ff6110c8876 ExpandEnvironmentStringsW 136795->136797 136799 7ff6110cc550 _log10_special 8 API calls 136796->136799 136797->136796 136798 7ff6110c8898 136797->136798 136878 7ff6110c9440 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 136798->136878 136801 7ff6110c88d4 136799->136801 136801->136586 136802 7ff6110c88aa 136803 7ff6110cc550 _log10_special 8 API calls 136802->136803 136804 7ff6110c88ba 136803->136804 136804->136586 136879 7ff6110c6360 136805->136879 136808 7ff6110c3399 136850 7ff6110c3670 FreeLibrary 136808->136850 136810 7ff6110c3381 136810->136808 136947 7ff6110c6050 136810->136947 136814->136593 136816 7ff6110c7fb4 136815->136816 136817 7ff6110d06d4 73 API calls 136816->136817 136822 7ff6110c808b __std_exception_copy 136816->136822 136818 7ff6110c7fd0 136817->136818 136818->136822 137010 7ff6110d78c8 136818->137010 136820 7ff6110d06d4 73 API calls 136823 7ff6110c7fe5 136820->136823 136821 7ff6110d039c _fread_nolock 53 API calls 136821->136823 136822->136587 136823->136820 136823->136821 136823->136822 136824->136650 136825->136650 136826->136597 136827->136601 136828->136606 136829->136608 136830->136625 136831->136650 136832->136627 136833->136650 136834->136637 136835->136650 136836->136623 136838 7ff6110c1c80 49 API calls 136837->136838 136839 7ff6110c4660 136838->136839 136839->136645 136840->136678 136841->136682 136842->136684 136843->136689 136844->136696 136845->136690 136846->136693 136847->136693 136848->136658 136850->136669 136851->136675 136852->136719 136853->136719 136855 7ff6110c36bc GetModuleFileNameW 136854->136855 136855->136723 136855->136724 136857 7ff6110c92bf FindClose 136856->136857 136858 7ff6110c92d2 136856->136858 136857->136858 136859 7ff6110cc550 _log10_special 8 API calls 136858->136859 136860 7ff6110c371a 136859->136860 136860->136729 136860->136730 136861->136728 136862->136736 136863->136741 136864->136734 136865->136728 136866->136757 136867->136791 136868->136763 136869->136791 136870->136769 136871->136791 136872->136780 136873->136791 136874->136788 136875->136791 136876->136787 136877->136791 136878->136802 136880 7ff6110c6375 136879->136880 136881 7ff6110c1c80 49 API calls 136880->136881 136882 7ff6110c63b1 136881->136882 136883 7ff6110c63dd 136882->136883 136884 7ff6110c63ba 136882->136884 136885 7ff6110c4630 49 API calls 136883->136885 136967 7ff6110c2710 54 API calls _log10_special 136884->136967 136887 7ff6110c63f5 136885->136887 136888 7ff6110c6413 136887->136888 136968 7ff6110c2710 54 API calls _log10_special 136887->136968 136957 7ff6110c4560 136888->136957 136891 7ff6110cc550 _log10_special 8 API calls 136893 7ff6110c336e 136891->136893 136893->136808 136910 7ff6110c6500 136893->136910 136894 7ff6110c642b 136896 7ff6110c4630 49 API calls 136894->136896 136895 7ff6110c8e80 3 API calls 136895->136894 136897 7ff6110c6444 136896->136897 136898 7ff6110c6469 136897->136898 136899 7ff6110c6449 136897->136899 136963 7ff6110c8e80 136898->136963 136969 7ff6110c2710 54 API calls _log10_special 136899->136969 136909 7ff6110c63d3 136909->136891 136972 7ff6110c5400 136910->136972 136912 7ff6110c6526 136913 7ff6110c653f 136912->136913 136914 7ff6110c652e 136912->136914 136979 7ff6110c4c90 136913->136979 136997 7ff6110c2710 54 API calls _log10_special 136914->136997 136918 7ff6110c655c 136922 7ff6110c656c 136918->136922 136924 7ff6110c657d 136918->136924 136919 7ff6110c654b 136998 7ff6110c2710 54 API calls _log10_special 136919->136998 136921 7ff6110c653a 136921->136810 136948 7ff6110c6070 136947->136948 136948->136948 136949 7ff6110c6099 136948->136949 136955 7ff6110c60b0 __std_exception_copy 136948->136955 136958 7ff6110c456a 136957->136958 136959 7ff6110c9390 2 API calls 136958->136959 136960 7ff6110c458f 136959->136960 136961 7ff6110cc550 _log10_special 8 API calls 136960->136961 136962 7ff6110c45b7 136961->136962 136962->136894 136962->136895 136964 7ff6110c9390 2 API calls 136963->136964 136965 7ff6110c8e94 LoadLibraryExW 136964->136965 136967->136909 136968->136888 136969->136909 136974 7ff6110c542c 136972->136974 136973 7ff6110c5434 136973->136912 136974->136973 136977 7ff6110c55d4 136974->136977 137008 7ff6110d6aa4 48 API calls 136974->137008 136975 7ff6110c5797 __std_exception_copy 136975->136912 136976 7ff6110c47d0 47 API calls 136976->136977 136977->136975 136977->136976 136980 7ff6110c4cc0 136979->136980 136981 7ff6110cc550 _log10_special 8 API calls 136980->136981 136982 7ff6110c4d2a 136981->136982 136982->136918 136982->136919 136997->136921 136998->136921 137008->136974 137011 7ff6110d78f8 137010->137011 137014 7ff6110d73d4 137011->137014 137013 7ff6110d7911 137013->136823 137015 7ff6110d741e 137014->137015 137016 7ff6110d73ef 137014->137016 137024 7ff6110d546c EnterCriticalSection 137015->137024 137025 7ff6110da814 37 API calls 2 library calls 137016->137025 137023 7ff6110d740f 137023->137013 137025->137023 137026 7ffdff3a1230 137027 7ffdff3a1381 137026->137027 137028 7ffdff3a1241 137026->137028 137033 7ffdff3a13ab QueryPerformanceCounter EnterCriticalSection LeaveCriticalSection 137027->137033 137036 7ffdff3a13ef 137027->137036 137029 7ffdff3a124a InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 137028->137029 137030 7ffdff3a127b EnterCriticalSection 137028->137030 137029->137030 137031 7ffdff3a1295 QueryPerformanceFrequency 137030->137031 137032 7ffdff3a1374 LeaveCriticalSection 137030->137032 137034 7ffdff3a136a 137031->137034 137035 7ffdff3a12c4 7 API calls 137031->137035 137032->137027 137033->137036 137034->137032 137037 7ffdff2d1c10 30 API calls 137035->137037 137037->137034 137038 7ffe013d56f5 137039 7ffe013d5700 137038->137039 137043 7ffe013d5737 137039->137043 137046 7ffe0131cfa0 137039->137046 137041 7ffe013d5815 137042 7ffe013d57b2 137042->137041 137050 7ffe013250b0 20 API calls 137042->137050 137043->137041 137043->137042 137044 7ffe013d57b4 SetWindowPos 137043->137044 137044->137042 137047 7ffe0131cfbe 137046->137047 137048 7ffe0131cfe3 GetModuleHandleW 137047->137048 137049 7ffe0131cff2 CreateWindowExW SetWindowPos 137047->137049 137048->137049 137050->137041 137051 7ffdff2f8fe0 TlsGetValue 137052 7ffdff2f9003 137051->137052 137053 7ffdff2f9028 137052->137053 137054 7ffdff2f904f 137052->137054 137061 7ffdff2f9076 137052->137061 137063 7ffdff361d40 49 API calls 137053->137063 137054->137061 137064 7ffdff2d1d10 49 API calls 137054->137064 137057 7ffdff352860 30 API calls 137057->137061 137059 7ffdff2f907f 137060 7ffdff2f9454 137062 7ffdff2f9472 memcpy 137060->137062 137061->137057 137061->137059 137061->137060 137065 7ffdff352700 30 API calls 137061->137065 137062->137059 137063->137054 137064->137061 137065->137061 137066 7ffdff2f4580 TlsGetValue 137067 7ffdff2f45c6 137066->137067 137068 7ffdff2f4701 137067->137068 137070 7ffdff38bb60 137067->137070 137071 7ffdff38bb6f 137070->137071 137072 7ffdff38bc44 137071->137072 137073 7ffdff38bbad GetStdHandle 137071->137073 137074 7ffdff38bbbd 137073->137074 137076 7ffdff38bbc7 137073->137076 137077 7ffdff38b9d0 137074->137077 137076->137068 137078 7ffdff38bb17 137077->137078 137079 7ffdff38ba17 137077->137079 137081 7ffdff3a21a0 8 API calls 137078->137081 137089 7ffdff38c370 GetFileType 137079->137089 137083 7ffdff38bb29 137081->137083 137083->137076 137085 7ffdff38bad3 CloseHandle 137086 7ffdff38bafe 137085->137086 137086->137078 137097 7ffdff38bc60 65 API calls 137086->137097 137088 7ffdff38bb15 137088->137078 137090 7ffdff38c3a7 GetConsoleMode 137089->137090 137091 7ffdff38c399 137089->137091 137093 7ffdff38c3b9 137090->137093 137094 7ffdff38c3c0 GetCommState 137090->137094 137092 7ffdff38c39d GetLastError 137091->137092 137091->137093 137092->137090 137092->137093 137095 7ffdff3a21a0 8 API calls 137093->137095 137094->137093 137096 7ffdff38ba1c GetCurrentProcess GetCurrentProcess DuplicateHandle 137095->137096 137096->137078 137096->137085 137097->137088 137098 7ffe013d4590 137101 7ffe013d45bf 137098->137101 137099 7ffe013d4625 137100 7ffe013d463d 137099->137100 137111 7ffe0131ea40 137099->137111 137101->137099 137126 7ffe0137e410 isupper 137101->137126 137103 7ffe013d460d 137127 7ffe0137e410 isupper 137103->137127 137106 7ffe013d4619 137128 7ffe0137e410 isupper 137106->137128 137108 7ffe013d4698 137114 7ffe0132b110 137108->137114 137110 7ffe013d4714 137112 7ffe0131ea61 memset 137111->137112 137113 7ffe0131ebd5 137112->137113 137113->137108 137118 7ffe0132b13f 137114->137118 137124 7ffe0132b1ed 137114->137124 137118->137124 137125 7ffdff2ea700 638 API calls 137118->137125 137119 7ffe0132b558 137134 7ffe01319020 137119->137134 137121 7ffe0132b619 137122 7ffe013ffb70 6 API calls 137121->137122 137123 7ffe0132b626 137122->137123 137123->137110 137129 7ffe0132b6b0 137124->137129 137125->137118 137126->137103 137127->137106 137128->137099 137130 7ffe0132b6d1 memset 137129->137130 137131 7ffe0132b889 137130->137131 137132 7ffe0132b8d9 memset 137131->137132 137133 7ffe0132b51c memset 137131->137133 137132->137133 137133->137119 137135 7ffe0131904e 137134->137135 137168 7ffe013303e0 137135->137168 137137 7ffe013303e0 17 API calls 137141 7ffe013191b3 137137->137141 137140 7ffe013303e0 17 API calls 137145 7ffe013192a8 137140->137145 137147 7ffe013191e1 137141->137147 137177 7ffe0132ac90 memset 137141->137177 137142 7ffe013190ef 137142->137137 137143 7ffe013303e0 17 API calls 137149 7ffe01319396 137143->137149 137151 7ffe013192d6 137145->137151 137178 7ffe0132ac90 memset 137145->137178 137147->137140 137148 7ffe013303e0 17 API calls 137153 7ffe01319488 137148->137153 137155 7ffe013193c4 137149->137155 137179 7ffe0132ac90 memset 137149->137179 137151->137143 137152 7ffe013303e0 17 API calls 137157 7ffe0131957a 137152->137157 137159 7ffe013194b6 137153->137159 137180 7ffe0132ac90 memset 137153->137180 137155->137148 137156 7ffe013303e0 17 API calls 137161 7ffe0131966c 137156->137161 137163 7ffe013195a8 137157->137163 137181 7ffe0132ac90 memset 137157->137181 137159->137152 137160 7ffe013303e0 17 API calls 137164 7ffe0131975f 137160->137164 137166 7ffe0131969a 137161->137166 137182 7ffe0132ac90 memset 137161->137182 137163->137156 137167 7ffe0131978c 137164->137167 137183 7ffe0132ac90 memset 137164->137183 137166->137160 137167->137121 137172 7ffe01330434 137168->137172 137169 7ffe01330440 isspace 137169->137172 137170 7ffe01330450 isspace 137170->137170 137170->137172 137172->137169 137172->137170 137173 7ffe01330576 137172->137173 137175 7ffe013190bb 137172->137175 137184 7ffe01330780 14 API calls 137172->137184 137174 7ffe01330694 memcmp 137173->137174 137173->137175 137174->137173 137174->137175 137175->137142 137176 7ffe0132ac90 memset 137175->137176 137176->137142 137177->137147 137178->137151 137179->137155 137180->137159 137181->137163 137182->137166 137183->137167 137184->137172
                                                              APIs
                                                              • LeaveCriticalSection.KERNEL32 ref: 00007FFDFF255468
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • _wgetenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFDFF255A54
                                                              • GetCurrentThreadId.KERNEL32 ref: 00007FFDFF255B3F
                                                              • _wgetenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFDFF255B55
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValue_wgetenv$CurrentThread
                                                              • String ID: 1.1.0$2.0.1$8.6$8.6.14$::tcl$::tcl::Bgerror$::tcl::mathfunc$::tcl::mathop$::tcl::prefix$::tcl::unsupported$::tcl::unsupported::assemble$::tcl::unsupported::corotype$::tcl::unsupported::disassemble$::tcl::unsupported::getbytecode$::tcl::unsupported::representation$::tcl::unsupported::timerate$Can't create math function namespace$INNER$TCL_INTERP_DEBUG_FRAME$TCL_PKG_PREFER_LATEST$Tcl$TclOO$array$athop::$binary$binary decode$binary encode$builtin command with NULL object command proc and a NULL compile proc$can't create math operator namespace$cp1252$dian$dict$encoding$engine$failed to create math operator %s$file$form$hLevel$info$iso8859-1$namespace$namespace eval ::tcl::zlib {variable cmdcounter 0}$package ifneeded TclOO 1.1.0 {# Already present, OK?};namespace eval ::oo { variable version 1.1.0 };namespace eval ::oo { variable patchlevel 1.1.0 };$prefix$string$tcl$tcl::tommath$tcl_precision$threaded$unable to alloc %u bytes$wordSize$zlib$zlibVersion
                                                              • API String ID: 1213744103-853501400
                                                              • Opcode ID: 02b69529b29c3e7fa239b18c783de25b692f63cc187a519fc6383d11cab515b0
                                                              • Instruction ID: 32ae3ac6b639dec2198ab769cfb11de9a12c04dfb7f1d6d9a001e4d38e5230a9
                                                              • Opcode Fuzzy Hash: 02b69529b29c3e7fa239b18c783de25b692f63cc187a519fc6383d11cab515b0
                                                              • Instruction Fuzzy Hash: 56138C76B09B8286EB50EF11E460AA937E4FB44B88F484235DE6D4B7A9DF3CE154C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressAllocCriticalHeapLeaveProcSectionValue$CurrentHandleModuleProcessStartupThreadexit
                                                              • String ID: 8.6.14$CancelSynchronousIo$CreateSymbolicLinkW$KERNEL32$unable to alloc %u bytes
                                                              • API String ID: 4073625567-1425352424
                                                              • Opcode ID: 521dbe2f4904b2b1d503da5263b0991d99ce24fe40a88cb034c0d0a35c4259d1
                                                              • Instruction ID: e83eb31bbd97e34abb3b0dd069f854019d9032f7d0b1e1cc7f33e539dde61fc9
                                                              • Opcode Fuzzy Hash: 521dbe2f4904b2b1d503da5263b0991d99ce24fe40a88cb034c0d0a35c4259d1
                                                              • Instruction Fuzzy Hash: FF62D425B09A4787EB16BB11E8B0AB823E0BF94B44F454335D93D8A2FDDF7CA4498701

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1061 7ff6110c1000-7ff6110c3806 call 7ff6110cfe18 call 7ff6110cfe20 call 7ff6110cc850 call 7ff6110d53f0 call 7ff6110d5484 call 7ff6110c36b0 1075 7ff6110c3814-7ff6110c3836 call 7ff6110c1950 1061->1075 1076 7ff6110c3808-7ff6110c380f 1061->1076 1082 7ff6110c383c-7ff6110c3856 call 7ff6110c1c80 1075->1082 1083 7ff6110c391b-7ff6110c3931 call 7ff6110c45c0 1075->1083 1077 7ff6110c3c97-7ff6110c3cb2 call 7ff6110cc550 1076->1077 1087 7ff6110c385b-7ff6110c389b call 7ff6110c8830 1082->1087 1088 7ff6110c3933-7ff6110c3960 call 7ff6110c7f90 1083->1088 1089 7ff6110c396a-7ff6110c397f call 7ff6110c2710 1083->1089 1096 7ff6110c38c1-7ff6110c38cc call 7ff6110d4f30 1087->1096 1097 7ff6110c389d-7ff6110c38a3 1087->1097 1101 7ff6110c3984-7ff6110c39a6 call 7ff6110c1c80 1088->1101 1102 7ff6110c3962-7ff6110c3965 call 7ff6110d004c 1088->1102 1103 7ff6110c3c8f 1089->1103 1109 7ff6110c38d2-7ff6110c38e1 call 7ff6110c8830 1096->1109 1110 7ff6110c39fc-7ff6110c3a2a call 7ff6110c8940 call 7ff6110c89a0 * 3 1096->1110 1098 7ff6110c38af-7ff6110c38bd call 7ff6110c89a0 1097->1098 1099 7ff6110c38a5-7ff6110c38ad 1097->1099 1098->1096 1099->1098 1114 7ff6110c39b0-7ff6110c39b9 1101->1114 1102->1089 1103->1077 1120 7ff6110c39f4-7ff6110c39f7 call 7ff6110d4f30 1109->1120 1121 7ff6110c38e7-7ff6110c38ed 1109->1121 1136 7ff6110c3a2f-7ff6110c3a3e call 7ff6110c8830 1110->1136 1114->1114 1115 7ff6110c39bb-7ff6110c39d8 call 7ff6110c1950 1114->1115 1115->1087 1126 7ff6110c39de-7ff6110c39ef call 7ff6110c2710 1115->1126 1120->1110 1124 7ff6110c38f0-7ff6110c38fc 1121->1124 1128 7ff6110c38fe-7ff6110c3903 1124->1128 1129 7ff6110c3905-7ff6110c3908 1124->1129 1126->1103 1128->1124 1128->1129 1129->1120 1132 7ff6110c390e-7ff6110c3916 call 7ff6110d4f30 1129->1132 1132->1136 1140 7ff6110c3b45-7ff6110c3b53 1136->1140 1141 7ff6110c3a44-7ff6110c3a47 1136->1141 1143 7ff6110c3b59-7ff6110c3b5d 1140->1143 1144 7ff6110c3a67 1140->1144 1141->1140 1142 7ff6110c3a4d-7ff6110c3a50 1141->1142 1145 7ff6110c3b14-7ff6110c3b17 1142->1145 1146 7ff6110c3a56-7ff6110c3a5a 1142->1146 1147 7ff6110c3a6b-7ff6110c3a90 call 7ff6110d4f30 1143->1147 1144->1147 1148 7ff6110c3b2f-7ff6110c3b40 call 7ff6110c2710 1145->1148 1149 7ff6110c3b19-7ff6110c3b1d 1145->1149 1146->1145 1150 7ff6110c3a60 1146->1150 1156 7ff6110c3a92-7ff6110c3aa6 call 7ff6110c8940 1147->1156 1157 7ff6110c3aab-7ff6110c3ac0 1147->1157 1158 7ff6110c3c7f-7ff6110c3c87 1148->1158 1149->1148 1152 7ff6110c3b1f-7ff6110c3b2a 1149->1152 1150->1144 1152->1147 1156->1157 1160 7ff6110c3be8-7ff6110c3bfa call 7ff6110c8830 1157->1160 1161 7ff6110c3ac6-7ff6110c3aca 1157->1161 1158->1103 1169 7ff6110c3c2e 1160->1169 1170 7ff6110c3bfc-7ff6110c3c02 1160->1170 1162 7ff6110c3ad0-7ff6110c3ae8 call 7ff6110d5250 1161->1162 1163 7ff6110c3bcd-7ff6110c3be2 call 7ff6110c1940 1161->1163 1174 7ff6110c3b62-7ff6110c3b7a call 7ff6110d5250 1162->1174 1175 7ff6110c3aea-7ff6110c3b02 call 7ff6110d5250 1162->1175 1163->1160 1163->1161 1176 7ff6110c3c31-7ff6110c3c40 call 7ff6110d4f30 1169->1176 1172 7ff6110c3c1e-7ff6110c3c2c 1170->1172 1173 7ff6110c3c04-7ff6110c3c1c 1170->1173 1172->1176 1173->1176 1183 7ff6110c3b87-7ff6110c3b9f call 7ff6110d5250 1174->1183 1184 7ff6110c3b7c-7ff6110c3b80 1174->1184 1175->1163 1185 7ff6110c3b08-7ff6110c3b0f 1175->1185 1186 7ff6110c3d41-7ff6110c3d63 call 7ff6110c44e0 1176->1186 1187 7ff6110c3c46-7ff6110c3c4a 1176->1187 1196 7ff6110c3ba1-7ff6110c3ba5 1183->1196 1197 7ff6110c3bac-7ff6110c3bc4 call 7ff6110d5250 1183->1197 1184->1183 1185->1163 1200 7ff6110c3d71-7ff6110c3d82 call 7ff6110c1c80 1186->1200 1201 7ff6110c3d65-7ff6110c3d6f call 7ff6110c4630 1186->1201 1189 7ff6110c3c50-7ff6110c3c5f call 7ff6110c90e0 1187->1189 1190 7ff6110c3cd4-7ff6110c3ce6 call 7ff6110c8830 1187->1190 1204 7ff6110c3c61 1189->1204 1205 7ff6110c3cb3-7ff6110c3cbd call 7ff6110c8660 1189->1205 1207 7ff6110c3d35-7ff6110c3d3c 1190->1207 1208 7ff6110c3ce8-7ff6110c3ceb 1190->1208 1196->1197 1197->1163 1218 7ff6110c3bc6 1197->1218 1209 7ff6110c3d87-7ff6110c3d96 1200->1209 1201->1209 1211 7ff6110c3c68 call 7ff6110c2710 1204->1211 1222 7ff6110c3cbf-7ff6110c3cc6 1205->1222 1223 7ff6110c3cc8-7ff6110c3ccf 1205->1223 1207->1211 1208->1207 1213 7ff6110c3ced-7ff6110c3d10 call 7ff6110c1c80 1208->1213 1215 7ff6110c3dc4-7ff6110c3dda call 7ff6110c9390 1209->1215 1216 7ff6110c3d98-7ff6110c3d9f 1209->1216 1226 7ff6110c3c6d-7ff6110c3c77 1211->1226 1227 7ff6110c3d12-7ff6110c3d26 call 7ff6110c2710 call 7ff6110d4f30 1213->1227 1228 7ff6110c3d2b-7ff6110c3d33 call 7ff6110d4f30 1213->1228 1233 7ff6110c3de8-7ff6110c3e04 SetDllDirectoryW 1215->1233 1234 7ff6110c3ddc 1215->1234 1216->1215 1221 7ff6110c3da1-7ff6110c3da5 1216->1221 1218->1163 1221->1215 1229 7ff6110c3da7-7ff6110c3dbe SetDllDirectoryW LoadLibraryExW 1221->1229 1222->1211 1223->1209 1226->1158 1227->1226 1228->1209 1229->1215 1237 7ff6110c3f01-7ff6110c3f08 1233->1237 1238 7ff6110c3e0a-7ff6110c3e19 call 7ff6110c8830 1233->1238 1234->1233 1240 7ff6110c3f0e-7ff6110c3f15 1237->1240 1241 7ff6110c4008-7ff6110c4010 1237->1241 1250 7ff6110c3e32-7ff6110c3e3c call 7ff6110d4f30 1238->1250 1251 7ff6110c3e1b-7ff6110c3e21 1238->1251 1240->1241 1244 7ff6110c3f1b-7ff6110c3f25 call 7ff6110c33c0 1240->1244 1245 7ff6110c4035-7ff6110c4040 call 7ff6110c36a0 call 7ff6110c3360 1241->1245 1246 7ff6110c4012-7ff6110c402f PostMessageW GetMessageW 1241->1246 1244->1226 1258 7ff6110c3f2b-7ff6110c3f3f call 7ff6110c90c0 1244->1258 1263 7ff6110c4045-7ff6110c4067 call 7ff6110c3670 call 7ff6110c6fc0 call 7ff6110c6d70 1245->1263 1246->1245 1260 7ff6110c3ef2-7ff6110c3efc call 7ff6110c8940 1250->1260 1261 7ff6110c3e42-7ff6110c3e48 1250->1261 1255 7ff6110c3e23-7ff6110c3e2b 1251->1255 1256 7ff6110c3e2d-7ff6110c3e2f 1251->1256 1255->1256 1256->1250 1271 7ff6110c3f41-7ff6110c3f5e PostMessageW GetMessageW 1258->1271 1272 7ff6110c3f64-7ff6110c3fa7 call 7ff6110c8940 call 7ff6110c89e0 call 7ff6110c6fc0 call 7ff6110c6d70 call 7ff6110c88e0 1258->1272 1260->1237 1261->1260 1265 7ff6110c3e4e-7ff6110c3e54 1261->1265 1269 7ff6110c3e5f-7ff6110c3e61 1265->1269 1270 7ff6110c3e56-7ff6110c3e58 1265->1270 1269->1237 1274 7ff6110c3e67-7ff6110c3e83 call 7ff6110c6dc0 call 7ff6110c7340 1269->1274 1270->1274 1275 7ff6110c3e5a 1270->1275 1271->1272 1310 7ff6110c3ff5-7ff6110c4003 call 7ff6110c1900 1272->1310 1311 7ff6110c3fa9-7ff6110c3fbf call 7ff6110c8ed0 call 7ff6110c88e0 1272->1311 1289 7ff6110c3e8e-7ff6110c3e95 1274->1289 1290 7ff6110c3e85-7ff6110c3e8c 1274->1290 1275->1237 1291 7ff6110c3eaf-7ff6110c3eb9 call 7ff6110c71b0 1289->1291 1292 7ff6110c3e97-7ff6110c3ea4 call 7ff6110c6e00 1289->1292 1294 7ff6110c3edb-7ff6110c3ef0 call 7ff6110c2a50 call 7ff6110c6fc0 call 7ff6110c6d70 1290->1294 1304 7ff6110c3ec4-7ff6110c3ed2 call 7ff6110c74f0 1291->1304 1305 7ff6110c3ebb-7ff6110c3ec2 1291->1305 1292->1291 1303 7ff6110c3ea6-7ff6110c3ead 1292->1303 1294->1237 1303->1294 1304->1237 1318 7ff6110c3ed4 1304->1318 1305->1294 1310->1226 1311->1310 1322 7ff6110c3fc1-7ff6110c3fd6 1311->1322 1318->1294 1323 7ff6110c3ff0 call 7ff6110c2a50 1322->1323 1324 7ff6110c3fd8-7ff6110c3feb call 7ff6110c2710 call 7ff6110c1900 1322->1324 1323->1310 1324->1226
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastModuleName
                                                              • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag$pyi-runtime-tmpdir
                                                              • API String ID: 2776309574-4232158417
                                                              • Opcode ID: d52c1960cc45de78c26c9f57622ace5a14626686e839aa839f1fc42fe00fc1f1
                                                              • Instruction ID: 429923f5d8ce7d379b404d27ec0bf483629e77543e7e68de51100c6295842244
                                                              • Opcode Fuzzy Hash: d52c1960cc45de78c26c9f57622ace5a14626686e839aa839f1fc42fe00fc1f1
                                                              • Instruction Fuzzy Hash: A132E221E1CE8291FB15D722D4553F92768AF44FA2F4440B2DA5DC72D6EF2CE658CB20
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strstr
                                                              • String ID: 1.1.0$2.0.1$8.6$8.6.14$::tcl::mathfunc$::tcl::mathop$::tcl::unsupported$::tcl::unsupported::corotype$::tcl::unsupported::timerate$Tcl$TclOO$athop::$cp1252$dian$engine$form$hLevel$iso8859-1$namespace eval ::tcl::zlib {variable cmdcounter 0}$package ifneeded TclOO 1.1.0 {# Already present, OK?};namespace eval ::oo { variable version 1.1.0 };namespace eval ::oo { variable patchlevel 1.1.0 };$tcl$tcl::tommath$tcl_precision$threaded$wordSize$zlib$zlibVersion
                                                              • API String ID: 1392478783-2972830192
                                                              • Opcode ID: b46dcde2bf9584c94bba525ea7f7c3170e4311aa3143d3f9ef602c79ea8a357d
                                                              • Instruction ID: 3b31223fca0612fa84670967ee82fc6821a85ce87a61303d344da5fbc84636cf
                                                              • Opcode Fuzzy Hash: b46dcde2bf9584c94bba525ea7f7c3170e4311aa3143d3f9ef602c79ea8a357d
                                                              • Instruction Fuzzy Hash: 2E927C36B09B828AEB60AF11E560AA937E4FB44788F448235DE7D4B799DF3CE154C740

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1831 7ffe01311510-7ffe0131152a 1832 7ffe01311530-7ffe013115a7 SendMessageW * 3 1831->1832 1833 7ffe013115b6-7ffe013115be 1831->1833 1834 7ffe013115a9 1832->1834 1835 7ffe013115ac-7ffe013115b1 1832->1835 1836 7ffe013115c0-7ffe013115ce 1833->1836 1837 7ffe01311602-7ffe01311609 1833->1837 1834->1835 1835->1833 1836->1837 1840 7ffe013115d0-7ffe013115df 1836->1840 1838 7ffe01311658-7ffe0131165d 1837->1838 1839 7ffe0131160b-7ffe01311619 1837->1839 1839->1838 1841 7ffe0131161b-7ffe0131162a 1839->1841 1842 7ffe013115e1 1840->1842 1843 7ffe013115eb-7ffe013115f2 1840->1843 1844 7ffe01311636-7ffe0131163d 1841->1844 1845 7ffe0131162c 1841->1845 1842->1843 1843->1837 1846 7ffe013115f4-7ffe013115f8 1843->1846 1844->1838 1847 7ffe0131163f-7ffe01311649 1844->1847 1845->1844 1846->1837 1848 7ffe013115fa-7ffe013115fd call 7ffe0131ec30 1846->1848 1847->1838 1850 7ffe0131164b-7ffe0131eca2 1847->1850 1848->1837 1853 7ffe0131eca4-7ffe0131eca7 call 7ffe013d56d0 1850->1853 1854 7ffe0131ecac-7ffe0131ecd3 GetFocus 1850->1854 1853->1854 1856 7ffe0131ece0 1854->1856 1857 7ffe0131ecd5-7ffe0131ecde GetForegroundWindow 1854->1857 1858 7ffe0131ece8-7ffe0131ed0a 1856->1858 1857->1856 1857->1858 1860 7ffe0131ed1d-7ffe0131ed29 IsWindow 1858->1860 1861 7ffe0131ed0c-7ffe0131ed13 1858->1861 1862 7ffe0131f07f-7ffe0131f0a5 SetWindowLongPtrW 1860->1862 1863 7ffe0131ed2f-7ffe0131ed40 1860->1863 1861->1860 1864 7ffe0131f0a7-7ffe0131f0b6 SetWindowLongPtrW 1862->1864 1865 7ffe0131f0bc-7ffe0131f0cc SetParent 1862->1865 1863->1862 1864->1865 1867 7ffe0131f0d2-7ffe0131f10a SendMessageW * 2 1865->1867 1868 7ffe0131f1ac-7ffe0131f1bd 1865->1868 1867->1868 1871 7ffe0131f110-7ffe0131f119 GetDesktopWindow 1867->1871 1869 7ffe0131f1bf-7ffe0131f1d7 SendMessageW 1868->1869 1870 7ffe0131f231-7ffe0131f245 1868->1870 1869->1870 1874 7ffe0131f1d9-7ffe0131f22b SendMessageW call 7ffe01391730 SendMessageW 1869->1874 1872 7ffe0131f247-7ffe0131f264 SetWindowPos 1870->1872 1873 7ffe0131f26a-7ffe0131f287 call 7ffe0131f560 1870->1873 1871->1868 1875 7ffe0131f11f-7ffe0131f137 SetWindowLongPtrW 1871->1875 1872->1873 1882 7ffe0131f29e-7ffe0131f2a9 1873->1882 1883 7ffe0131f289-7ffe0131f298 SendMessageW 1873->1883 1874->1870 1877 7ffe0131f139-7ffe0131f15b 1875->1877 1878 7ffe0131f198-7ffe0131f1a6 SetMenu DestroyWindow 1875->1878 1877->1878 1885 7ffe0131f15d 1877->1885 1878->1868 1886 7ffe0131f2c1-7ffe0131f2cb 1882->1886 1887 7ffe0131f2ab-7ffe0131f2bb SendMessageW 1882->1887 1883->1882 1889 7ffe0131f160-7ffe0131f164 1885->1889 1890 7ffe0131f339-7ffe0131f343 1886->1890 1891 7ffe0131f2cd-7ffe0131f2eb SendMessageW 1886->1891 1887->1886 1892 7ffe0131f166-7ffe0131f16d 1889->1892 1893 7ffe0131f18c-7ffe0131f196 1889->1893 1896 7ffe0131f345-7ffe0131f356 SetMenu 1890->1896 1897 7ffe0131f35d-7ffe0131f360 1890->1897 1894 7ffe0131f32d-7ffe0131f334 call 7ffe0131d140 1891->1894 1895 7ffe0131f2ed-7ffe0131f326 1891->1895 1892->1893 1900 7ffe0131f16f-7ffe0131f186 SetParent 1892->1900 1893->1878 1893->1889 1894->1890 1895->1894 1896->1897 1898 7ffe0131f3bf-7ffe0131f3f6 SetActiveWindow 1897->1898 1899 7ffe0131f362-7ffe0131f368 1897->1899 1907 7ffe0131f40e-7ffe0131f427 call 7ffe013ffb70 1898->1907 1903 7ffe0131f3b2-7ffe0131f3b9 1899->1903 1904 7ffe0131f36a-7ffe0131f378 1899->1904 1900->1893 1903->1898 1904->1903 1908 7ffe0131f37a-7ffe0131f37d 1904->1908 1910 7ffe0131f380-7ffe0131f384 1908->1910 1912 7ffe0131f3a6-7ffe0131f3b0 1910->1912 1913 7ffe0131f386-7ffe0131f38d 1910->1913 1912->1903 1912->1910 1913->1912 1914 7ffe0131f38f-7ffe0131f3a2 call 7ffe0131ec30 call 7ffe0131f560 1913->1914 1914->1912
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$FocusForegroundLong
                                                              • String ID: UpdateWrapper: Cannot find container window$UpdateWrapper: Container was destroyed
                                                              • API String ID: 2937761121-1156326135
                                                              • Opcode ID: 4d504eb96be36b05dfe6c5abbbbcec6244f266e14b4bb88a6b8d00f683303c0c
                                                              • Instruction ID: 48f04552f026452d5498c96c14b7a0f87ce90d478ade995d2b6ae85f5e8b5f9d
                                                              • Opcode Fuzzy Hash: 4d504eb96be36b05dfe6c5abbbbcec6244f266e14b4bb88a6b8d00f683303c0c
                                                              • Instruction Fuzzy Hash: 0EF15D32A09A82C6EB648F62E8447A973A4FB88B94F594535CF5D0B7B4DF3CE495C700

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8.6$8.6.14$Button.border$P$Ttk$arrow$classic$downarrow$highlight$hsash$image$label$leftarrow$rightarrow$text$ttk::theme::classic$uparrow$vsash
                                                              • API String ID: 0-3314802244
                                                              • Opcode ID: dc5da61c5733a29c19cc1d37e8740ac292d4e205b7da8f432889e04222e83d23
                                                              • Instruction ID: f5886badcc5476d4bf4371157a5693cd2d4a0a3846d79608b129a5106fd8ac9a
                                                              • Opcode Fuzzy Hash: dc5da61c5733a29c19cc1d37e8740ac292d4e205b7da8f432889e04222e83d23
                                                              • Instruction Fuzzy Hash: 45D14661A08B8695EB009B65E9402FA73A5FF48B84F85413AEA4D1BB75EF3CE245C740
                                                              APIs
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • GetModuleHandleW.KERNEL32 ref: 00007FFDFF3937F9
                                                              • GetProcAddress.KERNEL32 ref: 00007FFDFF393809
                                                              • GetVersionExW.KERNEL32 ref: 00007FFDFF393832
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF393B69
                                                                • Part of subcall function 00007FFDFF3610C0: TlsAlloc.KERNEL32(?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3610DA
                                                                • Part of subcall function 00007FFDFF3610C0: TlsGetValue.KERNEL32(?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361108
                                                                • Part of subcall function 00007FFDFF3610C0: GetLastError.KERNEL32(?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361116
                                                                • Part of subcall function 00007FFDFF3610C0: GetProcessHeap.KERNEL32(?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36115A
                                                                • Part of subcall function 00007FFDFF3610C0: HeapFree.KERNEL32(?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361168
                                                              • GetSystemInfo.KERNEL32 ref: 00007FFDFF393847
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF3363BD
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF336495
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocValue$ErrorLastProcess$AddressCriticalFreeHandleInfoLeaveModuleProcSectionSystemVersionmemcpy
                                                              • String ID: %ld.%ld$HOME$HOMEPATH$NTDLL$RtlGetVersion$c:\$env$machine$platform$rator$tcl_platform$unable to alloc %u bytes$user$windows
                                                              • API String ID: 577616343-2568045241
                                                              • Opcode ID: 40b80bfc08595f530126b67d6c281ba749b0f3fbe64c66b0e235ac1db3d714dc
                                                              • Instruction ID: ca6d37fb84422b2cb9ad696947671d664a13ae06c4a3b510ef1c4c50fb1fc65a
                                                              • Opcode Fuzzy Hash: 40b80bfc08595f530126b67d6c281ba749b0f3fbe64c66b0e235ac1db3d714dc
                                                              • Instruction Fuzzy Hash: A2828C72B097828BEB15AF11D4A0A6977E5EB44B84F048235DA7E1B7EADF3CE450C740

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Create$BitmapBrushPattern
                                                              • String ID: 8.6$Button.border$Combobox.focus$Scrollbar.trough$Ttk$alt$border$client$field$focus$slider$tab$thumb$ttk::theme::winnative$winnative
                                                              • API String ID: 3280665104-833756576
                                                              • Opcode ID: ac1d74712d472e0c3b42efd4b010b2d4dd739d0eeedf5dcb94a05e85bfcddce0
                                                              • Instruction ID: e556869f17201e98be32356182d53978e126c37952af31b65ceaf1a4d5121da5
                                                              • Opcode Fuzzy Hash: ac1d74712d472e0c3b42efd4b010b2d4dd739d0eeedf5dcb94a05e85bfcddce0
                                                              • Instruction Fuzzy Hash: 80713975A08B8A91EB14EF61F8106E977A0FB48B94F85413ADA8D1B7B5DF3CE145C700

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Initialize$Create$EnterEventLeavePerformanceQueryThread$CloseCounterFrequencyHandleObjectPrioritySingleWait
                                                              • String ID: gfffffff
                                                              • API String ID: 1584168963-1523873471
                                                              • Opcode ID: e76321f29088f67425d5e855579981ca0d4e2285c778d44d0f618192ccfae9ec
                                                              • Instruction ID: aa94ab77e2e0efdd04730984c171946abe512268f0d8e32b865457d4a06998fa
                                                              • Opcode Fuzzy Hash: e76321f29088f67425d5e855579981ca0d4e2285c778d44d0f618192ccfae9ec
                                                              • Instruction Fuzzy Hash: E151F62AB08A4683EB00BB16F864A6563E1FF84784F454231D93E9E6F8DF7DE448D701

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LoadWindow$Icon$ClassCreateCursorHandleLibraryLongModuleRegisterShowUpdate
                                                              • String ID: 8.6$8.6.14$P$Ttk$ttk::theme::classic
                                                              • API String ID: 1021714739-3142415804
                                                              • Opcode ID: 98100f294466f5bbc972026bda04eb1b2cec0d519b92341183633212e056a82a
                                                              • Instruction ID: bc6312c71500324024d21aca2b411c9a2b1f7efd67e6babbced7341c14062816
                                                              • Opcode Fuzzy Hash: 98100f294466f5bbc972026bda04eb1b2cec0d519b92341183633212e056a82a
                                                              • Instruction Fuzzy Hash: 82614C32A08B8286FB019F65E8402A973B0FB89B84F55513AEE4D5BB75EF3CD585C340

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2556 7ffe013811e0-7ffe0138121f 2557 7ffe01381225-7ffe01381227 2556->2557 2558 7ffe013812c0-7ffe013812db 2556->2558 2561 7ffe01381230-7ffe01381250 2557->2561 2559 7ffe01381365 2558->2559 2560 7ffe013812e1-7ffe013812e8 2558->2560 2562 7ffe01381368-7ffe0138136f 2559->2562 2560->2562 2563 7ffe013812ea-7ffe013812f1 2560->2563 2568 7ffe013812b4-7ffe013812ba 2561->2568 2569 7ffe01381252-7ffe01381255 2561->2569 2564 7ffe01381371-7ffe01381373 2562->2564 2565 7ffe01381376-7ffe013813c1 call 7ffe013d6370 call 7ffe0139a960 2562->2565 2563->2562 2564->2565 2581 7ffe013814fc-7ffe013814ff 2565->2581 2582 7ffe013813c7-7ffe013813d1 2565->2582 2568->2558 2568->2561 2569->2568 2571 7ffe01381257-7ffe0138125b 2569->2571 2573 7ffe0138125d-7ffe01381272 strncmp 2571->2573 2574 7ffe01381287-7ffe0138128b 2571->2574 2573->2574 2575 7ffe01381274-7ffe0138127a 2573->2575 2574->2568 2576 7ffe0138128d-7ffe013812a2 strncmp 2574->2576 2578 7ffe013812f3 2575->2578 2579 7ffe0138127c-7ffe01381285 2575->2579 2576->2568 2580 7ffe013812a4-7ffe013812aa 2576->2580 2587 7ffe013812fa-7ffe01381357 2578->2587 2579->2568 2585 7ffe013812b0 2580->2585 2586 7ffe0138135c-7ffe01381363 2580->2586 2583 7ffe01381501-7ffe0138150d 2581->2583 2584 7ffe0138151f-7ffe01381522 2581->2584 2588 7ffe013813d3-7ffe013813d5 2582->2588 2589 7ffe013813ee 2582->2589 2583->2584 2591 7ffe0138150f-7ffe01381516 2583->2591 2592 7ffe01381524-7ffe0138152e 2584->2592 2593 7ffe01381540 2584->2593 2585->2568 2586->2587 2600 7ffe0138154d-7ffe0138156d 2587->2600 2588->2589 2594 7ffe013813d7-7ffe013813ec 2588->2594 2590 7ffe013813f1-7ffe013813f9 2589->2590 2595 7ffe0138144f-7ffe01381452 2590->2595 2596 7ffe013813fb-7ffe0138141b 2590->2596 2591->2584 2592->2593 2597 7ffe01381530-7ffe01381537 2592->2597 2598 7ffe01381545 2593->2598 2594->2590 2601 7ffe01381454-7ffe0138146a 2595->2601 2602 7ffe0138149f-7ffe013814b0 call 7ffe01381b00 2595->2602 2607 7ffe01381422 2596->2607 2608 7ffe0138141d-7ffe01381420 2596->2608 2597->2593 2598->2600 2612 7ffe01381472 2601->2612 2613 7ffe0138146c-7ffe01381470 2601->2613 2615 7ffe0138156e-7ffe01381578 2602->2615 2616 7ffe013814b6-7ffe013814f3 2602->2616 2614 7ffe01381425-7ffe0138142c 2607->2614 2608->2614 2617 7ffe01381475-7ffe0138147c 2612->2617 2613->2617 2618 7ffe0138142e-7ffe01381438 2614->2618 2619 7ffe01381447-7ffe0138144b 2614->2619 2620 7ffe0138157e-7ffe01381583 2615->2620 2621 7ffe01381758-7ffe0138175c 2615->2621 2616->2581 2622 7ffe0138147e-7ffe01381488 2617->2622 2623 7ffe01381497-7ffe0138149b 2617->2623 2618->2619 2626 7ffe0138143a 2618->2626 2619->2595 2627 7ffe01381585-7ffe01381589 2620->2627 2628 7ffe0138158f-7ffe013815ab 2620->2628 2624 7ffe01381762-7ffe01381769 2621->2624 2625 7ffe01381861-7ffe01381869 2621->2625 2622->2623 2630 7ffe0138148a 2622->2630 2623->2602 2624->2625 2631 7ffe0138176f-7ffe01381772 2624->2631 2632 7ffe0138186b-7ffe01381875 2625->2632 2633 7ffe01381879-7ffe01381882 2625->2633 2626->2619 2627->2621 2627->2628 2640 7ffe013815ad-7ffe01381602 2628->2640 2641 7ffe01381607-7ffe01381620 2628->2641 2630->2623 2637 7ffe01381774-7ffe01381778 2631->2637 2638 7ffe0138177e-7ffe013817b2 call 7ffe013822b0 2631->2638 2632->2633 2634 7ffe01381884 2633->2634 2635 7ffe01381891 2633->2635 2634->2635 2642 7ffe01381886-7ffe0138188f 2634->2642 2643 7ffe01381895-7ffe0138189c 2635->2643 2637->2625 2637->2638 2638->2581 2652 7ffe013817b8-7ffe013817cb call 7ffe01381b00 2638->2652 2640->2581 2641->2581 2656 7ffe01381626-7ffe0138164a 2641->2656 2642->2635 2642->2643 2645 7ffe013818b1-7ffe013818c9 2643->2645 2646 7ffe0138189e 2643->2646 2650 7ffe013818f5-7ffe013818fc 2645->2650 2651 7ffe013818cb 2645->2651 2649 7ffe013818a0-7ffe013818af call 7ffe013846a0 2646->2649 2649->2645 2657 7ffe013818fe-7ffe0138190a 2650->2657 2658 7ffe0138191c-7ffe0138191f 2650->2658 2655 7ffe013818d0-7ffe013818f3 2651->2655 2652->2616 2666 7ffe013817d1-7ffe013817e0 2652->2666 2655->2650 2673 7ffe01381650-7ffe01381690 call 7ffe01381ea0 2656->2673 2674 7ffe0138194c-7ffe0138195e 2656->2674 2657->2658 2660 7ffe0138190c-7ffe01381913 2657->2660 2661 7ffe01381921-7ffe0138192b 2658->2661 2662 7ffe0138193d-7ffe01381947 call 7ffe01381970 2658->2662 2660->2658 2661->2662 2667 7ffe0138192d-7ffe01381934 2661->2667 2662->2598 2671 7ffe013817e2-7ffe013817e5 2666->2671 2672 7ffe0138180d-7ffe01381842 call 7ffe0137c050 2666->2672 2667->2662 2678 7ffe013817fa-7ffe0138180a 2671->2678 2679 7ffe013817e7-7ffe013817f7 2671->2679 2683 7ffe01381845-7ffe01381847 2672->2683 2673->2674 2684 7ffe01381696-7ffe013816a9 call 7ffe01381b00 2673->2684 2674->2581 2678->2672 2679->2678 2683->2581 2687 7ffe0138184d-7ffe0138185d 2683->2687 2691 7ffe013816c2-7ffe013816ce 2684->2691 2692 7ffe013816ab-7ffe013816bd 2684->2692 2687->2625 2693 7ffe013816d0-7ffe013816d3 2691->2693 2694 7ffe013816e8-7ffe0138173a 2691->2694 2692->2616 2693->2694 2696 7ffe013816d5-7ffe013816e5 2693->2696 2694->2581 2700 7ffe01381740-7ffe01381754 2694->2700 2696->2694 2700->2621
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: -data$-format$-translation$IMAGE$MALLOC$MISSING_VALUE$PHOTO$PHOTO_FILE$SAFE$binary$can't get image from a file in a safe interpreter$not enough free memory for image buffer$value for "-data" missing$value for "-format" missing
                                                              • API String ID: 1114863663-986971618
                                                              • Opcode ID: 099bbc3ea5f3008e4233c11220f661ff927721c18c7ff7f2088954c3f937f75b
                                                              • Instruction ID: 6c897ce42d3674e8e7489847423d6a03a45d0b731e7c27106592a450351467ae
                                                              • Opcode Fuzzy Hash: 099bbc3ea5f3008e4233c11220f661ff927721c18c7ff7f2088954c3f937f75b
                                                              • Instruction Fuzzy Hash: 0B226876A08B829AEB518F16E4402BE77A0FB88B84F594136DE4E5BB74DF3CE455C700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2908 7ffdff2f7c40-7ffdff2f7cb6 2909 7ffdff2f7cb8-7ffdff2f7cbd call 7ffdff2f7b10 2908->2909 2910 7ffdff2f7cc2-7ffdff2f7cd6 2908->2910 2909->2910 2911 7ffdff2f7cd8-7ffdff2f7cdc 2910->2911 2912 7ffdff2f7cde-7ffdff2f7cee memchr 2910->2912 2911->2912 2914 7ffdff2f7cf3-7ffdff2f7cf9 2911->2914 2912->2914 2916 7ffdff2f811a 2914->2916 2917 7ffdff2f7cff 2914->2917 2919 7ffdff2f811c-7ffdff2f813f call 7ffdff3a21a0 2916->2919 2918 7ffdff2f7d00-7ffdff2f7d02 2917->2918 2920 7ffdff2f7d08-7ffdff2f7d0e 2918->2920 2921 7ffdff2f80d3-7ffdff2f80db 2918->2921 2923 7ffdff2f7d15-7ffdff2f7d1c 2920->2923 2924 7ffdff2f7d10-7ffdff2f7d12 2920->2924 2926 7ffdff2f80e3-7ffdff2f80e5 2921->2926 2927 7ffdff2f80dd-7ffdff2f80e1 2921->2927 2931 7ffdff2f7d68 2923->2931 2932 7ffdff2f7d1e-7ffdff2f7d36 call 7ffdff360f70 2923->2932 2924->2923 2929 7ffdff2f80e7-7ffdff2f80eb 2926->2929 2930 7ffdff2f8103-7ffdff2f8105 2926->2930 2927->2926 2928 7ffdff2f80ed-7ffdff2f8101 call 7ffdff2f6170 2927->2928 2928->2930 2940 7ffdff2f8113-7ffdff2f8118 2928->2940 2929->2928 2929->2930 2930->2916 2934 7ffdff2f8107-7ffdff2f810d _errno 2930->2934 2936 7ffdff2f7d6b-7ffdff2f7d6e 2931->2936 2944 7ffdff2f7d38-7ffdff2f7d3a 2932->2944 2945 7ffdff2f7d40-7ffdff2f7d66 2932->2945 2934->2940 2937 7ffdff2f7d97-7ffdff2f7d9b 2936->2937 2938 7ffdff2f7d70-7ffdff2f7d92 memcpy 2936->2938 2942 7ffdff2f815c-7ffdff2f81a9 call 7ffdff33af80 call 7ffdff3613e0 call 7ffdff2f82a0 2937->2942 2943 7ffdff2f7da1-7ffdff2f7ddc 2937->2943 2938->2937 2940->2919 2969 7ffdff2f81ae-7ffdff2f81b2 2942->2969 2947 7ffdff2f7de3-7ffdff2f7de5 2943->2947 2948 7ffdff2f7dde-7ffdff2f7de1 2943->2948 2944->2945 2949 7ffdff2f8140-7ffdff2f814e call 7ffdff33af80 2944->2949 2945->2936 2951 7ffdff2f7dfa-7ffdff2f7dfd 2947->2951 2952 7ffdff2f7de7-7ffdff2f7dee 2947->2952 2948->2951 2962 7ffdff2f814f-7ffdff2f815b call 7ffdff33af80 2949->2962 2956 7ffdff2f7e0b-7ffdff2f7e10 2951->2956 2957 7ffdff2f7dff-7ffdff2f7e03 2951->2957 2955 7ffdff2f7df0-7ffdff2f7df8 2952->2955 2955->2951 2955->2955 2960 7ffdff2f7e12-7ffdff2f7e1c 2956->2960 2961 7ffdff2f7e1e-7ffdff2f7e63 2956->2961 2957->2956 2965 7ffdff2f7e85-7ffdff2f7e8f 2960->2965 2975 7ffdff2f7e65-7ffdff2f7e6a 2961->2975 2976 7ffdff2f7e70-7ffdff2f7e80 2961->2976 2962->2942 2967 7ffdff2f7e91-7ffdff2f7e9c 2965->2967 2968 7ffdff2f7ea2-7ffdff2f7ed1 2965->2968 2967->2968 2971 7ffdff2f7ed7-7ffdff2f7eda 2968->2971 2972 7ffdff2f7ff5-7ffdff2f7ffa 2968->2972 2973 7ffdff2f81b4-7ffdff2f81bb 2969->2973 2974 7ffdff2f8203-7ffdff2f820d 2969->2974 2971->2972 2981 7ffdff2f7ee0-7ffdff2f7ee6 2971->2981 2982 7ffdff2f7ffc-7ffdff2f801d memcpy 2972->2982 2983 7ffdff2f801f-7ffdff2f802f 2972->2983 2984 7ffdff2f81f7-7ffdff2f81fe call 7ffdff36cde0 2973->2984 2985 7ffdff2f81bd-7ffdff2f81c8 2973->2985 2979 7ffdff2f825f-7ffdff2f8270 2974->2979 2980 7ffdff2f820f-7ffdff2f8216 2974->2980 2975->2976 2977 7ffdff2f7e82 2976->2977 2978 7ffdff2f7e9e 2976->2978 2977->2965 2978->2968 2987 7ffdff2f8239-7ffdff2f8240 2980->2987 2988 7ffdff2f8218-7ffdff2f821d 2980->2988 2989 7ffdff2f7f0b 2981->2989 2990 7ffdff2f7ee8-7ffdff2f7eeb 2981->2990 2982->2983 2991 7ffdff2f8049 2983->2991 2992 7ffdff2f8031-7ffdff2f8047 2983->2992 2984->2974 2993 7ffdff2f8271-7ffdff2f8280 call 7ffdff33af80 2985->2993 2994 7ffdff2f81ce-7ffdff2f81db 2985->2994 2999 7ffdff2f8242-7ffdff2f8249 2987->2999 3000 7ffdff2f8250-7ffdff2f825a call 7ffdff361580 2987->3000 2988->2987 2996 7ffdff2f821f-7ffdff2f8238 call 7ffdff336360 2988->2996 3002 7ffdff2f7f11 2989->3002 2997 7ffdff2f7efc-7ffdff2f7f09 2990->2997 2998 7ffdff2f7eed-7ffdff2f7ef0 2990->2998 3001 7ffdff2f804e-7ffdff2f8050 2991->3001 2992->3001 3012 7ffdff2f8281-7ffdff2f82d2 call 7ffdff33af80 call 7ffdff2fac30 2993->3012 2994->3012 3019 7ffdff2f81e1-7ffdff2f81e7 2994->3019 3007 7ffdff2f7f18-7ffdff2f7f3d 2997->3007 2998->2962 3005 7ffdff2f7ef6-7ffdff2f7efa 2998->3005 2999->3000 3006 7ffdff2f824b call 7ffdff3610c0 2999->3006 3000->2979 3009 7ffdff2f8095 3001->3009 3010 7ffdff2f8052-7ffdff2f8066 call 7ffdff2f6170 3001->3010 3002->3007 3005->3002 3006->3000 3016 7ffdff2f7f4b-7ffdff2f7f52 3007->3016 3017 7ffdff2f7f3f-7ffdff2f7f43 3007->3017 3013 7ffdff2f8099-7ffdff2f809c 3009->3013 3027 7ffdff2f8068-7ffdff2f807c 3010->3027 3028 7ffdff2f80bf-7ffdff2f80c2 3010->3028 3045 7ffdff2f82ec-7ffdff2f82fd 3012->3045 3046 7ffdff2f82d4-7ffdff2f82e7 call 7ffdff2fc4e0 3012->3046 3023 7ffdff2f80a6-7ffdff2f80b3 3013->3023 3024 7ffdff2f809e-7ffdff2f80a1 call 7ffdff3610c0 3013->3024 3020 7ffdff2f7f5b-7ffdff2f7f98 3016->3020 3021 7ffdff2f7f54-7ffdff2f7f59 3016->3021 3017->3016 3019->3012 3026 7ffdff2f81ed-7ffdff2f81f1 3019->3026 3039 7ffdff2f7f9a-7ffdff2f7f9f 3020->3039 3040 7ffdff2f7fa5-7ffdff2f7faf 3020->3040 3029 7ffdff2f7fb4-7ffdff2f7fed memchr 3021->3029 3023->2921 3032 7ffdff2f80b5-7ffdff2f80ba 3023->3032 3024->3023 3026->2984 3026->3012 3027->3013 3033 7ffdff2f807e-7ffdff2f8081 3027->3033 3028->2940 3036 7ffdff2f80c4-7ffdff2f80d1 call 7ffdff3610c0 3028->3036 3029->2972 3032->2918 3037 7ffdff2f808b-7ffdff2f8093 3033->3037 3038 7ffdff2f8083-7ffdff2f8089 3033->3038 3036->2919 3037->3013 3038->3013 3038->3037 3039->3040 3040->3029 3046->3045
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errnomemchrmemcpy
                                                              • String ID: Reuse of ChannelBuffer! %p$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$bgerror failed to handle background error.$unable to alloc %u bytes$unknown output translation requested$`)
                                                              • API String ID: 3559638299-474748200
                                                              • Opcode ID: 9b9fe17d86ed12b9fb75a49dd7861c2864c074015edd8742d6d9fc348b941b67
                                                              • Instruction ID: c417e6eaf313bd66a34307479d68a84939308aae8db363173865ac3d3ffde47a
                                                              • Opcode Fuzzy Hash: 9b9fe17d86ed12b9fb75a49dd7861c2864c074015edd8742d6d9fc348b941b67
                                                              • Instruction Fuzzy Hash: F0126C72B1868187EB609F25E460B6AB7A1FB84794F544235EA7DC7AD8DF3CE450CB00

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3049 7ffe01315270-7ffe013152e0 SelectObject 3050 7ffe013152e2-7ffe013152e7 3049->3050 3051 7ffe013152ea-7ffe01315320 GetFontData 3049->3051 3050->3051 3052 7ffe01315326-7ffe0131532d 3051->3052 3053 7ffe013155fa-7ffe01315605 GetTextCharset 3051->3053 3054 7ffe0131532f-7ffe01315348 3052->3054 3055 7ffe0131534a 3052->3055 3056 7ffe01315636-7ffe01315678 SelectObject call 7ffe013ffb70 3053->3056 3057 7ffe01315607-7ffe01315630 3053->3057 3058 7ffe0131534f-7ffe01315358 3054->3058 3055->3058 3057->3056 3058->3056 3061 7ffe0131535e 3058->3061 3063 7ffe01315363-7ffe01315383 GetFontData 3061->3063 3064 7ffe01315385-7ffe013153f9 3063->3064 3065 7ffe013153fb-7ffe01315406 3063->3065 3067 7ffe0131540c-7ffe01315411 3064->3067 3065->3067 3068 7ffe01315417-7ffe0131541b 3067->3068 3069 7ffe013155dc-7ffe013155f2 3067->3069 3071 7ffe01315425-7ffe0131542a 3068->3071 3072 7ffe0131541d-7ffe01315423 3068->3072 3069->3063 3070 7ffe013155f8 3069->3070 3070->3056 3071->3069 3073 7ffe01315430-7ffe01315454 GetFontData 3071->3073 3072->3073 3074 7ffe01315472 3073->3074 3075 7ffe01315456-7ffe01315470 3073->3075 3076 7ffe01315477-7ffe0131547b 3074->3076 3075->3076 3076->3069 3077 7ffe01315481-7ffe01315484 3076->3077 3078 7ffe013154a5 3077->3078 3079 7ffe01315486-7ffe013154a3 3077->3079 3080 7ffe013154aa-7ffe01315510 GetFontData * 2 3078->3080 3079->3080 3083 7ffe01315571-7ffe01315579 3080->3083 3084 7ffe01315512-7ffe01315518 3080->3084 3086 7ffe013155d9 3083->3086 3087 7ffe0131557b-7ffe01315581 3083->3087 3084->3083 3085 7ffe0131551a-7ffe01315528 3084->3085 3088 7ffe01315530-7ffe0131556f 3085->3088 3086->3069 3087->3086 3089 7ffe01315583-7ffe01315599 3087->3089 3088->3083 3088->3088 3090 7ffe013155a0-7ffe013155ae 3089->3090 3091 7ffe013155b0-7ffe013155bc 3090->3091 3092 7ffe013155c6-7ffe013155d0 3090->3092 3091->3092 3093 7ffe013155be-7ffe013155c3 3091->3093 3092->3090 3094 7ffe013155d2-7ffe013155d7 3092->3094 3093->3092 3094->3069
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: DataFont$ObjectSelect$CharsetText
                                                              • String ID: cmap$pamc
                                                              • API String ID: 447340330-4234804082
                                                              • Opcode ID: 799a1e60d9bb4f1af88a63dd5fa27187acddc9bf22614897053964c9bfa70ff3
                                                              • Instruction ID: 8f0ec6dfb9ae8491d46a3e5f30421a60b87badea8cfa4b864a3130a608a252a1
                                                              • Opcode Fuzzy Hash: 799a1e60d9bb4f1af88a63dd5fa27187acddc9bf22614897053964c9bfa70ff3
                                                              • Instruction Fuzzy Hash: F6B1E062A18291C7D7558F16E44027EB7A1FBD5B41F815036EE8A8BBA8DF7CD845CB00
                                                              APIs
                                                              • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000001,?,?,00007FFDFF340F73), ref: 00007FFDFF33F377
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValuestrchr
                                                              • String ID: %s called with shared object$/$Tcl_AppendLimitedToObj$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s
                                                              • API String ID: 2255269574-1948534721
                                                              • Opcode ID: 416ca0ae3713363a8ce92e7a72d36e2baf3bcec80ba09fd6106b04f5e1183650
                                                              • Instruction ID: ecae68c6c68aa6c70ddda2e7651d016c8e77f8adb5529b705b8625f74245f5e9
                                                              • Opcode Fuzzy Hash: 416ca0ae3713363a8ce92e7a72d36e2baf3bcec80ba09fd6106b04f5e1183650
                                                              • Instruction Fuzzy Hash: 21427C62B0964687EB69FF219560B7963E0AF44B84F884235CA7D4B7EDDF2CE4D18700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                              • String ID:
                                                              • API String ID: 1617910340-0
                                                              • Opcode ID: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                                                              • Instruction ID: 65c2934787dbfa73f3929d4f5078b0a09c79461c5ed7dd0e6bc2c7b6dd328e09
                                                              • Opcode Fuzzy Hash: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                                                              • Instruction Fuzzy Hash: 5AC1BE32F29E4685EB10CFAAD4912AC3769EB49FA9F014235DE1E97795CF39E151C300
                                                              APIs
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF266F76
                                                              • strstr.VCRUNTIME140 ref: 00007FFDFF267050
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                                • Part of subcall function 00007FFDFF2682B0: TlsGetValue.KERNEL32 ref: 00007FFDFF2682F0
                                                                • Part of subcall function 00007FFDFF2682B0: _localtime64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFDFF26835E
                                                                • Part of subcall function 00007FFDFF2682B0: LeaveCriticalSection.KERNEL32 ref: 00007FFDFF268374
                                                                • Part of subcall function 00007FFDFF3377F0: TlsAlloc.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF337801
                                                                • Part of subcall function 00007FFDFF3377F0: TlsGetValue.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF33782F
                                                                • Part of subcall function 00007FFDFF3377F0: GetLastError.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF33783D
                                                                • Part of subcall function 00007FFDFF3377F0: LeaveCriticalSection.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF3378DC
                                                                • Part of subcall function 00007FFDFF3377F0: GetProcessHeap.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF3378EF
                                                                • Part of subcall function 00007FFDFF3377F0: HeapAlloc.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF337900
                                                                • Part of subcall function 00007FFDFF3377F0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF3379F5
                                                                • Part of subcall function 00007FFDFF3377F0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A1E
                                                                • Part of subcall function 00007FFDFF3377F0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A2C
                                                                • Part of subcall function 00007FFDFF3377F0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A70
                                                                • Part of subcall function 00007FFDFF3377F0: HeapFree.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A7E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$Alloc$Value$CriticalErrorLastLeaveProcessSection$Free_localtime64memcpystrstr
                                                              • String ID: clock$dict tzdata changeover$lock::$seconds tzdata changeover$unable to alloc %u bytes
                                                              • API String ID: 496337001-2716670965
                                                              • Opcode ID: 49565e0ce539819cab56c4d5158d5d5acf87b27ab5a326d6cc4e2c688f584734
                                                              • Instruction ID: 34473295f8033e8d58dd35cf8ca55923991f0301a3d9006a9203a26417501530
                                                              • Opcode Fuzzy Hash: 49565e0ce539819cab56c4d5158d5d5acf87b27ab5a326d6cc4e2c688f584734
                                                              • Instruction Fuzzy Hash: 50528E72B0974686EB24EB25E460AAE63A1FB44B84F404236DE7D9B7DDDE3CE441C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: $Unexpected token type in TclCompileTokens: %d; %.*s$bad stack depth computations: is %i, should be %i$unable to alloc %u bytes$unable to realloc %u bytes
                                                              • API String ID: 3510742995-2435792223
                                                              • Opcode ID: b727bc60f760259e32ef1a347fc81d09722bf2e3a7f78d88e2d8192c14704552
                                                              • Instruction ID: 755fc7567c54a4c57010cda7a67e7d1007fa72ab6183c4a37da6214111b54734
                                                              • Opcode Fuzzy Hash: b727bc60f760259e32ef1a347fc81d09722bf2e3a7f78d88e2d8192c14704552
                                                              • Instruction Fuzzy Hash: F2526D72B186818AEB109F29D4A066D77E0FB94B88F544236DF6DCB79DDE38D441CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                                                              • Instruction ID: 5d6fd48a3e897d2eda9c7036457357240d2cca0529a241a6604ff7c3606ed958
                                                              • Opcode Fuzzy Hash: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                                                              • Instruction Fuzzy Hash: 7BF0C222E19B4286F7A08B60B4897667394AB84B3AF440335DAAE42AD4DF3CD149CA04
                                                              APIs
                                                              • TlsAlloc.KERNEL32(00000000,?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF35173E
                                                              • TlsGetValue.KERNEL32(00000000,?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351767
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351775
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351810
                                                              • HeapReAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351821
                                                              • memcpy.VCRUNTIME140(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351871
                                                              • TlsAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF35187F
                                                              • TlsGetValue.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3518A8
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3518B6
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3518F0
                                                              • HeapFree.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3518FE
                                                              • TlsAlloc.KERNEL32(00000000,?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3519C2
                                                              • TlsGetValue.KERNEL32(00000000,?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3519EB
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF3519F9
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351AC6
                                                              • HeapReAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351AD7
                                                              • memcpy.VCRUNTIME140(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351B29
                                                              • TlsAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351B37
                                                              • TlsGetValue.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351B60
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351B6E
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351BAE
                                                              • HeapFree.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351BBC
                                                              • TlsAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351C64
                                                              • TlsGetValue.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351C8D
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351C9B
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351D29
                                                              • HeapReAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351D3A
                                                              • memcpy.VCRUNTIME140(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351D8B
                                                              • TlsAlloc.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351D99
                                                              • TlsGetValue.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351DC2
                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351DD0
                                                              • GetProcessHeap.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351E13
                                                              • HeapFree.KERNEL32(?,00000000,00000000,00000000,00007FFDFF355C0C,?,?,00000000,00000000,?,?,?,00007FFDFF352C07), ref: 00007FFDFF351E21
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$Alloc$ErrorLastProcessValue$Freememcpy
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$unable to realloc %u bytes
                                                              • API String ID: 2741067554-2645962790
                                                              • Opcode ID: 924af3220520ee28503b4a990eadb503f1978e811a98a209a6d80008c3fb0625
                                                              • Instruction ID: 3fd8736a22fd567e8940f8afa672223730a457dab19222f235f4b267892a888f
                                                              • Opcode Fuzzy Hash: 924af3220520ee28503b4a990eadb503f1978e811a98a209a6d80008c3fb0625
                                                              • Instruction Fuzzy Hash: C8427B66B0964387EB14BB259464A7877E1AF84B94F484335CA3D0B7EDEF2CF8658301

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Object$CreateDeleteFontIndirect$InfoParametersSystem$CapsDeviceReleaseStockmemset
                                                              • String ID: TkCaptionFont$TkDefaultFont$TkFixedFont$TkHeadingFont$TkIconFont$TkMenuFont$TkSmallCaptionFont$TkTextFont$TkTooltipFont
                                                              • API String ID: 3615235001-2508811397
                                                              • Opcode ID: bc1f74806541b0af721606d9129455485a6ab5501716206a64892c7d75345104
                                                              • Instruction ID: b9257143696feff0d669338e06880fcc47becea8cb7b25dc2d02bdfc754b0e1e
                                                              • Opcode Fuzzy Hash: bc1f74806541b0af721606d9129455485a6ab5501716206a64892c7d75345104
                                                              • Instruction Fuzzy Hash: 30811F62A0864386EB559FA2E8142E963A1FB58FC8F40413AEE0E5BB75DF3CD549C740

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1690 7ffe0137b250-7ffe0137b29a call 7ffe01379d30 1693 7ffe0137b2a0-7ffe0137b2b8 1690->1693 1694 7ffe0137b60d 1690->1694 1696 7ffe0137b2be-7ffe0137b2dd 1693->1696 1697 7ffe0137b3ec-7ffe0137b40e call 7ffe01379730 1693->1697 1695 7ffe0137b612-7ffe0137b644 call 7ffe013ffb70 1694->1695 1696->1694 1703 7ffe0137b2e3-7ffe0137b2e8 1696->1703 1697->1694 1704 7ffe0137b414-7ffe0137b422 1697->1704 1703->1697 1705 7ffe0137b2ee-7ffe0137b2fd 1703->1705 1706 7ffe0137b6d8-7ffe0137b6db 1704->1706 1707 7ffe0137b428-7ffe0137b433 1704->1707 1710 7ffe0137b300-7ffe0137b322 _stricmp 1705->1710 1708 7ffe0137b6e1-7ffe0137b745 1706->1708 1709 7ffe0137b518-7ffe0137b51e 1706->1709 1711 7ffe0137b6a0-7ffe0137b6d3 1707->1711 1712 7ffe0137b439-7ffe0137b440 1707->1712 1708->1694 1713 7ffe0137b520-7ffe0137b538 call 7ffe0137a1b0 1709->1713 1714 7ffe0137b56a-7ffe0137b570 1709->1714 1726 7ffe0137b3cc-7ffe0137b3d1 1710->1726 1727 7ffe0137b328-7ffe0137b364 1710->1727 1737 7ffe0137b5de-7ffe0137b604 1711->1737 1715 7ffe0137b668-7ffe0137b69b 1712->1715 1716 7ffe0137b446-7ffe0137b44c 1712->1716 1713->1694 1735 7ffe0137b53e-7ffe0137b560 call 7ffe01379730 1713->1735 1718 7ffe0137b74a-7ffe0137b774 call 7ffe01383aa0 1714->1718 1719 7ffe0137b576-7ffe0137b5a9 1714->1719 1715->1737 1716->1715 1722 7ffe0137b452-7ffe0137b465 1716->1722 1718->1694 1741 7ffe0137b77a-7ffe0137b793 1718->1741 1719->1737 1722->1715 1729 7ffe0137b46b-7ffe0137b48b call 7ffe013791c0 1722->1729 1731 7ffe0137b3d5-7ffe0137b3e6 1726->1731 1727->1694 1749 7ffe0137b36a-7ffe0137b371 1727->1749 1729->1694 1744 7ffe0137b491-7ffe0137b4a4 call 7ffe013795a0 1729->1744 1731->1697 1731->1710 1735->1694 1750 7ffe0137b566 1735->1750 1737->1694 1747 7ffe0137b795-7ffe0137b7c1 1741->1747 1748 7ffe0137b7cd-7ffe0137b7da 1741->1748 1744->1694 1762 7ffe0137b4aa-7ffe0137b4af 1744->1762 1747->1748 1752 7ffe0137b7dc-7ffe0137b7e4 1748->1752 1753 7ffe0137b7e6-7ffe0137b80c 1748->1753 1754 7ffe0137b645-7ffe0137b666 1749->1754 1755 7ffe0137b377-7ffe0137b390 1749->1755 1750->1714 1757 7ffe0137b812 1752->1757 1758 7ffe0137b80e 1753->1758 1759 7ffe0137b818-7ffe0137b85b 1753->1759 1754->1694 1755->1731 1761 7ffe0137b392-7ffe0137b3ac 1755->1761 1757->1759 1758->1757 1779 7ffe0137b8ad-7ffe0137b8b1 1759->1779 1780 7ffe0137b85d-7ffe0137b8a8 1759->1780 1761->1694 1769 7ffe0137b3b2-7ffe0137b3b7 1761->1769 1766 7ffe0137b4b1-7ffe0137b4bb 1762->1766 1767 7ffe0137b4e8-7ffe0137b50e call 7ffe01379730 1762->1767 1770 7ffe0137b4c0-7ffe0137b4e6 1766->1770 1767->1694 1776 7ffe0137b514 1767->1776 1772 7ffe0137b3bd-7ffe0137b3c6 1769->1772 1773 7ffe0137b5ab-7ffe0137b5d7 1769->1773 1770->1767 1770->1770 1772->1726 1772->1773 1773->1737 1776->1709 1781 7ffe0137b8b3-7ffe0137b8ca 1779->1781 1782 7ffe0137b8f2-7ffe0137b8fe 1779->1782 1780->1694 1785 7ffe0137b8d3-7ffe0137b8dc 1781->1785 1786 7ffe0137b8cc-7ffe0137b8d1 1781->1786 1787 7ffe0137b900-7ffe0137b910 call 7ffe0137afc0 1782->1787 1788 7ffe0137b8df-7ffe0137b8ee 1785->1788 1786->1788 1793 7ffe0137b915-7ffe0137b918 1787->1793 1791 7ffe0137b952-7ffe0137b968 1788->1791 1792 7ffe0137b8f0 1788->1792 1799 7ffe0137b9a0-7ffe0137b9a6 1791->1799 1800 7ffe0137b96a-7ffe0137b994 1791->1800 1792->1787 1793->1694 1794 7ffe0137b91e-7ffe0137b940 call 7ffe01379730 1793->1794 1794->1694 1801 7ffe0137b946-7ffe0137b950 1794->1801 1802 7ffe0137ba00-7ffe0137ba05 1799->1802 1803 7ffe0137b9a8 1799->1803 1800->1799 1801->1787 1801->1791 1804 7ffe0137ba3f-7ffe0137ba52 call 7ffe013795a0 1802->1804 1805 7ffe0137ba07-7ffe0137ba33 1802->1805 1807 7ffe0137b9b0-7ffe0137b9c8 call 7ffe01379680 1803->1807 1804->1694 1814 7ffe0137ba58-7ffe0137ba61 1804->1814 1805->1804 1807->1694 1815 7ffe0137b9ce-7ffe0137b9f0 call 7ffe01379730 1807->1815 1816 7ffe0137ba63 1814->1816 1817 7ffe0137ba69-7ffe0137ba81 1814->1817 1815->1694 1823 7ffe0137b9f6-7ffe0137b9fe 1815->1823 1816->1817 1821 7ffe0137baf0-7ffe0137bb27 call 7ffe01382660 1816->1821 1820 7ffe0137ba83-7ffe0137ba87 1817->1820 1817->1821 1824 7ffe0137baca-7ffe0137bacf 1820->1824 1825 7ffe0137ba89 1820->1825 1821->1695 1823->1802 1823->1807 1828 7ffe0137bad0-7ffe0137baee 1824->1828 1827 7ffe0137ba90-7ffe0137bac6 1825->1827 1827->1827 1830 7ffe0137bac8 1827->1830 1828->1821 1828->1828 1830->1821
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcmp$_stricmp
                                                              • String ID: -alpha value must be between 0.0 and 1.0$BAD_ALPHA$BAD_IEND$BAD_PLTE$DNEI$DNEI$ETLP$EXTRA_DATA$IEND chunk contents must be empty$IMAGE$LINE_SIZE$MALLOC$NEED_IDAT$NEED_PLTE$PLTE chunk required for indexed color$PLTE chunk type forbidden for grayscale$PLTE_UNEXPECTED$PNG$SNRt$TADI$TADI$TADI$VUUU$at least one IDAT chunk is required$invalid palette chunk size$line size is out of supported range on this architecture$memory allocation failed$option$png$unfinalized data stream in PNG data$value
                                                              • API String ID: 190063134-2027502129
                                                              • Opcode ID: 929b23d661b35a9665f205e24ac54a31ce0fcaf9ab1b25f610bdfbc6c6f62e3d
                                                              • Instruction ID: ea7929b40ec0f3f117b7d0469b47316f56d9204ba2fc236e93a913faf8736b6a
                                                              • Opcode Fuzzy Hash: 929b23d661b35a9665f205e24ac54a31ce0fcaf9ab1b25f610bdfbc6c6f62e3d
                                                              • Instruction Fuzzy Hash: 1F32A132A08B8686DB618F29E4506BDB7B1FB85B94F954232DA4D5B778DF3CE444CB00

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1984 7ffdff360d70-7ffdff360d87 1985 7ffdff360d8d-7ffdff360d94 1984->1985 1986 7ffdff360ea7-7ffdff360eb2 call 7ffdff3a0df0 1984->1986 1987 7ffdff360dad-7ffdff360dc1 call 7ffdff3a0960 1985->1987 1988 7ffdff360d96-7ffdff360da3 InitializeCriticalSection 1985->1988 1992 7ffdff360eb4-7ffdff360ed1 GetProcessHeap HeapAlloc 1986->1992 1993 7ffdff360f2f-7ffdff360f41 1986->1993 1997 7ffdff360e9a-7ffdff360ea1 LeaveCriticalSection 1987->1997 1998 7ffdff360dc7-7ffdff360dd8 malloc 1987->1998 1988->1987 1995 7ffdff360f42-7ffdff360f4e call 7ffdff33af80 1992->1995 1996 7ffdff360ed3-7ffdff360f2d memset call 7ffdff3a0960 LeaveCriticalSection GetCurrentThreadId TlsSetValue 1992->1996 2002 7ffdff360f4f-7ffdff360f5b call 7ffdff33af80 1995->2002 1996->1993 2007 7ffdff360f5c-7ffdff360f9a call 7ffdff33af80 TlsAlloc 1996->2007 1997->1986 2001 7ffdff360dde-7ffdff360e03 InitializeCriticalSection malloc 1998->2001 1998->2002 2001->2002 2005 7ffdff360e09-7ffdff360e26 InitializeCriticalSection 2001->2005 2002->2007 2008 7ffdff360e30-7ffdff360e59 2005->2008 2017 7ffdff3610a4-7ffdff3610b0 call 7ffdff33af80 2007->2017 2018 7ffdff360fa0-7ffdff360fbb TlsGetValue 2007->2018 2010 7ffdff360e64-7ffdff360e78 malloc 2008->2010 2011 7ffdff360e5b-7ffdff360e62 2008->2011 2010->2002 2013 7ffdff360e7e-7ffdff360e98 InitializeCriticalSection 2010->2013 2011->2010 2013->1997 2013->2008 2024 7ffdff3610b1-7ffdff3610bf call 7ffdff33af80 2017->2024 2021 7ffdff360fbd-7ffdff360fc5 GetLastError 2018->2021 2022 7ffdff360fcb-7ffdff360fce 2018->2022 2021->2022 2021->2024 2025 7ffdff360fd0-7ffdff360fd5 call 7ffdff360d70 2022->2025 2026 7ffdff360fd8-7ffdff361010 GetProcessHeap HeapAlloc 2022->2026 2025->2026 2032 7ffdff361012-7ffdff361015 2026->2032 2033 7ffdff361073-7ffdff3610a3 2026->2033 2032->2033
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Initialize$malloc$AllocHeapLeaveValue$CurrentErrorLastProcessThreadmemset
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$TlsSetValue failed from TclpSetAllocCache$alloc: could not allocate new cache$could not allocate lock$could not allocate thread local storage
                                                              • API String ID: 2510295087-2583951768
                                                              • Opcode ID: 04cd7181ab8fb0255b2799620565174b54b0495e80c563943418d8f36ada8ffe
                                                              • Instruction ID: ba11a8077563eb1a23e4a802579f8a0ac8c094be920ba832bcc732ee0e0430e2
                                                              • Opcode Fuzzy Hash: 04cd7181ab8fb0255b2799620565174b54b0495e80c563943418d8f36ada8ffe
                                                              • Instruction Fuzzy Hash: 6D710866B09B4283FB55BB26E864A7863E0AF84B40F454235D97D4E7F9EF3CA8558300

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2036 7ffe0136922d-7ffe0136923b 2037 7ffe01369240-7ffe01369267 2036->2037 2039 7ffe013693a1-7ffe013693a9 2037->2039 2040 7ffe0136926d-7ffe01369271 2037->2040 2039->2037 2043 7ffe013693af-7ffe013693b7 2039->2043 2041 7ffe01369273-7ffe01369276 2040->2041 2042 7ffe013692b0-7ffe013692b4 2040->2042 2041->2042 2046 7ffe01369278-7ffe0136928d strncmp 2041->2046 2047 7ffe013692f1-7ffe013692f5 2042->2047 2048 7ffe013692b6-7ffe013692b9 2042->2048 2044 7ffe013693cb-7ffe01369480 call 7ffe013d6370 call 7ffe013d4cd0 2043->2044 2045 7ffe013693b9-7ffe013693c7 2043->2045 2078 7ffe01369486-7ffe01369493 2044->2078 2079 7ffe013697e7 2044->2079 2045->2044 2051 7ffe0136928f-7ffe013692a4 2046->2051 2052 7ffe013692a9 2046->2052 2049 7ffe01369330-7ffe01369334 2047->2049 2050 7ffe013692f7-7ffe013692fb 2047->2050 2048->2047 2054 7ffe013692bb-7ffe013692d0 strncmp 2048->2054 2056 7ffe0136936f-7ffe01369373 2049->2056 2057 7ffe01369336-7ffe0136933a 2049->2057 2050->2049 2055 7ffe013692fd-7ffe01369312 strncmp 2050->2055 2051->2039 2052->2042 2059 7ffe013692d2-7ffe013692e5 2054->2059 2060 7ffe013692ea 2054->2060 2062 7ffe01369314-7ffe01369327 2055->2062 2063 7ffe01369329 2055->2063 2056->2039 2061 7ffe01369375-7ffe0136938a strncmp 2056->2061 2057->2056 2065 7ffe0136933c-7ffe01369351 strncmp 2057->2065 2059->2039 2060->2047 2061->2039 2068 7ffe0136938c-7ffe0136939c 2061->2068 2062->2039 2063->2049 2069 7ffe01369353-7ffe01369366 2065->2069 2070 7ffe01369368 2065->2070 2068->2039 2069->2039 2070->2056 2080 7ffe01369495-7ffe013694b1 call 7ffe0139c3b0 2078->2080 2081 7ffe013694c7-7ffe013694de call 7ffe0136cb30 call 7ffe0139ca30 2078->2081 2082 7ffe013697ec-7ffe01369812 2079->2082 2080->2081 2087 7ffe013694b3-7ffe013694bf 2080->2087 2090 7ffe013694e0-7ffe013694f1 call 7ffe0139c3b0 2081->2090 2091 7ffe013694fe-7ffe01369503 2081->2091 2087->2081 2098 7ffe013694f6-7ffe013694fc 2090->2098 2093 7ffe01369505-7ffe0136950e call 7ffe013116f0 2091->2093 2094 7ffe0136951b-7ffe01369523 2091->2094 2099 7ffe01369513-7ffe01369515 2093->2099 2096 7ffe01369525-7ffe0136953b call 7ffe0139c3b0 2094->2096 2097 7ffe0136953e-7ffe01369541 2094->2097 2096->2097 2101 7ffe01369543-7ffe0136955f call 7ffe0139c3b0 2097->2101 2102 7ffe01369561-7ffe0136956e 2097->2102 2098->2091 2098->2094 2099->2094 2103 7ffe013697df-7ffe013697e2 call 7ffe013d4fc0 2099->2103 2101->2102 2113 7ffe01369570 2101->2113 2106 7ffe01369573-7ffe01369576 2102->2106 2103->2079 2109 7ffe01369578-7ffe0136959f call 7ffe013d3230 2106->2109 2110 7ffe013695e6-7ffe013695e9 2106->2110 2109->2103 2118 7ffe013695a5-7ffe013695af 2109->2118 2111 7ffe01369612-7ffe01369626 2110->2111 2112 7ffe013695eb-7ffe01369601 call 7ffe013d38f0 2110->2112 2120 7ffe01369634-7ffe01369652 2111->2120 2121 7ffe01369628-7ffe01369632 2111->2121 2112->2103 2123 7ffe01369607-7ffe0136960d call 7ffe013d5de0 2112->2123 2113->2106 2118->2110 2122 7ffe013695b1-7ffe013695d8 2118->2122 2124 7ffe01369654-7ffe0136965b 2120->2124 2125 7ffe01369669-7ffe013696ed memset 2120->2125 2121->2120 2121->2125 2122->2110 2126 7ffe013695da-7ffe013695e0 2122->2126 2123->2111 2124->2125 2128 7ffe0136965d-7ffe01369664 2124->2128 2131 7ffe01369700-7ffe0136974b call 7ffe01361090 call 7ffe01358200 2125->2131 2132 7ffe013696ef-7ffe013696f9 2125->2132 2126->2110 2128->2125 2131->2103 2137 7ffe01369751-7ffe01369776 call 7ffe01369d50 2131->2137 2132->2131 2137->2103 2140 7ffe01369778-7ffe0136977e 2137->2140 2141 7ffe01369784-7ffe0136978c 2140->2141 2142 7ffe0136983f-7ffe01369843 2140->2142 2143 7ffe01369792-7ffe013697d6 2141->2143 2144 7ffe01369837-7ffe0136983a call 7ffe01311970 2141->2144 2145 7ffe01369845-7ffe01369853 2142->2145 2146 7ffe0136985c-7ffe01369879 call 7ffe0139a6e0 2142->2146 2143->2103 2144->2142 2145->2146 2146->2082
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: -class$-colormap$-screen$-use$-visual$CONTAINMENT$Class$Colormap$FRAME$Use$Visual$class$colormap$use$v$visual$windows cannot have both the -use and the -container option set$a6
                                                              • API String ID: 1114863663-4259013443
                                                              • Opcode ID: 9b2bb56ef576c775829de91ce1d43c980e253af9e6f9064c56af86b912c9593c
                                                              • Instruction ID: 4162f0bd72875903a046b9f4bea0da594e2454b6697b0136dbb37f32237ac9c0
                                                              • Opcode Fuzzy Hash: 9b2bb56ef576c775829de91ce1d43c980e253af9e6f9064c56af86b912c9593c
                                                              • Instruction Fuzzy Hash: DCF14575A09B8289EB558B52E5503B967A0FB89BC8F858036CE4E4F7B5DF3CE454C700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2830 7ff6110c1950-7ff6110c198b call 7ff6110c45c0 2833 7ff6110c1991-7ff6110c19d1 call 7ff6110c7f90 2830->2833 2834 7ff6110c1c4e-7ff6110c1c72 call 7ff6110cc550 2830->2834 2839 7ff6110c19d7-7ff6110c19e7 call 7ff6110d06d4 2833->2839 2840 7ff6110c1c3b-7ff6110c1c3e call 7ff6110d004c 2833->2840 2845 7ff6110c19e9-7ff6110c1a03 call 7ff6110d4f08 call 7ff6110c2910 2839->2845 2846 7ff6110c1a08-7ff6110c1a24 call 7ff6110d039c 2839->2846 2844 7ff6110c1c43-7ff6110c1c4b 2840->2844 2844->2834 2845->2840 2852 7ff6110c1a45-7ff6110c1a5a call 7ff6110d4f28 2846->2852 2853 7ff6110c1a26-7ff6110c1a40 call 7ff6110d4f08 call 7ff6110c2910 2846->2853 2860 7ff6110c1a5c-7ff6110c1a76 call 7ff6110d4f08 call 7ff6110c2910 2852->2860 2861 7ff6110c1a7b-7ff6110c1b05 call 7ff6110c1c80 * 2 call 7ff6110d06d4 call 7ff6110d4f44 2852->2861 2853->2840 2860->2840 2874 7ff6110c1b0a-7ff6110c1b14 2861->2874 2875 7ff6110c1b35-7ff6110c1b4e call 7ff6110d039c 2874->2875 2876 7ff6110c1b16-7ff6110c1b30 call 7ff6110d4f08 call 7ff6110c2910 2874->2876 2882 7ff6110c1b50-7ff6110c1b6a call 7ff6110d4f08 call 7ff6110c2910 2875->2882 2883 7ff6110c1b6f-7ff6110c1b8b call 7ff6110d0110 2875->2883 2876->2840 2882->2840 2890 7ff6110c1b9e-7ff6110c1bac 2883->2890 2891 7ff6110c1b8d-7ff6110c1b99 call 7ff6110c2710 2883->2891 2890->2840 2894 7ff6110c1bb2-7ff6110c1bb9 2890->2894 2891->2840 2896 7ff6110c1bc1-7ff6110c1bc7 2894->2896 2897 7ff6110c1be0-7ff6110c1bef 2896->2897 2898 7ff6110c1bc9-7ff6110c1bd6 2896->2898 2897->2897 2899 7ff6110c1bf1-7ff6110c1bfa 2897->2899 2898->2899 2900 7ff6110c1c0f 2899->2900 2901 7ff6110c1bfc-7ff6110c1bff 2899->2901 2902 7ff6110c1c11-7ff6110c1c24 2900->2902 2901->2900 2903 7ff6110c1c01-7ff6110c1c04 2901->2903 2905 7ff6110c1c26 2902->2905 2906 7ff6110c1c2d-7ff6110c1c39 2902->2906 2903->2900 2904 7ff6110c1c06-7ff6110c1c09 2903->2904 2904->2900 2907 7ff6110c1c0b-7ff6110c1c0d 2904->2907 2905->2906 2906->2840 2906->2896 2907->2902
                                                              APIs
                                                                • Part of subcall function 00007FF6110C7F90: _fread_nolock.LIBCMT ref: 00007FF6110C803A
                                                              • _fread_nolock.LIBCMT ref: 00007FF6110C1A1B
                                                                • Part of subcall function 00007FF6110C2910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF6110C1B6A), ref: 00007FF6110C295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock$CurrentProcess
                                                              • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                              • API String ID: 2397952137-3497178890
                                                              • Opcode ID: 2f034c5e7981c28ca937577413dc488aa0c8f5b603c883eb764c7814246f90ba
                                                              • Instruction ID: 18537fc44c2e7869d7b3c42020e39dcabd1c305e9bbc22947ae2e3d9763014a1
                                                              • Opcode Fuzzy Hash: 2f034c5e7981c28ca937577413dc488aa0c8f5b603c883eb764c7814246f90ba
                                                              • Instruction Fuzzy Hash: A8818271E09E86C6EB20DB25D0443F923A8EF48FA6F444471E98DC7B96DE3CE5458B60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CharObjectSelectTextWidth$FaceMetricsRelease
                                                              • String ID: unicode$utf-16
                                                              • API String ID: 1149465119-3317161374
                                                              • Opcode ID: f01eeef6bf346d057e20f5a6e15b032965089b96f716d88cc5fee3fd55000347
                                                              • Instruction ID: 0555d415b33ad187fff7d7d8195e06ca85267483a0a2aad10163b88a856e0dbc
                                                              • Opcode Fuzzy Hash: f01eeef6bf346d057e20f5a6e15b032965089b96f716d88cc5fee3fd55000347
                                                              • Instruction Fuzzy Hash: 8F718C72A08A868AEB22DF26E4403A977A1FB58F94F454236DE4D5B774DF3CE445C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _strnicmp
                                                              • String ID: -data option isn't supported for %s images$IMAGE$LOOKUP$NOT_DATA_FORMAT$PHOTO$PHOTO_FORMAT$UNRECOGNIZED_DATA$couldn't recognize image data$image format "%s" is not supported
                                                              • API String ID: 2635805826-3952471749
                                                              • Opcode ID: a8fc7775ae3f8b16f58855d0958e3f151a25fcf8f4e47db5d2742c6a6e78dc91
                                                              • Instruction ID: d73c6871840aa26cecda6c04b16fe76858f2bcaf3a73cf43df279a2ab7e2ca15
                                                              • Opcode Fuzzy Hash: a8fc7775ae3f8b16f58855d0958e3f151a25fcf8f4e47db5d2742c6a6e78dc91
                                                              • Instruction Fuzzy Hash: 99914A32A08B8295EB618F15E4543AE63A0FB48F98F894235DE5E5B3B4DF3CE545C710
                                                              APIs
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FFDFF35276F,?,?,00000000,00007FFDFF354A4B), ref: 00007FFDFF266D8A
                                                              • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FFDFF35276F,?,?,00000000,00007FFDFF354A4B), ref: 00007FFDFF266D93
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$ErrorLastProcessValue__acrt_iob_funcfflush
                                                              • String ID: unable to alloc %u bytes$unable to alloc %u bytes, %s line %d
                                                              • API String ID: 4134382769-1299489142
                                                              • Opcode ID: dd290f9126c142eca93af093a666fa56c9e8bdd9cc530c02d76501f54ea982ba
                                                              • Instruction ID: 49eaa67c02e595a3635b069136c201ee0856bd50a07826f2017271c519de3da9
                                                              • Opcode Fuzzy Hash: dd290f9126c142eca93af093a666fa56c9e8bdd9cc530c02d76501f54ea982ba
                                                              • Instruction Fuzzy Hash: ED316E65F0D74283FB64BB62A465E3923E0AF58B40F044634DA7D4EBEDEE7CE8558600
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 82025381524bb9b0b79a765177f18be9282b9556e45c9cd05d4e052722966d8c
                                                              • Instruction ID: 19731c2c383304c5526fed25c46d8bd2c69a971ee4960a806e613e14831cc427
                                                              • Opcode Fuzzy Hash: 82025381524bb9b0b79a765177f18be9282b9556e45c9cd05d4e052722966d8c
                                                              • Instruction Fuzzy Hash: D2418F21E08E42C6EB10DB2294406F97398FF54FA5F484972ED4D87B9ADE3CE542CB60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                              • API String ID: 2050909247-2813020118
                                                              • Opcode ID: 0e7f4c1e83c763c73bdf253078e4cd0e6274f61eb17ee5b4db47df08ee179fc2
                                                              • Instruction ID: 1daa984b9e0e51c282886b97ce891a613d326d3e8dad7befb38614746c729dc0
                                                              • Opcode Fuzzy Hash: 0e7f4c1e83c763c73bdf253078e4cd0e6274f61eb17ee5b4db47df08ee179fc2
                                                              • Instruction Fuzzy Hash: 3851C462E09E4285EB20AB12A4403BA6299FF85FB6F844175ED4DC7BD5EF3CE541CB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModule$ClassCursorIconRegister
                                                              • String ID: TkTopLevel$Unable to register TkTopLevel class
                                                              • API String ID: 1220223050-2494010311
                                                              • Opcode ID: 9b018134ee3aa7e9917297212c9c9fcb2babbde18c33f1ef7a7464153116b5ef
                                                              • Instruction ID: 1c479bd3ee48937b5c8d0f1edfbb4da7c0d0deb3b10b6d0269a4f6463cf8710b
                                                              • Opcode Fuzzy Hash: 9b018134ee3aa7e9917297212c9c9fcb2babbde18c33f1ef7a7464153116b5ef
                                                              • Instruction Fuzzy Hash: 16517D32A08B42C2FB61CB50E44427937A6FB86B90F924236DA4E4B775DF3DE985C740
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,00007FF6110C3804), ref: 00007FF6110C36E1
                                                              • GetLastError.KERNEL32(?,00007FF6110C3804), ref: 00007FF6110C36EB
                                                                • Part of subcall function 00007FF6110C2C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2C9E
                                                                • Part of subcall function 00007FF6110C2C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF6110C3706,?,00007FF6110C3804), ref: 00007FF6110C2D63
                                                                • Part of subcall function 00007FF6110C2C50: MessageBoxW.USER32 ref: 00007FF6110C2D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                                                              • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                              • API String ID: 3187769757-2863816727
                                                              • Opcode ID: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                                                              • Instruction ID: 0bcac69a01d7d47729a784eb61092369836ac2bce19a70d45c27b771ce529e04
                                                              • Opcode Fuzzy Hash: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                                                              • Instruction Fuzzy Hash: EF219561F1DE4281FB319725E8153BA2358BF88B76F404272E65DC65D5EE2CE705CB10
                                                              APIs
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF2C56B5
                                                              • LeaveCriticalSection.KERNEL32 ref: 00007FFDFF2C573C
                                                              • LeaveCriticalSection.KERNEL32 ref: 00007FFDFF2C598C
                                                              • LeaveCriticalSection.KERNEL32 ref: 00007FFDFF2C59BA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalLeaveSection$AllocHeap$ErrorLastProcessValuememcpy
                                                              • String ID: FreeEncoding: refcount problem !!!$concurrent dictionary modification and search$unable to alloc %u bytes
                                                              • API String ID: 1241236031-687981174
                                                              • Opcode ID: 008135974746f0f55b01114091b3ce1943815e1080e79381bf448f0038acbb57
                                                              • Instruction ID: 458ba6a251b894ab962e9c74c330bf644cf17f444ed8a346a6a4a166cf081182
                                                              • Opcode Fuzzy Hash: 008135974746f0f55b01114091b3ce1943815e1080e79381bf448f0038acbb57
                                                              • Instruction Fuzzy Hash: 4DD16C76B09A4286EB14AF16D4A1AB923A1FF44BA4F540335CE7D8B7E8DF3CE4558340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: c3f57b6cd1f658b3a1cfdd45bc75f21d2f6c8be166295f0eb40444005b392bd6
                                                              • Instruction ID: 4d709fecefc4a32557007c3d3547fbfc156ee8ceb2d2b16290388c38dfba4c07
                                                              • Opcode Fuzzy Hash: c3f57b6cd1f658b3a1cfdd45bc75f21d2f6c8be166295f0eb40444005b392bd6
                                                              • Instruction Fuzzy Hash: 0FC1D122E0CF8692EF609B1594402BD7B98FF86FA2F564131EA4E83791DE7CE8458711
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: (processing "%.40s" option)$-class$VALUE_MISSING$pathName ?-option value ...?$value for "%s" missing$widget has been destroyed
                                                              • API String ID: 2221118986-332812946
                                                              • Opcode ID: 5d96c1cc4f8385cb3e227aeafcaed9d9e1cd8169bb5b00b48f16490a0483ac23
                                                              • Instruction ID: 7ba07fa68b76ccf2fc7bf743491a791f13b8dc6ffbeade2f642d8362d9f5dafd
                                                              • Opcode Fuzzy Hash: 5d96c1cc4f8385cb3e227aeafcaed9d9e1cd8169bb5b00b48f16490a0483ac23
                                                              • Instruction Fuzzy Hash: 84D17E36608B8682EB10AB16E8543BA77A4FB89F84F864135DE4E5BB75DF3CE445C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CompositionContextString$CountMessageProcReleaseSendTickWindow
                                                              • String ID:
                                                              • API String ID: 568510177-0
                                                              • Opcode ID: 9718241b953a5c7e8ac4b1f4af87d75b55755b3e68a41a6bf902089f62d85662
                                                              • Instruction ID: 10dfb9ca60838174642a7f2f9bf080e84c34863bcb19a5d49261dc6e8605321a
                                                              • Opcode Fuzzy Hash: 9718241b953a5c7e8ac4b1f4af87d75b55755b3e68a41a6bf902089f62d85662
                                                              • Instruction Fuzzy Hash: E2A1DE32A08B8286E725AB6AD4442BC77E1FBA8B94F194135DE0D9B7B5DF3CE4418701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalLeaveSection
                                                              • String ID: FreeEncoding: refcount problem !!!$PGV Initializer did not initialize$unable to alloc %u bytes
                                                              • API String ID: 3988221542-1397560407
                                                              • Opcode ID: f2b421978956b164c79aa2eb1af93f2c073648251e5b99f7581810641bd4e627
                                                              • Instruction ID: 138ae66e08402703f2ca6cd0de7937bd900648a59f3d134fd1a00dcbc5568f7c
                                                              • Opcode Fuzzy Hash: f2b421978956b164c79aa2eb1af93f2c073648251e5b99f7581810641bd4e627
                                                              • Instruction Fuzzy Hash: 8F817F66B0864297EB14FB12E464AB963A0FF84B84F044635DB3D4B799DF3CE4A9C740
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(?,?,00000000,00007FFDFF2EA87E,?,?,tclPackageAboutDict,00007FFDFF257920,Unable to create query command for package configuration,?,?,00007FFDFF2B7A1C,?,?,00000000,00007FFDFF2B74EC), ref: 00007FFDFF2EB12B
                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FFDFF2EA87E,?,?,tclPackageAboutDict,00007FFDFF257920,Unable to create query command for package configuration,?,?,00007FFDFF2B7A1C,?,?,00000000,00007FFDFF2B74EC), ref: 00007FFDFF2EB139
                                                              • memset.VCRUNTIME140(?,?,00000000,00007FFDFF2EA87E,?,?,tclPackageAboutDict,00007FFDFF257920,Unable to create query command for package configuration,?,?,00007FFDFF2B7A1C,?,?,00000000,00007FFDFF2B74EC), ref: 00007FFDFF2EB155
                                                              • GetProcessHeap.KERNEL32(?,?,00000000,00007FFDFF2EA87E,?,?,tclPackageAboutDict,00007FFDFF257920,Unable to create query command for package configuration,?,?,00007FFDFF2B7A1C,?,?,00000000,00007FFDFF2B74EC), ref: 00007FFDFF2EB20C
                                                              • HeapFree.KERNEL32(?,?,00000000,00007FFDFF2EA87E,?,?,tclPackageAboutDict,00007FFDFF257920,Unable to create query command for package configuration,?,?,00007FFDFF2B7A1C,?,?,00000000,00007FFDFF2B74EC), ref: 00007FFDFF2EB21A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFreememset
                                                              • String ID: tclPackageAboutDict$unable to alloc %u bytes
                                                              • API String ID: 2653029805-1665306339
                                                              • Opcode ID: f9017345bc85dc215af0362d79ca57f1a16056ec0b5c7564d72c01984ffeb612
                                                              • Instruction ID: 3682ac54148351cf642478e582820a081d86c0ceb9b0c9de5fd7884f6c464b5b
                                                              • Opcode Fuzzy Hash: f9017345bc85dc215af0362d79ca57f1a16056ec0b5c7564d72c01984ffeb612
                                                              • Instruction Fuzzy Hash: CD71AF32B0868686E754AB16E560B7D33A0FB45B94F245235DA3ECB7E9DF3CE4618700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientLongMovePlacementRectVisible
                                                              • String ID: ,
                                                              • API String ID: 2284278383-3772416878
                                                              • Opcode ID: 96a0418d6e85619d543f390437e7a7948b29d3abb529e358f79378545bfe498b
                                                              • Instruction ID: 5321bb5353d88eb20f27519460ac967da891f3c26d988f7a2ae805e128deca10
                                                              • Opcode Fuzzy Hash: 96a0418d6e85619d543f390437e7a7948b29d3abb529e358f79378545bfe498b
                                                              • Instruction Fuzzy Hash: 1CA14732A08682CBE761DF29D1487AC77A0FB58B54F154235DB0D9B7A8CF3CE9608B51
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ObjectSelect$FaceTextmemset
                                                              • String ID: unicode$utf-16
                                                              • API String ID: 920176757-3317161374
                                                              • Opcode ID: 6e448e2d34688ab69039992dade124ef053d74dc71ce39b901bb4b18b3145c00
                                                              • Instruction ID: 9268da0294eef970b5b14ccd3acdc53657b9ed911044eb46335e424031fde37c
                                                              • Opcode Fuzzy Hash: 6e448e2d34688ab69039992dade124ef053d74dc71ce39b901bb4b18b3145c00
                                                              • Instruction Fuzzy Hash: DB515A72A09B4692EB55CB12E8443A973A1FB48BD0F858235DE5D4B7B4EF3CE065C300
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                                                              • API String ID: 2050909247-2434346643
                                                              • Opcode ID: 111e0a7e53993944da2df5d9c96cd3a7cea32e86f931b773c4ccd6a62d35c348
                                                              • Instruction ID: c7f3da6b464188bf14072569819f558757a03e5e11dc1e587e18f037b4ce57f3
                                                              • Opcode Fuzzy Hash: 111e0a7e53993944da2df5d9c96cd3a7cea32e86f931b773c4ccd6a62d35c348
                                                              • Instruction Fuzzy Hash: 9D41AF31E19E8791EB20DB21E8542EA6329FF44B61F800172EA5C83695EF3CF619CB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: LIST$concurrent dictionary modification and search$list$max size for a Tcl value (%d bytes) exceeded$unable to alloc %u bytes
                                                              • API String ID: 3510742995-4178152732
                                                              • Opcode ID: 7eea6bf68266c5c55903e751ce693e6a71296128b17e6e7a73b50dc6fc62aaad
                                                              • Instruction ID: 1654119c0bc8712a9a957931e3bd9751db1bf31a6baeb467a9b5234f228fce77
                                                              • Opcode Fuzzy Hash: 7eea6bf68266c5c55903e751ce693e6a71296128b17e6e7a73b50dc6fc62aaad
                                                              • Instruction Fuzzy Hash: 5802A032B08B8697EB20EB15D4A0A6A73E5FB85B84F158235CE6D4B798DF3CE455C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memset$_stricmp
                                                              • String ID: IMAGE$PNG$ZLIB_INIT$zlib initialization failed
                                                              • API String ID: 3026489053-4061978001
                                                              • Opcode ID: 81562f25509ab8985cc99159fd038db5ac5ab305e0b27b5d7235b84a9ceef02e
                                                              • Instruction ID: 94ecf63f1d09a2eb0e35a5868bb4c3c19bae0b699e58e59a6f624ad5e6c764bc
                                                              • Opcode Fuzzy Hash: 81562f25509ab8985cc99159fd038db5ac5ab305e0b27b5d7235b84a9ceef02e
                                                              • Instruction Fuzzy Hash: 3A417072B08B8682EB218B15E8407BA73A0FB88BC4F954135DA4D4BB75EF3CE545CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Window$ColorLongProc
                                                              • String ID: #%04X%04X%04X$Ttk
                                                              • API String ID: 3223664542-2938447076
                                                              • Opcode ID: e020eba63785958b86d693a6bb5876bffce471c656396c30e4ca5ebdc4c6392e
                                                              • Instruction ID: e90b5a75daa7fba49b6f8ee9162dc1332d3d0927cb7075ad47c0096d9d660263
                                                              • Opcode Fuzzy Hash: e020eba63785958b86d693a6bb5876bffce471c656396c30e4ca5ebdc4c6392e
                                                              • Instruction Fuzzy Hash: 0A519E36608A96C2E7119B15F84077A77A1FB85B88F904136EE8D4BBB4DF3CD445CB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Valuememcpy
                                                              • String ID: binary encoding is not available$iso8859-1$unable to alloc %u bytes
                                                              • API String ID: 574835123-1438692910
                                                              • Opcode ID: b75504ea0c0d22ddf6b7a8ab665df1b735cbdc8974602cfa2fdf33c836f6646e
                                                              • Instruction ID: dddb216143ed6727e8d8c1e4d22b1c33691d420cfc5d30e9700214f9d4fbce40
                                                              • Opcode Fuzzy Hash: b75504ea0c0d22ddf6b7a8ab665df1b735cbdc8974602cfa2fdf33c836f6646e
                                                              • Instruction Fuzzy Hash: BBE16D32B18B81C6E764CF15E850AAA73A4FB98794F114235DAAD87BDCDF38D494CB40
                                                              APIs
                                                              • TlsGetValue.KERNEL32 ref: 00007FFDFF24DCE4
                                                              • memset.VCRUNTIME140 ref: 00007FFDFF24DD30
                                                              • memset.VCRUNTIME140 ref: 00007FFDFF24DEAB
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF24E078
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeapValuememset$ErrorLastProcessmemcpy
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 3648771258-2759121943
                                                              • Opcode ID: 89865b2513c283892e79a5d3ccfa7221ee88b48ce5d2a3e39e0a329d5f1cc07e
                                                              • Instruction ID: bf0dde05fb71facb1e30a230abb83d1ff73a54f76312c03c9be9103f76a0a21a
                                                              • Opcode Fuzzy Hash: 89865b2513c283892e79a5d3ccfa7221ee88b48ce5d2a3e39e0a329d5f1cc07e
                                                              • Instruction Fuzzy Hash: 20C18162B09A4282EB20DF15D060AB963A0FB85B84F445235DE7D9B7DEEF78DA40C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: DeleteObject
                                                              • String ID: unicode$utf-16
                                                              • API String ID: 1531683806-3317161374
                                                              • Opcode ID: a6f0f53ab07024ddc17ee0047a15ffecfc17ac4671ea701fd5c2624d831b4c1a
                                                              • Instruction ID: 45e74681ae1fb6befd30ca1f988bf968a1ffed77cf1be49881ecceec9397900e
                                                              • Opcode Fuzzy Hash: a6f0f53ab07024ddc17ee0047a15ffecfc17ac4671ea701fd5c2624d831b4c1a
                                                              • Instruction Fuzzy Hash: 4951153AA1AB46D2EB558B06E94427977A5FB88F90F864136DA4E4B770DF3CE464C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateHandleModule
                                                              • String ID: TkChild
                                                              • API String ID: 1084761317-227893619
                                                              • Opcode ID: 95fc02ff4eb8f332045fbcdff66f5aefe162d84fb6b160f5efcdbdc6c83ca219
                                                              • Instruction ID: b1e8f0fe5dd7c3bc6b7314bd61fca7b3b8d42863b06cdcf76539fa58db19e24a
                                                              • Opcode Fuzzy Hash: 95fc02ff4eb8f332045fbcdff66f5aefe162d84fb6b160f5efcdbdc6c83ca219
                                                              • Instruction Fuzzy Hash: B121D676A18781CBE760CF29E540A1ABBA1F748B94F545139EA8947B28DF3CE4408B04
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %s called with shared object$Buffer Underflow, BUFFER_PADDING not enough$TclAppendUtfToUtf
                                                              • API String ID: 0-2219859426
                                                              • Opcode ID: 82821bb2b8d30fd529f7d85ce686fe08e556e51772cf0d291a5ecd7950ef2d73
                                                              • Instruction ID: 3a3eab065d55b568bc782d2a309f2b366290a8c033e3533bfcdd4734fe835c5c
                                                              • Opcode Fuzzy Hash: 82821bb2b8d30fd529f7d85ce686fe08e556e51772cf0d291a5ecd7950ef2d73
                                                              • Instruction Fuzzy Hash: 21918B76B14B818AEB14DF69D450AAD33B6FB48788B104235DE2D97B9CDF38E415CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 1279662727-0
                                                              • Opcode ID: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                                                              • Instruction ID: ca455b37083484bc123871110d4622b4f55877a2a2ee93772afa474792202eae
                                                              • Opcode Fuzzy Hash: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                                                              • Instruction Fuzzy Hash: B5418522E18B8183EB548B61A5503797374FF99BB5F109335EA9C83AD1DF7DA5E08700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CommConsoleErrorFileLastModeStateType
                                                              • String ID:
                                                              • API String ID: 3984557487-0
                                                              • Opcode ID: 20391379929f2712b19f30d84645c89e534290381122453a9d2f100b0da013b7
                                                              • Instruction ID: 8774261367a95dd02cb8546e428a94fd98564b400c5a9ae1ede1f1f656270760
                                                              • Opcode Fuzzy Hash: 20391379929f2712b19f30d84645c89e534290381122453a9d2f100b0da013b7
                                                              • Instruction Fuzzy Hash: 6F01752270860187FB10BB16E8E4B3A63E1AF48BC4F554634DA7D8E6A8DF6CD455D700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errno
                                                              • String ID: ctory$unable to alloc %u bytes
                                                              • API String ID: 2918714741-474272330
                                                              • Opcode ID: 4b94410624d876c38fb809a46fe64fbc0dcefdc73cfe17ec0bee0cf2a57ff0de
                                                              • Instruction ID: e4c4084d05458e0cc5add0d02af5d653d93a00d926c9a064b72c0476c1e9c25c
                                                              • Opcode Fuzzy Hash: 4b94410624d876c38fb809a46fe64fbc0dcefdc73cfe17ec0bee0cf2a57ff0de
                                                              • Instruction Fuzzy Hash: 89A19D22B09A4287EB95AB159560A7A77D4FB44F88F084636DE7D4B7D9DF3CE881C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CreateDeleteIndirectObjectRectstrncmp
                                                              • String ID: tried to delete photo image when instances still exist
                                                              • API String ID: 3169462253-2722655475
                                                              • Opcode ID: e53f3f12f4af4b750d9e75f43d3fba445e4ff03691643011f732ce262946da18
                                                              • Instruction ID: a3a5bb5b59f70a266a4ee9d45d5a02619023f4721e5bda68507fed7bfe2425b3
                                                              • Opcode Fuzzy Hash: e53f3f12f4af4b750d9e75f43d3fba445e4ff03691643011f732ce262946da18
                                                              • Instruction Fuzzy Hash: 16517176A19B8282EB51DF15E854A7933A8FB98B84F565231DE4D4B730EF3CE441C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: ::tcl$::tcl::
                                                              • API String ID: 1114863663-1364682314
                                                              • Opcode ID: 34807f3eb74d9faf16e95d8695be932fdee8220fa96272dc7401db9f5c452af4
                                                              • Instruction ID: 66cb9ba04baea607e83c4787a984dff75056778e5bd4280321acacaccc998877
                                                              • Opcode Fuzzy Hash: 34807f3eb74d9faf16e95d8695be932fdee8220fa96272dc7401db9f5c452af4
                                                              • Instruction Fuzzy Hash: B7817E32B08B818AEB55DF25E460AA977A0FB49B88F544136DF6DC7B98DF38D941C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: LongWindow
                                                              • String ID:
                                                              • API String ID: 1378638983-0
                                                              • Opcode ID: 034f33416eb90e14b4a6470f11a18a5382b0c6d82eac88f4d0d9141331fb5aa2
                                                              • Instruction ID: 13acbfd2f52b8fa0f5d71204fa5595cbd9ea0209ca993909e663641d0d5aee99
                                                              • Opcode Fuzzy Hash: 034f33416eb90e14b4a6470f11a18a5382b0c6d82eac88f4d0d9141331fb5aa2
                                                              • Instruction Fuzzy Hash: 5551CB72A09B828AE7519F15E4807B977A1FB98B44F564235DE4E0BBB9DF3CE4048700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 3251591375-0
                                                              • Opcode ID: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                                                              • Instruction ID: e94f1a0c293cd97ab1db7d2fd251b4715009b854b3614ff17ffef03d994289c9
                                                              • Opcode Fuzzy Hash: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                                                              • Instruction Fuzzy Hash: 20316E21E0CE0741FF14BB65D6523F9128AAF81FA6F4440B4E90EC72D7DE2DA905CB60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: FocusMessageProcSendWindow
                                                              • String ID:
                                                              • API String ID: 1049918876-0
                                                              • Opcode ID: 9466ce9fefbe9180dee6241d12e8717f2a405cd57adf346a0847e86ec5346fa5
                                                              • Instruction ID: 129e48be9d845e197f3e8a660cb998e847eb63949e9f7b1eaee96285c7a954c8
                                                              • Opcode Fuzzy Hash: 9466ce9fefbe9180dee6241d12e8717f2a405cd57adf346a0847e86ec5346fa5
                                                              • Instruction Fuzzy Hash: F2315C76A0AA4286EB61DF64D1816BC63A0FFA4B58F561136DE0D1BBB4DF3CE845C301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memmove
                                                              • String ID: ...$max size for a Tcl value (%d bytes) exceeded
                                                              • API String ID: 2162964266-3564828104
                                                              • Opcode ID: 722ded2e657888b42b38e8d07e350958146444595db856d50f4fd9eb64fe2b75
                                                              • Instruction ID: 06111b05e4178f1752fa922bfe9dee27d2599d32d5604e763141da5e8b2d3538
                                                              • Opcode Fuzzy Hash: 722ded2e657888b42b38e8d07e350958146444595db856d50f4fd9eb64fe2b75
                                                              • Instruction Fuzzy Hash: 3721DF7271874283DB14BF259424929B7A2EB84BA0F294330EE7D5B7C8DF79E5418700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: bad frame factor in ArrangePacking
                                                              • API String ID: 0-4121849145
                                                              • Opcode ID: c331817dbcd2973cc4fd4271bd2e4b0e14530f31e8d12876958bc82fd7cb54b4
                                                              • Instruction ID: 0df09b00bafac86810aab878ddeea59d33bacaae935c3ba6ab80450c8776a987
                                                              • Opcode Fuzzy Hash: c331817dbcd2973cc4fd4271bd2e4b0e14530f31e8d12876958bc82fd7cb54b4
                                                              • Instruction Fuzzy Hash: 6F029A33A182918BDBA4CF29D54076D7BE0FB48B88F155135DA4E8BB64DB3DE864CB40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: name
                                                              • API String ID: 0-1579384326
                                                              • Opcode ID: c1fc8831f1f723b861a2ea9fa8d41df7e12d0b2aca6988cfaf83f04bbcb14303
                                                              • Instruction ID: c2269cdb1973248404c123e8f7fa6453915abc75753f1e2fc9179496eb9f77d5
                                                              • Opcode Fuzzy Hash: c1fc8831f1f723b861a2ea9fa8d41df7e12d0b2aca6988cfaf83f04bbcb14303
                                                              • Instruction Fuzzy Hash: 9A110A61F1D24282E758BB2AA921A7E23D19F49BC0F544231ED3EDB7DADE2CD4808740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction ID: 802d0431231ea52929b41809b69b658c0e476d3af969a192f3e312e7000a3025
                                                              • Opcode Fuzzy Hash: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction Fuzzy Hash: 1B51E765F0AA4186FF28DA36940067A6699AF84FF6F188734ED6D837DDCE3CD4418600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                                                              • Instruction ID: 533349028989eefd35fbded713cc8502f64578a322ed060746e5a91407da63c7
                                                              • Opcode Fuzzy Hash: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                                                              • Instruction Fuzzy Hash: DB110122A08E9281DF208B26A914069A365BB42FF0F544335EE7D8BBE8CF3CD1108700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strchrstrncpy
                                                              • String ID:
                                                              • API String ID: 3824778938-0
                                                              • Opcode ID: 59ad0905ecfe5c516f0bc50b78c172d0ff2d33adca37748a59e8d2afaaabc041
                                                              • Instruction ID: 4a6d1a19d3bdeecb9026cccc539a9c6d70f53111f1851ac235739f0b07bc3bc0
                                                              • Opcode Fuzzy Hash: 59ad0905ecfe5c516f0bc50b78c172d0ff2d33adca37748a59e8d2afaaabc041
                                                              • Instruction Fuzzy Hash: 7891BA76B04A8282EB65CF1AD05067977A1FB88F94F869131DE0E4B7A5DF3CE841C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID:
                                                              • API String ID: 2221118986-0
                                                              • Opcode ID: a97240f1d83b1adc3c86194cad5a6cecf269415b898b84b4125abf84ab899d5e
                                                              • Instruction ID: 15e3c79db512cc97b08f8000a5823977e6ca7bb520f1525906757f4204bd344f
                                                              • Opcode Fuzzy Hash: a97240f1d83b1adc3c86194cad5a6cecf269415b898b84b4125abf84ab899d5e
                                                              • Instruction Fuzzy Hash: AF312C72708A8686EB21DB16E4407AAB7A0FB89B84F454131EF4D4B769EF3CD445CB00
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,?,?,00007FF6110DA9D5,?,?,00000000,00007FF6110DAA8A), ref: 00007FF6110DABC6
                                                              • GetLastError.KERNEL32(?,?,?,00007FF6110DA9D5,?,?,00000000,00007FF6110DAA8A), ref: 00007FF6110DABD0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                                                              • Instruction ID: ac545ef8855779c5c53b39482b3d3adada035ae380a6297a8e646a1bef6d6619
                                                              • Opcode Fuzzy Hash: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                                                              • Instruction Fuzzy Hash: 28219611F18F8281FFA457519494379168AAF84FB2F085639EA2EC77D2CE6CE5914300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: 41a96ded99055c2afda74dbbd72c11c852b4561292f280328cbb8e0849bc49b2
                                                              • Instruction ID: 679da813400bc170cc47108b08d34ec142402689e0d9e623d165cf276ecc0b2a
                                                              • Opcode Fuzzy Hash: 41a96ded99055c2afda74dbbd72c11c852b4561292f280328cbb8e0849bc49b2
                                                              • Instruction Fuzzy Hash: 16C19A32A187858BEB68DF29D184A6D77A0FB85B84F064135EF495B764CF3CE851CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                                                              • Instruction ID: 6becd0bc9113ed1deeaee64aecc98165863e2438ad7ef17f37fff9c337fefdd5
                                                              • Opcode Fuzzy Hash: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                                                              • Instruction Fuzzy Hash: EE41B032D18E4587EF348A29A54127977A8EF5AFA2F100131EA8EC36D1CF7DE442CB51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: c2db9c5f83953e02d05937cc7705607b873021de8fb3c63a308cab1dfdeef40a
                                                              • Instruction ID: f5d2cb35f35d63910298e584983299c0e18540776b4ea6181a7b44e574345460
                                                              • Opcode Fuzzy Hash: c2db9c5f83953e02d05937cc7705607b873021de8fb3c63a308cab1dfdeef40a
                                                              • Instruction Fuzzy Hash: 4A412876A0C6858AEB64DF29E14436977A0FB84B94F164136DF8E0BB68CF3DE444CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Window
                                                              • String ID:
                                                              • API String ID: 2353593579-0
                                                              • Opcode ID: 65b411131091d37ec4ab718acf843bef5e572e105d18f55e6fc5892ae7d63e07
                                                              • Instruction ID: 88a24146a8e99c18f3287f171ab4c13df14a83d8054f17acdf6366684c603334
                                                              • Opcode Fuzzy Hash: 65b411131091d37ec4ab718acf843bef5e572e105d18f55e6fc5892ae7d63e07
                                                              • Instruction Fuzzy Hash: 5E415D76A0568281EB658F25E8407B867B1FB84F88F1A8036DE8D4F3A8DF3CD444C750
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: dbe252cbe9602e516bef766159cb17d31648e178a783876db9980e74bc2d1f62
                                                              • Instruction ID: 4d29c46a2ff1f455c7ea2e5a151e2721086f7f3dc1779359ff386076ba32bf49
                                                              • Opcode Fuzzy Hash: dbe252cbe9602e516bef766159cb17d31648e178a783876db9980e74bc2d1f62
                                                              • Instruction Fuzzy Hash: 58416A76A1C6858AEB64DF29E00436977A0F784B94F155136DF8E07B68CF3DE444CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: 1638b772b012964c9d81116b04801929c9d4f79fa765dbabdb7d83e48ba37876
                                                              • Instruction ID: 217dc2cc0cc63441c005419f4c1cf8e6271323ed54c6974576040c39849e6f5a
                                                              • Opcode Fuzzy Hash: 1638b772b012964c9d81116b04801929c9d4f79fa765dbabdb7d83e48ba37876
                                                              • Instruction Fuzzy Hash: F8414776A0C6818AEB60DF29E0443697BA0FB84B94F054136DE8E0BB68CF3DE444CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID:
                                                              • API String ID: 840049012-0
                                                              • Opcode ID: 6461e265172cc7c29c918375a83e3609c66a2ce417770b426b24f21eaff55d7c
                                                              • Instruction ID: 0baaf3bef9e7347d2e8b1350572b1cde57347be25b6c2bcdf06f833d29b7f0b9
                                                              • Opcode Fuzzy Hash: 6461e265172cc7c29c918375a83e3609c66a2ce417770b426b24f21eaff55d7c
                                                              • Instruction Fuzzy Hash: A121B121F18E5246FF909A2269043FA9649BF45FF5F984471FE0C87786CE7DE141CA14
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: 57413b09bd14a670698cf30a4c058cbb35c6a301c3b01b1ab3f70b6b7348aad0
                                                              • Instruction ID: 612d0fa350fb3e6f0bf0c3784d7ceac3da66f092acfc8b9c5fca9c0e05c54674
                                                              • Opcode Fuzzy Hash: 57413b09bd14a670698cf30a4c058cbb35c6a301c3b01b1ab3f70b6b7348aad0
                                                              • Instruction Fuzzy Hash: E4412876A0C6858AEB60DF29D04436E77A0FB84B94F154136DE8E0BB68CF3DE454CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: 06e76ed8d07fcf3e5b528b64c2353ab3876091f9705df2077aca4cd91b4ec8f2
                                                              • Instruction ID: b5af5f44849938ca62ff06a970b00427a6e574583c9fe880ec3be34c1041919c
                                                              • Opcode Fuzzy Hash: 06e76ed8d07fcf3e5b528b64c2353ab3876091f9705df2077aca4cd91b4ec8f2
                                                              • Instruction Fuzzy Hash: 17411576A0C6858AEB64DF29D14436A7BA0FB84B94F054136DF8E0BB68CF3DE454CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: 6e6b6842835aebec5c06d0ed618ff5e33fe5b06eb6ba6225dde85cee500f598b
                                                              • Instruction ID: a4fcc88e77c59a571d8c9b0165403c0f24614ba8e162c125c847fa69053719af
                                                              • Opcode Fuzzy Hash: 6e6b6842835aebec5c06d0ed618ff5e33fe5b06eb6ba6225dde85cee500f598b
                                                              • Instruction Fuzzy Hash: 6A412776A0C6858AEB64DF29E04437A7BA0FB84B94F155036DE8E07B68CF3DE454CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow
                                                              • String ID:
                                                              • API String ID: 1268545403-0
                                                              • Opcode ID: fecc389b9295e0206eb6af9764f45c28c7aae6eff36a0ca9b9817ff4f4c4484f
                                                              • Instruction ID: 7d9591774850945ad345d11905a03fb149b427b8a73bfe3d6878a959df7e5643
                                                              • Opcode Fuzzy Hash: fecc389b9295e0206eb6af9764f45c28c7aae6eff36a0ca9b9817ff4f4c4484f
                                                              • Instruction Fuzzy Hash: EF412D72A09681C6EB64CF55E0583AA73E0FB89B98F194135DF9D4B769EF3CD4418B00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: c507f5b42a556fe1e0ef6bbc767ca64ca4f18035691ca6e09477e42c904f8d25
                                                              • Instruction ID: a257cf15d670aaca2300c5b180a12671ad99eab1be6fe39e4bc22cf6bd22f970
                                                              • Opcode Fuzzy Hash: c507f5b42a556fe1e0ef6bbc767ca64ca4f18035691ca6e09477e42c904f8d25
                                                              • Instruction Fuzzy Hash: 1C412776A0C6858AEB64DF2AE0443697BA0FB84B94F154036DE8E07B68CF3DE454CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: a64150b3369d8192c6dd4453cb161a3d161f8f5fa70b43e940d5af1bb46e5029
                                                              • Instruction ID: 244e640ec9a61988a94be063d1d0f9e4137dbd7ff993af18f69b15065b07462d
                                                              • Opcode Fuzzy Hash: a64150b3369d8192c6dd4453cb161a3d161f8f5fa70b43e940d5af1bb46e5029
                                                              • Instruction Fuzzy Hash: A4412776A0C6818AEB60DF29E04436A7BA0FB44B94F154036DE8E07B68CF3DE494CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: c2d01373d3233558d420055387ebca2c39d1ce99b2c1a08127fa32cb0ba5fec2
                                                              • Instruction ID: b33e4adbf72e69b54d6036a952aa2162623fb1ebbe17858fef65128486c5e1d6
                                                              • Opcode Fuzzy Hash: c2d01373d3233558d420055387ebca2c39d1ce99b2c1a08127fa32cb0ba5fec2
                                                              • Instruction Fuzzy Hash: 5631A422E18E5285FF51AB6588413BC6A98BF81FB6F420135EA6DC77D2CF7CE4418711
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow
                                                              • String ID:
                                                              • API String ID: 2234453006-0
                                                              • Opcode ID: b9a196a44eb4d187d46fbe7b8f6f5f211998afaa5ae6808c45c1a13d03cdec10
                                                              • Instruction ID: 7035aa11d2aa47d511a38f0b73a002fb73e1bbd0a2c3353e67c251825ef0df2a
                                                              • Opcode Fuzzy Hash: b9a196a44eb4d187d46fbe7b8f6f5f211998afaa5ae6808c45c1a13d03cdec10
                                                              • Instruction Fuzzy Hash: 98310576A0C6858AEB64DF29E04436A77A0FB84B94F154036DE9E0BB68CF3DE454CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModule$ClassCursorIconRegisterShowWindow
                                                              • String ID:
                                                              • API String ID: 3163394910-0
                                                              • Opcode ID: 31960dd51afd89266b5f86323b9d68b8c392e622efe418eaca8d87f66aec48dd
                                                              • Instruction ID: fd9dc83ac9822c02bbaf6c94035e8b99b1fab58f554738b4b2aa1129d4f3bbad
                                                              • Opcode Fuzzy Hash: 31960dd51afd89266b5f86323b9d68b8c392e622efe418eaca8d87f66aec48dd
                                                              • Instruction Fuzzy Hash: CC21A132A08682C6EBA4CF25D4847BD27A0EB84B58F6A4035DA0D4F3E5DF7CE885C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction ID: 43b5a92200e0574e1ef1a0226e0a738d1fd8c1505b3088056d14ce5974757af9
                                                              • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction Fuzzy Hash: 8F116021E1CA4282EF60AF1194012BDA278BF85FA6F444431FE8CDBA96DF3EE4408740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                                                              • Instruction ID: d3410ac1754bf2cac8ebcac0e9b9a323edfd914d0d7d3b4a46a0822e0a97515e
                                                              • Opcode Fuzzy Hash: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                                                              • Instruction Fuzzy Hash: 3C21D472E08E4186EB618F2AE84037976A5FB84F65F144234EB5DC76D9DF3CD5018B00
                                                              APIs
                                                              • memcpy.VCRUNTIME140(?,?,?,?,00000008,00000000,000000D0,?,?,00007FFE0139C402), ref: 00007FFE0139D599
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID:
                                                              • API String ID: 3510742995-0
                                                              • Opcode ID: b20d1ef5d12f9a98759daee67cf720e3de4fc180adfc0200aa12c7bdcd33d009
                                                              • Instruction ID: 462e3325db01fd6e9c8c8e155e81db458b62bdabc5d953d8ef139e821a7a0252
                                                              • Opcode Fuzzy Hash: b20d1ef5d12f9a98759daee67cf720e3de4fc180adfc0200aa12c7bdcd33d009
                                                              • Instruction Fuzzy Hash: 2AF12BB7602F85DACB50CF09E0811ADBBB4F788B94B56822ACB4E47720DF39E595C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction ID: f45d2446f01d50f6c5ea25f0fc1773c28a6f532bf0dbeeed424c4138eef5a1b3
                                                              • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction Fuzzy Hash: 0E01A161E08B4180EF04DF5299015A9A6A9BF85FF1F484631EE5C93BDACE3CD5418300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ProcWindow
                                                              • String ID:
                                                              • API String ID: 181713994-0
                                                              • Opcode ID: a2524f42c8ecc9f8c3ef7bff0550f9c54ecdf73c07661b900789fad0f55b059f
                                                              • Instruction ID: f67a097ab2bd661b18ac33fad6ff8d57103db428221f4ef84b8d4aeeea49f789
                                                              • Opcode Fuzzy Hash: a2524f42c8ecc9f8c3ef7bff0550f9c54ecdf73c07661b900789fad0f55b059f
                                                              • Instruction Fuzzy Hash: C711F876609B46C5EB02DF15E8902B827A0FB98B94F524236DE4E4B375EF3CE895C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow
                                                              • String ID:
                                                              • API String ID: 1268545403-0
                                                              • Opcode ID: b84d4daf3ef92bc9acc2516e26e4f35f00917bae8b8671d0fb7cb25a647b8e8d
                                                              • Instruction ID: 805f6730f41b51fb8461474fa93abdf7312dc2b3efa6c623fe64b9e128d5fd67
                                                              • Opcode Fuzzy Hash: b84d4daf3ef92bc9acc2516e26e4f35f00917bae8b8671d0fb7cb25a647b8e8d
                                                              • Instruction Fuzzy Hash: A9F030B2E08542C3FB754E19C4843B92356DBD4725F298035C5094E3E8DE3DDCD68750
                                                              APIs
                                                                • Part of subcall function 00007FF6110C9390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6110C45F4,00000000,00007FF6110C1985), ref: 00007FF6110C93C9
                                                              • LoadLibraryExW.KERNEL32(?,00007FF6110C6476,?,00007FF6110C336E), ref: 00007FF6110C8EA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLibraryLoadMultiWide
                                                              • String ID:
                                                              • API String ID: 2592636585-0
                                                              • Opcode ID: 3eee33850ff877a76f59ec51b6af72cd7d073a691558276a485592abc3036afa
                                                              • Instruction ID: fc1e11076a5e08c9db548cb500ebabc5b3f28777b9d1eedf74603ddd3342651b
                                                              • Opcode Fuzzy Hash: 3eee33850ff877a76f59ec51b6af72cd7d073a691558276a485592abc3036afa
                                                              • Instruction Fuzzy Hash: 44D0C201F35A4642EF44A767BA4A6795255AF89FD0F88D035EE0D83B5AEC3CD0414B00
                                                              APIs
                                                              • memset.VCRUNTIME140(?,?,?,?,?,?,00000000,00007FFE013D4714), ref: 00007FFE0132B53D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990815451.00007FFE01301000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE01300000, based on PE: true
                                                              • Associated: 00000001.00000002.2990781612.00007FFE01300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990975581.00007FFE01401000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991033858.00007FFE0144D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991058007.00007FFE0144E000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991086482.00007FFE01452000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991119994.00007FFE01453000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991151668.00007FFE01455000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                              • Associated: 00000001.00000002.2991180469.00007FFE01457000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffe01300000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID:
                                                              • API String ID: 2221118986-0
                                                              • Opcode ID: 3a8bdf63237583592d14a38a8bf94ae3367c143d17d6739db40b7576349a91e2
                                                              • Instruction ID: 20cd450a98f3d8216cace6fb7b4bb0bb309b76d1510f47e927d90408845d1075
                                                              • Opcode Fuzzy Hash: 3a8bdf63237583592d14a38a8bf94ae3367c143d17d6739db40b7576349a91e2
                                                              • Instruction Fuzzy Hash: BAE12871908B4286FB609F25E8443B977A0FB54768F96433AC66C0E2F5EF3CA485CB41
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF6110DB32A,?,?,?,00007FF6110D4F11,?,?,?,?,00007FF6110DA48A), ref: 00007FF6110DEBED
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 0190c006dd090f1dc8136ef035d08a675b61e1fdbed98732a32380f018d60316
                                                              • Instruction ID: bdcaca6510e38b430c9916bd8e4d077b0712466d7032802a38a515a8be44231a
                                                              • Opcode Fuzzy Hash: 0190c006dd090f1dc8136ef035d08a675b61e1fdbed98732a32380f018d60316
                                                              • Instruction Fuzzy Hash: 45F04954F09E2680FF59666698553B612985F88FB2F488530C90FC63D2EE1CB8818230
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FF6110D0C90,?,?,?,00007FF6110D22FA,?,?,?,?,?,00007FF6110D3AE9), ref: 00007FF6110DD63A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2989063730.00007FF6110C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6110C0000, based on PE: true
                                                              • Associated: 00000001.00000002.2989000724.00007FF6110C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989136208.00007FF6110EB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF6110FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989170818.00007FF611101000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000001.00000002.2989219640.00007FF611104000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff6110c0000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                                                              • Instruction ID: 6c40a49807b530c7819fb28ab1018a4298a37ebc52eff445332cf343a62064ac
                                                              • Opcode Fuzzy Hash: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                                                              • Instruction Fuzzy Hash: C8F0F811F1DA4685FF656BB258457B9129C5FC8FB2F084730DD2EC66C2EE2CA48086A0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValue_isnan
                                                              • String ID: (reading increment)$%s called with shared object$TclIncrObj$TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$unable to alloc %u bytes
                                                              • API String ID: 3079371118-94721854
                                                              • Opcode ID: a4c22cf6919fb71629036fe919c02793c46c6300eee7d3cf82871f03ddbc7a54
                                                              • Instruction ID: 6cb0b1c342c1f5c0e61bbbf78a2811fb40643cdf16264f2dcc787134ef02d5f3
                                                              • Opcode Fuzzy Hash: a4c22cf6919fb71629036fe919c02793c46c6300eee7d3cf82871f03ddbc7a54
                                                              • Instruction Fuzzy Hash: 51224C62B0AB4286EB64DF25D4A09BD23A1FB44B88B544636DA7EC77DCDF38E445C700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: array$ read$ unset$ write$TraceExecutionProc: bad flag combination$enter$enterstep$leave$leavestep
                                                              • API String ID: 0-2383405397
                                                              • Opcode ID: fe4b1b4c85c1dc6c90a74f834f2abb6ecfda588c5e6be6c9e6796038ce5c7d53
                                                              • Instruction ID: c84571569e0d39ddd7853e2cbefc90023fdeee00976ea10270b1a44d7b2d25d9
                                                              • Opcode Fuzzy Hash: fe4b1b4c85c1dc6c90a74f834f2abb6ecfda588c5e6be6c9e6796038ce5c7d53
                                                              • Instruction Fuzzy Hash: 7F126A72B086928BEB54AB25D461FAA67E0FB44788F004235EA7D4F6D9DF7CE454CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: STACK: Reallocating with no previous alloc$STACK: Stack after current is in use$STACK: Stack after current is not last$TclStackFree: incorrect freePtr (%p != %p). Call out of sequence?$TclStackRealloc: incorrect ptr. Call out of sequence?$freeing an execStack which is still in use$unable to alloc %u bytes$unable to realloc %u bytes
                                                              • API String ID: 3510742995-285375023
                                                              • Opcode ID: e8285cc1dbf2a3d9e026cce9feed270a904633e5563d0577665d597d50dadfba
                                                              • Instruction ID: 095e65cdfa00dab4ee28c57659f853b61773b6bf6231c551bcdc16f635fda28a
                                                              • Opcode Fuzzy Hash: e8285cc1dbf2a3d9e026cce9feed270a904633e5563d0577665d597d50dadfba
                                                              • Instruction Fuzzy Hash: D6F18072B06B4586EF14DF15D4A06BDA3A4FB58B84F584236DA6D87798DF38E861C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errno$Value
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 107400726-2759121943
                                                              • Opcode ID: 9419ccbb3440cb0bc897d1571088cc16e439ec24e58eb4a68ac6bcf20b2d6bce
                                                              • Instruction ID: a1538c8185720a9149688fae6e68a9a87e18871888d99870e0055c6478443aba
                                                              • Opcode Fuzzy Hash: 9419ccbb3440cb0bc897d1571088cc16e439ec24e58eb4a68ac6bcf20b2d6bce
                                                              • Instruction Fuzzy Hash: 9D715E22B0974682EB64BB22D860B7963D0EF54B88F494236DE7D4B7D9EE3CE4518704
                                                              APIs
                                                                • Part of subcall function 00007FFDFF2D0510: __p__wenviron.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFDFF2D0561
                                                                • Part of subcall function 00007FFDFF2D0510: LeaveCriticalSection.KERNEL32 ref: 00007FFDFF2D060B
                                                              • GetUserNameW.ADVAPI32 ref: 00007FFDFF3936A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalLeaveNameSectionUser__p__wenviron
                                                              • String ID: USERNAME
                                                              • API String ID: 3750655957-1047370299
                                                              • Opcode ID: 41efd4a24c6da596ca8482b293b2fac050c8a1fa9d02c6da45a74b4ca36724cd
                                                              • Instruction ID: ae965229355b0025bbfb137876ad732bbad4d9a738966b06c6657043ca788277
                                                              • Opcode Fuzzy Hash: 41efd4a24c6da596ca8482b293b2fac050c8a1fa9d02c6da45a74b4ca36724cd
                                                              • Instruction Fuzzy Hash: 58218E7271868586EB209F24E4A47AA73E4FB98758F508731DABD8B3D8DF7CD1058B00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: fprintf$__stdio_common_vfprintf__stdio_common_vsprintf
                                                              • String ID: %ld-%ld$ (#%d)$ L:%s$ R:%s$ UNUSED$ hasbackref$ hascapture$ hasmixed$ longest$ shortest$ {%d,$%s. `%c'$@
                                                              • API String ID: 2245253407-2605086021
                                                              • Opcode ID: d9dee48647e84aacdd81aaed326e4fa44cd494ac5f3e7461f2da174ab2f4fa52
                                                              • Instruction ID: a7ff5e6cff6c870bb57a07db6f90ca48b01906e6704bb9458f27153d4aaa69e2
                                                              • Opcode Fuzzy Hash: d9dee48647e84aacdd81aaed326e4fa44cd494ac5f3e7461f2da174ab2f4fa52
                                                              • Instruction Fuzzy Hash: 9F619C25B0C68241EB15EB12D1A1BB82391AF42BC4F405232DDBDCF6DF9FADE6418340
                                                              APIs
                                                              • TlsAlloc.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339076
                                                              • TlsGetValue.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF33909F
                                                              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3390AD
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3390EE
                                                              • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3390FC
                                                              • TlsAlloc.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339239
                                                              • TlsGetValue.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339262
                                                              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339270
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3392B1
                                                              • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3392BF
                                                              • TlsAlloc.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339368
                                                              • TlsGetValue.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF339391
                                                              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF33939F
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3393E0
                                                              • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3393EE
                                                              • TlsAlloc.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3394B3
                                                              • TlsGetValue.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3394DC
                                                              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF3394EA
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF33952E
                                                              • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00007FFDFF25E666), ref: 00007FFDFF33953C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValue
                                                              • String ID: %s called with shared object$Tcl_SetBignumObj$TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage
                                                              • API String ID: 3216287067-677901689
                                                              • Opcode ID: 705d44e624d08c674e88506b496d49969bd10486868824e63fa5fbd39b6db4b4
                                                              • Instruction ID: 4a0aeb32313b0c419dac573afa548935628763cb8fe59206aca3a0fdf8b74f02
                                                              • Opcode Fuzzy Hash: 705d44e624d08c674e88506b496d49969bd10486868824e63fa5fbd39b6db4b4
                                                              • Instruction Fuzzy Hash: 0B222872B0AA4287EB54EF25A46497877E2AF44B90B444235CA7D4A7ECDF3CE495C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValue
                                                              • String ID: %s called with shared object$?options? data$BINARY$DECODE$INVALID$TCL$Tcl_SetByteArrayLength$TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$invalid base64 character "%c" at position %d$option$unable to realloc %u bytes
                                                              • API String ID: 3216287067-2470074987
                                                              • Opcode ID: a391daa83de326f90fb401777b121357bdc7d2a8d0194dbf11a960637c99b08d
                                                              • Instruction ID: 6273ce61368d7e9e022237143acbf954d8ba6cee42dada55a37982f1cbfec1d8
                                                              • Opcode Fuzzy Hash: a391daa83de326f90fb401777b121357bdc7d2a8d0194dbf11a960637c99b08d
                                                              • Instruction Fuzzy Hash: E2F1D022B09A5686EB249B15E424A797BE5FF44780F444336CA7DCB6E8DF3CE845CB00
                                                              APIs
                                                              • TlsAlloc.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF337801
                                                              • TlsGetValue.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF33782F
                                                              • GetLastError.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF33783D
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF3378DC
                                                              • GetProcessHeap.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF3378EF
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000,?,00007FFDFF25D664), ref: 00007FFDFF337900
                                                              • TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF3379F5
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A1E
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A2C
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A70
                                                              • HeapFree.KERNEL32(?,?,?,?,?,?,?,00007FFDFF31F26B,?,?,?,?,?,?,00000001,00000000), ref: 00007FFDFF337A7E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$Alloc$ErrorLastProcessValue$CriticalFreeLeaveSection
                                                              • String ID: %s called with shared object$Tcl_SetIntObj$TlsGetValue failed from TclpGetAllocCache$alloc: could not allocate %d new objects$alloc: invalid block: %p: %x %x$could not allocate thread local storage
                                                              • API String ID: 4053175167-45797169
                                                              • Opcode ID: 86f356907fc0a17ec4cd9b6240f2a50212c1c409c016f7946791d1d26b109a90
                                                              • Instruction ID: 58c8552f5d50ec6b9e059ed61df67286afe517e8be886aff58287563da988c89
                                                              • Opcode Fuzzy Hash: 86f356907fc0a17ec4cd9b6240f2a50212c1c409c016f7946791d1d26b109a90
                                                              • Instruction Fuzzy Hash: 84B15872B09A0287EB54EB25E4A0A7837E0EB54B94F144235CA7D4B7F8DF38E5A5C740
                                                              APIs
                                                                • Part of subcall function 00007FFDFF38AB20: TlsGetValue.KERNEL32(?,?,00000000,00007FFDFF38BC80), ref: 00007FFDFF38AB2F
                                                                • Part of subcall function 00007FFDFF38AB20: TlsGetValue.KERNEL32(?,?,00000000,00007FFDFF38BC80), ref: 00007FFDFF38AB61
                                                              • TlsGetValue.KERNEL32 ref: 00007FFDFF38BD0F
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • TlsGetValue.KERNEL32 ref: 00007FFDFF38BF2C
                                                              • GetCurrentThreadId.KERNEL32 ref: 00007FFDFF38BFB0
                                                              • TlsGetValue.KERNEL32 ref: 00007FFDFF38C0C2
                                                              • FlushFileBuffers.KERNEL32 ref: 00007FFDFF38C269
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$AllocHeap$BuffersCurrentErrorFileFlushLastProcessThread
                                                              • String ID: -eofchar$-translation$SpliceChannel: trying to add channel used in different list$Tcl_RegisterChannel: channel without name$auto$binary$file%Ix$stderr$stdin$stdout$unable to alloc %u bytes
                                                              • API String ID: 917083514-4206437360
                                                              • Opcode ID: aa57a15ed2611a161079b5b413f06de86d2f2a57e36d93d23ba720fd7a41ad60
                                                              • Instruction ID: 4edfc82deb5d13178c12fe755a29b8a0f10c3abdbae5ce6cb60145e09af9c3f0
                                                              • Opcode Fuzzy Hash: aa57a15ed2611a161079b5b413f06de86d2f2a57e36d93d23ba720fd7a41ad60
                                                              • Instruction Fuzzy Hash: EC023A62B08B4287EB14EF61D460AB963E4FB58784F548635DA7D4B7A9DF3CE4A4C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errno$CriticalLeaveSection$CreateCurrentDirectoryErrorLastPathProcessTempwsprintf
                                                              • String ID: %08x$POSIX$couldn't create temporary directory: %s$unable to alloc %u bytes
                                                              • API String ID: 3574048100-965721635
                                                              • Opcode ID: 93affdf5dba53f1eec5de0bcce93632081e3fa3b35d90d4e87ec0e7e0e904402
                                                              • Instruction ID: 081b1924d75e8038bd89e17b0d41aa92b4dae8398a317accc310a8df5d0e5680
                                                              • Opcode Fuzzy Hash: 93affdf5dba53f1eec5de0bcce93632081e3fa3b35d90d4e87ec0e7e0e904402
                                                              • Instruction Fuzzy Hash: FB614126B1864287EB21BB11E8A4BB963E1BF84B84F455335D93E4E3EDDE3CE4448740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$ClassCreateCurrentEventInitializeLeaveRegisterThreadValue
                                                              • String ID: TclNotifier$Unable to register TclNotifier window class$unable to alloc %u bytes
                                                              • API String ID: 1341508405-959679639
                                                              • Opcode ID: f6bc5f8bc1e5ed4bb850b0d587dcdcf0ddb9bedcfed6eb4274257ecedbd8e48d
                                                              • Instruction ID: 9e08562207d2edfde174d8a439cbeaf3a360b7c7c5cc14114dc512c3e84ea1ba
                                                              • Opcode Fuzzy Hash: f6bc5f8bc1e5ed4bb850b0d587dcdcf0ddb9bedcfed6eb4274257ecedbd8e48d
                                                              • Instruction Fuzzy Hash: 57511826F19A4687EB51BB12E8A097963E0FF98B44F150335DA7D4A3BCDF2CE4948701
                                                              APIs
                                                                • Part of subcall function 00007FFDFF36CDE0: memcpy.VCRUNTIME140(?,?,?,?,FFFFFFFF,?,?,?,?,?,?,?,?,?,?,00007FFDFF361770), ref: 00007FFDFF36CE59
                                                                • Part of subcall function 00007FFDFF36CDE0: memcpy.VCRUNTIME140(?,?,EBC0330475C98548,00007FFDFF361770), ref: 00007FFDFF36CEA2
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF26B159
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF26B1F9
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy$AllocHeap$ErrorLastProcessValue
                                                              • String ID: ::tcl::file::$SAFE$SUBCOMMAND$TCL$___tmp$file$not allowed to invoke subcommand %s of file$problem making 'file %s' safe: %s$problem making 'file' safe: %s$tcl:file:$unable to alloc %u bytes$unable to realloc %u bytes
                                                              • API String ID: 2673728140-2984438679
                                                              • Opcode ID: d50b9655a30bf8b0fcf4acb624867c9e9d9fa6abaf54e7fee59a2f39bbe4697d
                                                              • Instruction ID: 598253cf904c2841198dee699b3f18b77133dae8f855a2d764a2ebf7a375cf37
                                                              • Opcode Fuzzy Hash: d50b9655a30bf8b0fcf4acb624867c9e9d9fa6abaf54e7fee59a2f39bbe4697d
                                                              • Instruction Fuzzy Hash: CCB14166B1868547EB10EF11D4A0AA96390FB44788F400636EA7D8BBEDEF7CE514C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: User$Name$BufferDirectoryFreeInfoProcess$CloseCurrentHandleOpenProfileProfilesToken_stricmplstrlen
                                                              • String ID:
                                                              • API String ID: 1718296481-0
                                                              • Opcode ID: 135f7406255c60c68ae6079833abe6c65c2a4286467e769e88770ed50623529f
                                                              • Instruction ID: f44f577fa405998716af72f1caeb9a9f5591e4fdf4f5c09af1df1b014253a783
                                                              • Opcode Fuzzy Hash: 135f7406255c60c68ae6079833abe6c65c2a4286467e769e88770ed50623529f
                                                              • Instruction Fuzzy Hash: 6FB1766270868287EB20EF25E460A6A67E1FB84798F444235DA7E4B7DCDF7CE545C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalLeaveSection
                                                              • String ID: ?dirList?$?encoding? data$BADPATH$ENCODING$FreeEncoding: refcount problem !!!$OPERATION$TCL$expected directory list but got "%s"
                                                              • API String ID: 3988221542-2097879351
                                                              • Opcode ID: e9a2e50c91cce1b284d5b594f0fa5da7d4aa2de5374d9c1b94fa01e2c463c57a
                                                              • Instruction ID: c97c96f71bc6de025cee390d82b1588ae784d030993f8a77901d17141c1d8e70
                                                              • Opcode Fuzzy Hash: e9a2e50c91cce1b284d5b594f0fa5da7d4aa2de5374d9c1b94fa01e2c463c57a
                                                              • Instruction Fuzzy Hash: DDB16F75B0964686EB15EB12E871AB963A0FF84B84F440631DE3D8B7EDDE2CE4458B40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errno
                                                              • String ID: POSIX$could not get modification time for file "%s"$could not read "%s": %s$could not set modification time for file "%s": %s$name ?time?
                                                              • API String ID: 2918714741-59889625
                                                              • Opcode ID: 3a34b1655190f8c3a2bb4aa1c3f578c0079d876d4e020d418c605397f15a9a05
                                                              • Instruction ID: 69f89e72959f8735b67a475410f41754dcda3d2707a2c7728c1e07d68fd43474
                                                              • Opcode Fuzzy Hash: 3a34b1655190f8c3a2bb4aa1c3f578c0079d876d4e020d418c605397f15a9a05
                                                              • Instruction Fuzzy Hash: 0F715B25B0964282FB14BB129465BBD63D0AF85BC4F480235DE7D8B7EEEE2CE5418740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValue
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$unable to alloc %u bytes$unknown type of resource limit
                                                              • API String ID: 3216287067-39447996
                                                              • Opcode ID: 82cda9133fb9beb025c191c49c0c7b9cde3620e92130ed27a71898e00513075e
                                                              • Instruction ID: 658c59112013fbbd2217e5fbaf215c0eb7bb02382bfb5180792294b68228b8e0
                                                              • Opcode Fuzzy Hash: 82cda9133fb9beb025c191c49c0c7b9cde3620e92130ed27a71898e00513075e
                                                              • Instruction Fuzzy Hash: C4719832B19B8286EB149F25E46093877E4EB45B94F180235DA7C8B7E8DF3CE855C700
                                                              APIs
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF338132
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$ErrorLastProcessValue$CriticalLeaveSectionmemcpy
                                                              • String ID: %I64d$ARITH$INTEGER$IOVERFLOW$TCL$VALUE$expected integer but got "%s"$integer$integer value too large to represent$unable to alloc %u bytes
                                                              • API String ID: 4154660664-507667852
                                                              • Opcode ID: 99d834f27abeb3effc5765bf4d6e352470f1eb2fb1a81e11d0649957132e1c56
                                                              • Instruction ID: 62aa86a1c8ff9961a7d1d3ea50dfdb7e6f1bc76c06f4361f55abb968e294271b
                                                              • Opcode Fuzzy Hash: 99d834f27abeb3effc5765bf4d6e352470f1eb2fb1a81e11d0649957132e1c56
                                                              • Instruction Fuzzy Hash: 2A915D22B08B4697EB20EB15A4609A967E0FB84B90F544335EA7C4B7E9DF3DE591C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValue
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$string
                                                              • API String ID: 3216287067-3987360097
                                                              • Opcode ID: e16c67b887a9353dce40aa2bdeaeb2c443976d7c7c162d22eff119b6a7f49d52
                                                              • Instruction ID: 3863f5742605767db52d11668ee6d3e3b1d04cd9dbafdb1ed23b89e469f3dc9b
                                                              • Opcode Fuzzy Hash: e16c67b887a9353dce40aa2bdeaeb2c443976d7c7c162d22eff119b6a7f49d52
                                                              • Instruction Fuzzy Hash: 4E71BFA2F0964297EB65AB259464A7863D1EF56B94F444235CA3D0B3E8EF2EF4D18300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValue
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: could not allocate %d new objects$could not allocate thread local storage
                                                              • API String ID: 3042485339-3925149219
                                                              • Opcode ID: 7c051dc456d8e621702d13820d3b7153687a9eadf761291cc8a15cfded2b6e07
                                                              • Instruction ID: 791ff06615dd8b6f19aa4ab738d87b9505101e0485ff96e0fe866c4b7bc2d98d
                                                              • Opcode Fuzzy Hash: 7c051dc456d8e621702d13820d3b7153687a9eadf761291cc8a15cfded2b6e07
                                                              • Instruction Fuzzy Hash: 958109B6B05B05C7EB55DF25E4A0A6833E4FB58B84F140236CA6D8B3A8DF38D5A5C740
                                                              APIs
                                                              • memset.VCRUNTIME140(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F60C
                                                              • TlsAlloc.KERNEL32(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F61A
                                                              • TlsGetValue.KERNEL32(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F648
                                                              • GetLastError.KERNEL32(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F656
                                                              • GetProcessHeap.KERNEL32(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F69A
                                                              • HeapFree.KERNEL32(?,?,00000000,00007FFDFF384348,?,?,?,?,?,?,?,00007FFDFF33860A), ref: 00007FFDFF37F6A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocErrorFreeLastProcessValuememset
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage
                                                              • API String ID: 117382712-4238949377
                                                              • Opcode ID: c5d5c71506dbb95780b2d62bb79294dfbd92dac4e4da232c06d2ba020cc423a0
                                                              • Instruction ID: 83cbcbfc8d1ebbf021eb9fb05951f3f48c51cee90436c4a6d47c12b8235996fa
                                                              • Opcode Fuzzy Hash: c5d5c71506dbb95780b2d62bb79294dfbd92dac4e4da232c06d2ba020cc423a0
                                                              • Instruction Fuzzy Hash: 8D419C76B08A828BEB50AB29B46097837E0FF04B94B044335CA7D4B7E9DF38E4568740
                                                              APIs
                                                              • sqrt.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FFDFF25F11B
                                                              • _finite.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FFDFF25F2E3
                                                              • sqrt.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FFDFF25F37B
                                                                • Part of subcall function 00007FFDFF337170: TlsAlloc.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF337185
                                                                • Part of subcall function 00007FFDFF337170: TlsGetValue.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF3371B3
                                                                • Part of subcall function 00007FFDFF337170: GetLastError.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF3371C1
                                                                • Part of subcall function 00007FFDFF337170: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF337260
                                                                • Part of subcall function 00007FFDFF337170: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF337273
                                                                • Part of subcall function 00007FFDFF337170: HeapAlloc.KERNEL32(?,?,?,?,?,?,00007FFDFF25F49F,?,?,?,?,00000000,00007FFDFF25A869), ref: 00007FFDFF337284
                                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDFF25F405
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeapsqrt$CriticalErrorLastLeaveProcessSectionValue_errno_finite
                                                              • String ID: ARITH$DOMAIN$domain error: argument not in valid range$unable to alloc %u bytes
                                                              • API String ID: 156098180-3049018795
                                                              • Opcode ID: 2e65245181e11d202d38902dcfa6da1d785b4d2cf88c7e4aba034a9d26950f86
                                                              • Instruction ID: f557ed57cd3ea5cc48f65492207dd6ddb629d355f9abb59ee28e4fc59716fcc0
                                                              • Opcode Fuzzy Hash: 2e65245181e11d202d38902dcfa6da1d785b4d2cf88c7e4aba034a9d26950f86
                                                              • Instruction Fuzzy Hash: 57C1BB22B1C64682EB54EB21E461ABE6390EF54784F484331EA7D8B7EDDF3CE5858740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: isdigit
                                                              • String ID: 0
                                                              • API String ID: 2326231117-4108050209
                                                              • Opcode ID: cad1e60a30bc2f438835787f25e6e8e7795e29eed5214a089766a0503c515076
                                                              • Instruction ID: 376be146b8dae2c650f03ad80e75b4cc3b08e40a67e9b5ed00ec7b31b240f7c6
                                                              • Opcode Fuzzy Hash: cad1e60a30bc2f438835787f25e6e8e7795e29eed5214a089766a0503c515076
                                                              • Instruction Fuzzy Hash: BC914963F185A246EF255B25E860B3A2BD1FB04784F490235EAF9CA7D8DE2DE944D700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: fprintf$__stdio_common_vfprintf
                                                              • String ID: constraints:$empties:$final cleanup:$initial cleanup:
                                                              • API String ID: 1660322318-4175063448
                                                              • Opcode ID: 4667748fddf20052d6b607ffc69915b3f860195f43d7acc9ec960ffca76e3672
                                                              • Instruction ID: 0bbe40cc12c343f68a38d64c26ff41011cb02229ee3c5ac7b70a6001c4b402f5
                                                              • Opcode Fuzzy Hash: 4667748fddf20052d6b607ffc69915b3f860195f43d7acc9ec960ffca76e3672
                                                              • Instruction Fuzzy Hash: 4DA16C26B0964282EF649E12916077A73A1FB46B84F154231DE3DCB7DACFBCE991C700
                                                              APIs
                                                              • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFDFF342E5D), ref: 00007FFDFF345E57
                                                              • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFDFF342E5D), ref: 00007FFDFF345E86
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: isdigit
                                                              • String ID: TCL$Tcl$VALUE$VERSION$expected version number but got "%s"$unable to alloc %u bytes
                                                              • API String ID: 2326231117-436666687
                                                              • Opcode ID: 82554d65bdc917488a934a4b2b7514c86ea450033d04fb430b110e2ae09a6991
                                                              • Instruction ID: da7744c252cf8c2531e6bfe423695c076f9972ecc789a41f395ef32ec6a606cd
                                                              • Opcode Fuzzy Hash: 82554d65bdc917488a934a4b2b7514c86ea450033d04fb430b110e2ae09a6991
                                                              • Instruction Fuzzy Hash: 8551F972F0C69687EBA1AB11E434BB937D1AB11B44F454231DABC0E2D9DE3DE685C301
                                                              APIs
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF25E279
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF25E389
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF3363BD
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF336495
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF25E4A4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeapValue$memcpy$ErrorLastProcess$CriticalLeaveSection
                                                              • String ID: TCL$UNEXPECTED_RESULT_CODE$command returned bad code: %d$loop$unable to alloc %u bytes
                                                              • API String ID: 1534938565-2655399737
                                                              • Opcode ID: e9ebd177f6fffb3b1cd360674c59b88112aab2811878b66815e16e7326b54913
                                                              • Instruction ID: 32e654612314610643bd15e090fecdc28b33d91e4d2c0f924089edb186f19457
                                                              • Opcode Fuzzy Hash: e9ebd177f6fffb3b1cd360674c59b88112aab2811878b66815e16e7326b54913
                                                              • Instruction Fuzzy Hash: 1FF1AF32B08B468AEB10AF16A56097977A0FB44B94F484235DFBD8B7DADF3CE4508740
                                                              APIs
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0F15
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0F1B
                                                              • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0F29
                                                              • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0F37
                                                                • Part of subcall function 00007FFDFF361890: LeaveCriticalSection.KERNEL32(?,?,00007FFDFF36105B,0000000A,00000000,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361961
                                                              • TlsFree.KERNEL32(?,?,?,?,?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0F52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalFreeHeapLeaveSection$ProcessValue
                                                              • String ID: TlsFree failed from TclpFreeAllocCache$TlsSetValue failed from TclpFreeAllocCache
                                                              • API String ID: 3646568635-656207173
                                                              • Opcode ID: f07e0416a7ea65f2d395ba2201fca887e0d428a547bd55800cdaef08666e068d
                                                              • Instruction ID: 67df564c0cf5877c157c515441487898096058b1f399f6769271b57eee002e87
                                                              • Opcode Fuzzy Hash: f07e0416a7ea65f2d395ba2201fca887e0d428a547bd55800cdaef08666e068d
                                                              • Instruction Fuzzy Hash: 53415B6AB19A4787EF04FB16E9A0A3923E1AF84B80F404235D93D5F7E8DE2CE4558700
                                                              APIs
                                                              • TlsGetValue.KERNEL32(?,?,00000009,00007FFDFF34E197,?,?,00000000,?,?,00000000,00000009,?,00000000,00000001,00007FFDFF34ED22), ref: 00007FFDFF34D813
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,00000009,00007FFDFF34E197,?,?,00000000,?,?,00000000,00000009), ref: 00007FFDFF34DC67
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,00000009,00007FFDFF34E197,?,?,00000000,?,?,00000000,00000009), ref: 00007FFDFF34DD36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: -code$-level$-options$unable to alloc %u bytes
                                                              • API String ID: 3702945584-600840248
                                                              • Opcode ID: 0018ba6f558a388270ac7221a79382f649877d26717252eab429aee1c4d59ce6
                                                              • Instruction ID: fc089345b68ebc51485d9faf5e1ead3f7c959db6ba067a7296bc5642dbfc8bc6
                                                              • Opcode Fuzzy Hash: 0018ba6f558a388270ac7221a79382f649877d26717252eab429aee1c4d59ce6
                                                              • Instruction Fuzzy Hash: CF022A76B05B4586EB05EF15D4A093973E0FF88F84B158236DA6D4B3A9EF38D851C340
                                                              APIs
                                                              • memset.VCRUNTIME140(?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,00007FFDFF25360B), ref: 00007FFDFF2546E3
                                                              • memset.VCRUNTIME140(?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,00007FFDFF25360B), ref: 00007FFDFF2546FE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$unable to alloc %u bytes$unclosed catch at end of code in tclAssembly.c:BuildExceptionRanges, can't happen$undefined label in tclAssembly.c:BuildExceptionRanges, can't happen
                                                              • API String ID: 2221118986-1743407648
                                                              • Opcode ID: e545f7cf45e6b5251a3665cafc64cb8d0f016a3e735eea90431bf0cabcbc1eec
                                                              • Instruction ID: 6d5b74376445c78263f132ea9986f07416cffd517860b61507686bae92da2479
                                                              • Opcode Fuzzy Hash: e545f7cf45e6b5251a3665cafc64cb8d0f016a3e735eea90431bf0cabcbc1eec
                                                              • Instruction Fuzzy Hash: 30D1BBB6B05A8186DB54CF18D5A4AB9B7A1FB44B98F098336CA7C873D8DF38E455C700
                                                              APIs
                                                              • memcpy.VCRUNTIME140(?,?,00000000,?,00000000,?,?,00007FFDFF25B7B1), ref: 00007FFDFF25BEDB
                                                                • Part of subcall function 00007FFDFF3613E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3613ED
                                                                • Part of subcall function 00007FFDFF3613E0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF36141B
                                                                • Part of subcall function 00007FFDFF3613E0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF361429
                                                                • Part of subcall function 00007FFDFF3613E0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614CB
                                                                • Part of subcall function 00007FFDFF3613E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614DE
                                                                • Part of subcall function 00007FFDFF3613E0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF2D1CF4), ref: 00007FFDFF3614EF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValuememcpy
                                                              • String ID: COMMAND$LOOKUP$TCL$Tcl_EvalObjv: NULL global namespace pointer$invalid command name "%s"$unable to alloc %u bytes
                                                              • API String ID: 4286805255-3627542965
                                                              • Opcode ID: 596c0512863cad1a388b41793fa51c11a1f8d4d5574a63fa31b1f98a2b2b7b22
                                                              • Instruction ID: 1b413abe63f3bd7fdd95421f833e74fa73154108e28719c877b921116359a17e
                                                              • Opcode Fuzzy Hash: 596c0512863cad1a388b41793fa51c11a1f8d4d5574a63fa31b1f98a2b2b7b22
                                                              • Instruction Fuzzy Hash: 08C18D76B09B4586EB149F16E460AAD73A4FB84B88F184232DF6D8B7A9DF38D441C740
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %s called with shared object$MEMORY$NewListInternalRep: expects positive element count$TCL$Tcl_ListObjAppendElement$max length of a Tcl list (%d elements) exceeded
                                                              • API String ID: 0-1234280779
                                                              • Opcode ID: ca7f2234befaf53edfa7c85e0d379fcc8c6d049335f7657e2f804416862bc542
                                                              • Instruction ID: f74f7f20195b2d301a6719e0a0a32011fa089d5b003b9522d95de1fffb271feb
                                                              • Opcode Fuzzy Hash: ca7f2234befaf53edfa7c85e0d379fcc8c6d049335f7657e2f804416862bc542
                                                              • Instruction Fuzzy Hash: FF91BA32B0968297EB50EB11E560A7A63E0FB46784F444631DA3D4BBD9EF7CE491C700
                                                              APIs
                                                              • memcpy.VCRUNTIME140(tcl_platform,user,00000000,00000000,00000000,00007FFDFF370F8E), ref: 00007FFDFF371045
                                                              • memcpy.VCRUNTIME140(tcl_platform,user,00000000,00000000,00000000,00007FFDFF370F8E), ref: 00007FFDFF3710CF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: set$tcl_platform$unable to alloc %u bytes$user
                                                              • API String ID: 3510742995-603967661
                                                              • Opcode ID: 2da140ef1955407abf7635d5e9e3411d48e8a37b19078d3bd6689c27a86043c8
                                                              • Instruction ID: 22e4867e8543c760b256b015dff04e45f4860781807020c5edf61bc91640859f
                                                              • Opcode Fuzzy Hash: 2da140ef1955407abf7635d5e9e3411d48e8a37b19078d3bd6689c27a86043c8
                                                              • Instruction Fuzzy Hash: 5E616A33B087868BEB60BF12A85096A77E4BB48B80F154235DEBD5B799DE3CE4518700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: PACKAGE$TCL$VERSIONCONFLICT$conflicting versions provided for package "%s": %s, then %s$unable to alloc %u bytes
                                                              • API String ID: 3510742995-790331870
                                                              • Opcode ID: dab66e4e31a9daa306ef10bfee0dea997cd0fcaa4b6f18c489075a9f8966b3aa
                                                              • Instruction ID: 849ad364430e8d9cffcd5aa4bd83a97de8085470f41ca5fe180c51cb30b750a1
                                                              • Opcode Fuzzy Hash: dab66e4e31a9daa306ef10bfee0dea997cd0fcaa4b6f18c489075a9f8966b3aa
                                                              • Instruction Fuzzy Hash: 9F518322B1868287EB50BF12A461A7A67D0BF54BD0F844235EE7E5B7DEDE3CE1418740
                                                              APIs
                                                              • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,00000000,00007FFDFF36DC6B,?,?,?,?,?,?,00000000,00000000,00000001,00007FFDFF31318A), ref: 00007FFDFF36DF4B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: INDEX$TCL$VALUE$bad index "%s": must be end?[+-]integer?$end
                                                              • API String ID: 1114863663-77822658
                                                              • Opcode ID: e02dd7f2fe577cdda519502b6ccbf1f67e223ae75f74ccd332b59290c198066f
                                                              • Instruction ID: 326a1a3fe890c91884ceed6d81e4f1878dd53153da677f7a3e220b356c17abe8
                                                              • Opcode Fuzzy Hash: e02dd7f2fe577cdda519502b6ccbf1f67e223ae75f74ccd332b59290c198066f
                                                              • Instruction Fuzzy Hash: 1F415F61B0869243FB55AB25A930AB9A3D1AF41B94F444231DE3C4F6DDEF7CE9A5C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$MessageObjectPostSingleValueWait
                                                              • String ID:
                                                              • API String ID: 799209308-0
                                                              • Opcode ID: c32f266ef4072e10b71ffa9bd68bcee5521beed86c56ac4f112ba155023f35ba
                                                              • Instruction ID: 2a07ab45aeba49483964b20d2e300f5eb2f5e101fa7e2de31b7bbbf6dd803193
                                                              • Opcode Fuzzy Hash: c32f266ef4072e10b71ffa9bd68bcee5521beed86c56ac4f112ba155023f35ba
                                                              • Instruction Fuzzy Hash: CC211D36B09A4282EB24EF21E4B093863E1FF94B88B054235C93E0B6ECCF3CD4158300
                                                              APIs
                                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FFDFF2E47F9), ref: 00007FFDFF3076B4
                                                              • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00000000,00007FFDFF2E47F9), ref: 00007FFDFF3078CC
                                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FFDFF2E47F9), ref: 00007FFDFF307A27
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF3363BD
                                                                • Part of subcall function 00007FFDFF336360: TlsGetValue.KERNEL32(?,?,?,00007FFDFF36E2C5,?,?,00000000,00007FFDFF36E43E,?,?,?,?,?,?,?,00007FFDFF36E88A), ref: 00007FFDFF336495
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value_errno$strcmp
                                                              • String ID: -permissions$unable to alloc %u bytes
                                                              • API String ID: 1287187052-3384672036
                                                              • Opcode ID: 96bb7f0091750c41f4c9acc6fbc9ce385095beb591ed7410f0bc452ffba7362c
                                                              • Instruction ID: c5b2083e5d35fe5d8a72088aef5c4dd096f165f2d655e1eaa219fa43da9d6040
                                                              • Opcode Fuzzy Hash: 96bb7f0091750c41f4c9acc6fbc9ce385095beb591ed7410f0bc452ffba7362c
                                                              • Instruction Fuzzy Hash: 96C14C32B0974686EB54EF15D060A7967E0EB84B98F1C4236DA7D4B7E9DE3CE881C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: isxdigit$memset
                                                              • String ID: expected %s string but got "%s" instead$hexadecimal
                                                              • API String ID: 1880689260-632115329
                                                              • Opcode ID: d9aa18970cc9a5e0f26ce2cf4e129a54d2f4cf46815aaa676ca109bc53ba7d89
                                                              • Instruction ID: b2347ea8c5d80cbde9f2aa0f49cbc8cc5a9b4e43b4844584e92e05c26cc6b92a
                                                              • Opcode Fuzzy Hash: d9aa18970cc9a5e0f26ce2cf4e129a54d2f4cf46815aaa676ca109bc53ba7d89
                                                              • Instruction Fuzzy Hash: 3451C236B08A924AE7109E25D5A07BD27D5BB45B88F044235DE7EEB7C9DE3DD841C340
                                                              APIs
                                                              • _wgetenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF26738E), ref: 00007FFDFF269622
                                                              • _tzset.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF26738E), ref: 00007FFDFF26966C
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF26738E), ref: 00007FFDFF269706
                                                                • Part of subcall function 00007FFDFF3A1230: InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A125B
                                                                • Part of subcall function 00007FFDFF3A1230: InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A1268
                                                                • Part of subcall function 00007FFDFF3A1230: InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A1275
                                                                • Part of subcall function 00007FFDFF3A1230: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A1282
                                                                • Part of subcall function 00007FFDFF3A1230: QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A12B0
                                                                • Part of subcall function 00007FFDFF3A1230: InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A12CB
                                                                • Part of subcall function 00007FFDFF3A1230: CreateEventW.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A12DB
                                                                • Part of subcall function 00007FFDFF3A1230: CreateEventW.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A12F2
                                                                • Part of subcall function 00007FFDFF3A1230: CreateThread.KERNEL32 ref: 00007FFDFF3A1322
                                                                • Part of subcall function 00007FFDFF3A1230: SetThreadPriority.KERNEL32 ref: 00007FFDFF3A1337
                                                                • Part of subcall function 00007FFDFF3A1230: WaitForSingleObject.KERNEL32 ref: 00007FFDFF3A1349
                                                                • Part of subcall function 00007FFDFF3A1230: CloseHandle.KERNEL32 ref: 00007FFDFF3A1356
                                                                • Part of subcall function 00007FFDFF3A1230: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A137B
                                                                • Part of subcall function 00007FFDFF3A1230: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A13B0
                                                                • Part of subcall function 00007FFDFF3A1230: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A13BD
                                                                • Part of subcall function 00007FFDFF3A1230: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00007FFDFF3A0FAC), ref: 00007FFDFF3A13DF
                                                              • _tzset.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF26738E), ref: 00007FFDFF2696DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Initialize$CreateLeave$EnterEventPerformanceQueryThread_tzset$CloseCounterFrequencyHandleObjectPrioritySingleWait_wgetenv
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 3535837911-2759121943
                                                              • Opcode ID: e1a1d2803e36c5894e4ce947b60beec63a5ba5a23c30e9f7d025ee047f6f4243
                                                              • Instruction ID: 21bfd3b878507a36087f0aff14b984264d6d63dba5c0dd77c62b887b1c8bd2ce
                                                              • Opcode Fuzzy Hash: e1a1d2803e36c5894e4ce947b60beec63a5ba5a23c30e9f7d025ee047f6f4243
                                                              • Instruction Fuzzy Hash: 90514B65B19A4286EF54AF15E4A0A7833E1EF84BA4F444331DA7E8B2ECDF3CE4458700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: _errno
                                                              • String ID: ?dirName?$POSIX$couldn't change working directory to "%s": %s$unable to alloc %u bytes
                                                              • API String ID: 2918714741-3219823474
                                                              • Opcode ID: 334627abd013a8ab857c2b7203e8f899bf3084e77952a492c91abfe8048acb5d
                                                              • Instruction ID: 43c32bbeec37f394e97a68f4e6962e131e8b6c1ef7e8024457a7ac9c7b8666ca
                                                              • Opcode Fuzzy Hash: 334627abd013a8ab857c2b7203e8f899bf3084e77952a492c91abfe8048acb5d
                                                              • Instruction Fuzzy Hash: F341AD21B0864286EB14AB21E465BBA63E0EF45BC4F184231DE7D8F7DEDE7DE5418740
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: POSIX$could not read "%s": %s$name
                                                              • API String ID: 0-1677466472
                                                              • Opcode ID: 60bae7fa9d4e46dd07565490b4ab7be8f31509f2596c5bcf958091cbdab2b285
                                                              • Instruction ID: 3ac38195ab168663a08ff4dfe92d77d66798c1b56e11b50b03e85c83b08b37ed
                                                              • Opcode Fuzzy Hash: 60bae7fa9d4e46dd07565490b4ab7be8f31509f2596c5bcf958091cbdab2b285
                                                              • Instruction Fuzzy Hash: AD314561B0864242EB14FB12A865ABD63D1AF89BC0F454235EE7D8F7EEDE2CE5418740
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: POSIX$could not read "%s": %s$name
                                                              • API String ID: 0-1677466472
                                                              • Opcode ID: 977348caa8139d983dc719b757334c44277484530b365c24661e985cf390f94b
                                                              • Instruction ID: cd245b720a9fe4866fb8eb4e6f1ecdfce83d7530d564b1bbe9e0b27dc2cff45f
                                                              • Opcode Fuzzy Hash: 977348caa8139d983dc719b757334c44277484530b365c24661e985cf390f94b
                                                              • Instruction Fuzzy Hash: 65317221B0864242EB54BB52A875BBE63D1AF85BC0F484235DD3D8F7EEDE2CE5418740
                                                              APIs
                                                              • TlsAlloc.KERNEL32(?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0DFD
                                                              • TlsGetValue.KERNEL32(?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0E27
                                                              • GetLastError.KERNEL32(?,?,?,?,00007FFDFF360EAC,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF3A0E35
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocErrorLastValue
                                                              • String ID: TlsGetValue failed from TclpGetAllocCache$could not allocate thread local storage
                                                              • API String ID: 752272164-2776987793
                                                              • Opcode ID: 063055bf52869a3dc4bbba5e21619599359617437510be0c5f54dad44f260bb5
                                                              • Instruction ID: b4169bc6ddbac088fcf6eb60a5fd03accb454de2ef206a6a76be5a764e0a7e5b
                                                              • Opcode Fuzzy Hash: 063055bf52869a3dc4bbba5e21619599359617437510be0c5f54dad44f260bb5
                                                              • Instruction Fuzzy Hash: 5901E4B9B09A038BEB55BB16E864E7463E0AF58705F440335D43D4E3F9EF2CA5688601
                                                              APIs
                                                              • TlsGetValue.KERNEL32 ref: 00007FFDFF34B7E8
                                                              • memset.VCRUNTIME140 ref: 00007FFDFF34B834
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • memcpy.VCRUNTIME140 ref: 00007FFDFF34BEF5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeapValue$ErrorLastProcessmemcpymemset
                                                              • String ID: couldn't compile regular expression pattern: $unable to alloc %u bytes
                                                              • API String ID: 916272630-2728520199
                                                              • Opcode ID: 8eb954db937d815c1e3ae868903bef0a664caae02179a1cf1c3ec06268b83146
                                                              • Instruction ID: aeb545a678470fc4c7fbd7302670645179804738f4409700ee83bbb6c997aeb4
                                                              • Opcode Fuzzy Hash: 8eb954db937d815c1e3ae868903bef0a664caae02179a1cf1c3ec06268b83146
                                                              • Instruction Fuzzy Hash: DB22CF76605B858ADB90DF29D8907E933E4F748B48F184236DEAC8B3A8EF34D554C760
                                                              APIs
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,::oo::define,00000001,?,00000000), ref: 00007FFDFF32191B
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,::oo::define,00000001,?,00000000), ref: 00007FFDFF3219F5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$AllocHeap$ErrorLastProcess
                                                              • String ID: ::oo::Obj%d$::oo::define$unable to alloc %u bytes
                                                              • API String ID: 827889809-1942930302
                                                              • Opcode ID: 51851238e6bc82ff87be704bd5d28846c9715f3f3ba85577e07c1b7da2a31393
                                                              • Instruction ID: e307b66561a28d59bbd7e186de7071703a2bad9cd1c1215cace0c1ce054d0454
                                                              • Opcode Fuzzy Hash: 51851238e6bc82ff87be704bd5d28846c9715f3f3ba85577e07c1b7da2a31393
                                                              • Instruction Fuzzy Hash: 51E17C32B09B4686EB55EF15E560AB973E0FB84B84F084236DE6D4B7A9DF38E451C340
                                                              APIs
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,00000000,00007FFDFF25E599), ref: 00007FFDFF3397E8
                                                              • _isnan.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,00000000,00007FFDFF25E599), ref: 00007FFDFF3398BB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value_isnan
                                                              • String ID: number$unable to alloc %u bytes
                                                              • API String ID: 3323270972-3206380325
                                                              • Opcode ID: dc04be63a571a847e9f8164cf108eb4b523549cf2564bcbbc161ae34de9b0bbc
                                                              • Instruction ID: 70e2e5f9ab7c97490ebb3a07a531a07f5f79f53cf087c8b0cc3a0ab6f2ca4ddb
                                                              • Opcode Fuzzy Hash: dc04be63a571a847e9f8164cf108eb4b523549cf2564bcbbc161ae34de9b0bbc
                                                              • Instruction Fuzzy Hash: 75512972B09B4286EB20EF25E46096977E1FB94B90F158631DA7D4B7E8DF38E494C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalCurrentLeaveSectionThreadValue
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 294468320-2759121943
                                                              • Opcode ID: e49dde45ed82169656b024f05bdecf131f4a7333a61477d5347477ece1aa4616
                                                              • Instruction ID: 8593356ec3e65fa7195f57db460649fa08ad11fd3872bfa1cb48fe52e0227a87
                                                              • Opcode Fuzzy Hash: e49dde45ed82169656b024f05bdecf131f4a7333a61477d5347477ece1aa4616
                                                              • Instruction Fuzzy Hash: 40313026B19B4182EB04AF11E4A0B7963E4EF98B84F594235DA6D4B7E9DF3CE494C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: __acrt_iob_funcfflush
                                                              • String ID: unable to realloc %u bytes$unable to realloc %u bytes, %s line %d
                                                              • API String ID: 1524832935-2415941218
                                                              • Opcode ID: 3073643588047c2ce4900f25e8e20d3bda7e43b53e572b2bfa3ad13e70dc3c6e
                                                              • Instruction ID: de2daa63fb8339907b803642a35b8d757c925dca08356a77c4d183cd8517e4a5
                                                              • Opcode Fuzzy Hash: 3073643588047c2ce4900f25e8e20d3bda7e43b53e572b2bfa3ad13e70dc3c6e
                                                              • Instruction Fuzzy Hash: 39019265F1834243FB58B791B4A18791794AFA4784F144A34DB3D8FBEDEE3CE4A14600
                                                              APIs
                                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FFDFF2D3BF9,?,00007FFDFF31A40D), ref: 00007FFDFF37718B
                                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FFDFF2D3BF9,?,00007FFDFF31A40D), ref: 00007FFDFF37725C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CriticalLeaveSection
                                                              • String ID: Cannot trace a variable with no name$Tcl_EventuallyFree called twice for %p
                                                              • API String ID: 3988221542-161316964
                                                              • Opcode ID: e6c22713faa0c90f4dad6d1fb71d6be24039477fd276d016d3609298ad9726bc
                                                              • Instruction ID: 5916ec43c7f8d0e9f61b49ddb5f6ae908ca1038f9f03eb00200fd4b2e325fc02
                                                              • Opcode Fuzzy Hash: e6c22713faa0c90f4dad6d1fb71d6be24039477fd276d016d3609298ad9726bc
                                                              • Instruction Fuzzy Hash: 6F916C32B09A4286EB65AF15E460B7973E0EB44B84F148231DEBD8B7E8DF3CE4458740
                                                              APIs
                                                                • Part of subcall function 00007FFDFF360D70: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360F81
                                                                • Part of subcall function 00007FFDFF360D70: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FAF
                                                                • Part of subcall function 00007FFDFF360D70: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FBD
                                                                • Part of subcall function 00007FFDFF360D70: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF360FF6
                                                                • Part of subcall function 00007FFDFF360D70: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFF3615DE), ref: 00007FFDFF361004
                                                              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FFDFF353078,?,?,...,00007FFDFF352C56), ref: 00007FFDFF3559AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$ErrorLastProcessValuememcpy
                                                              • String ID: ...$max length for a Tcl unicode value (%d chars) exceeded$unable to alloc %u bytes
                                                              • API String ID: 1456920652-2201900064
                                                              • Opcode ID: 2e2f3fd36566fab6645dee745a10460abf966cc3610f9ddaed0221401aab55a7
                                                              • Instruction ID: 31f8b6a06457cb17290b1a250bf17ec00f95a508494b32f730a345523843a125
                                                              • Opcode Fuzzy Hash: 2e2f3fd36566fab6645dee745a10460abf966cc3610f9ddaed0221401aab55a7
                                                              • Instruction Fuzzy Hash: 81619D36B0864287E754AF15A060A7977A0FB88B98F588235DB7D4B7E9DF3CF8518700
                                                              APIs
                                                              • TlsGetValue.KERNEL32(?,?,?,00000000,00007FFDFF308D89,?,?,?,?,?,?,00000000,?,?,00007FFDFF308C24), ref: 00007FFDFF3054E1
                                                              • TlsGetValue.KERNEL32(?,?,?,00000000,00007FFDFF308D89,?,?,?,?,?,?,00000000,?,?,00007FFDFF308C24), ref: 00007FFDFF305584
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,00000000,00007FFDFF308D89,?,?,?,?,?,?,00000000,?,?,00007FFDFF308C24), ref: 00007FFDFF30568F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$CriticalLeaveSection
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 3226138162-2759121943
                                                              • Opcode ID: ea24ed5bb22270a95326cbf2521f7f611af6dfac7c3c423214faca72075ef2cd
                                                              • Instruction ID: 8ed5313b1c053717458151c2541e52ee22f777ea45a03e1cd8bb78d2a17b5b4a
                                                              • Opcode Fuzzy Hash: ea24ed5bb22270a95326cbf2521f7f611af6dfac7c3c423214faca72075ef2cd
                                                              • Instruction Fuzzy Hash: EF613E22B09B4687EB55AF11D46097963E0FF58B84B095736EA7D4B7E9DF3CE4908300
                                                              APIs
                                                              • TlsGetValue.KERNEL32(?,?,00000000,00007FFDFF361FAF,?,?,?,?,?,?,?,00007FFDFF3364E1,?,?,?,00007FFDFF36E2C5), ref: 00007FFDFF2D1D2E
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFF361FAF,?,?,?,?,?,?,?,00007FFDFF3364E1), ref: 00007FFDFF2D1E03
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFF361FAF), ref: 00007FFDFF2D1EEE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: Value$CriticalLeaveSection
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 3226138162-2759121943
                                                              • Opcode ID: b2d6731e9e103209f6afe4f172a1d33914737737b536054531efaa6283ccb6d9
                                                              • Instruction ID: 7a3ddb7ef9af90a8c90b03d6c89c99d13a703e31bc60d5f5c45832962991d37a
                                                              • Opcode Fuzzy Hash: b2d6731e9e103209f6afe4f172a1d33914737737b536054531efaa6283ccb6d9
                                                              • Instruction Fuzzy Hash: 4B515221B0AB4682FB15AB11E46097D63A0EF94B80F548635DA3D8BBFDDF3CE4558301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: unable to alloc %u bytes
                                                              • API String ID: 1114863663-2759121943
                                                              • Opcode ID: cd792f6b222feecd03547a8db581adec545fb38e2397922abf7b8856237740f5
                                                              • Instruction ID: 34a5c1db972ab7a1a6ce7a568f45f381bdb9ff753ab4bf8d422fdf15f81f3023
                                                              • Opcode Fuzzy Hash: cd792f6b222feecd03547a8db581adec545fb38e2397922abf7b8856237740f5
                                                              • Instruction Fuzzy Hash: DF51BD76B087418AEB619F129462E7963A6FB08F95B194231CF3DCB2CECF38E4408740
                                                              APIs
                                                              • memcpy.VCRUNTIME140(?,?,?,?,FFFFFFFF,?,?,?,?,?,?,?,?,?,?,00007FFDFF361770), ref: 00007FFDFF36CE59
                                                              • memcpy.VCRUNTIME140(?,?,EBC0330475C98548,00007FFDFF361770), ref: 00007FFDFF36CEA2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: unable to alloc %u bytes$unable to realloc %u bytes
                                                              • API String ID: 3510742995-3519456369
                                                              • Opcode ID: 8ada6d11d885fdde65bd128541cb5a15b28405e0e2d05123f554455610b9cfd3
                                                              • Instruction ID: cd2e97b1a634df32c855c8b3ef17d9bc3a41e9725a94af1cc2abaca5158d8d2d
                                                              • Opcode Fuzzy Hash: 8ada6d11d885fdde65bd128541cb5a15b28405e0e2d05123f554455610b9cfd3
                                                              • Instruction Fuzzy Hash: 7941A462B0964582EB14AF06D5A0939B3A0FB44BC2F149631DB7D5FBD9DF3CD4618300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: %s called with shared object$Tcl_SetByteArrayObj$unable to alloc %u bytes
                                                              • API String ID: 3510742995-3975146518
                                                              • Opcode ID: b175b11e01dd8d8709b8314e9ccf685539c0e942eb3e50f9efa2229c22831b33
                                                              • Instruction ID: 2f57ae91eb07550fe197c6dcd6ab0f96b4a8ac4ba755bfb4eb2be6ecf0224897
                                                              • Opcode Fuzzy Hash: b175b11e01dd8d8709b8314e9ccf685539c0e942eb3e50f9efa2229c22831b33
                                                              • Instruction Fuzzy Hash: 6531AE72B09B4682EF54AF15E86087973A4EF84B84B148235DA7C8B7EDDF78D851C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: %s called with shared object$Tcl_SetStringObj$unable to alloc %u bytes
                                                              • API String ID: 3510742995-521981002
                                                              • Opcode ID: 7004dce113c71b86ff3c4a30bc2f78c8465c42c00b9afc94205259ad7c751b17
                                                              • Instruction ID: 922ef9247105f6a4f0c9813501fe381424a7d00ea09f2705f5a7223a0fca24b2
                                                              • Opcode Fuzzy Hash: 7004dce113c71b86ff3c4a30bc2f78c8465c42c00b9afc94205259ad7c751b17
                                                              • Instruction Fuzzy Hash: 04316F62B09B4387EB54AF05E8A097963E0AF94790F584235DA7D0B7E9DFBCF4508300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: strncmp
                                                              • String ID: \??\$\\?\
                                                              • API String ID: 1114863663-3789169603
                                                              • Opcode ID: 0bf1d967fcd8fa316002e40abb51c2c9d114a88cd9268d9c321cab09ea681188
                                                              • Instruction ID: 1e2c7c11cfe3f25b0276688e4f7ffa4e54d7cc2757a7f1325ae2b9e5bf96c0a8
                                                              • Opcode Fuzzy Hash: 0bf1d967fcd8fa316002e40abb51c2c9d114a88cd9268d9c321cab09ea681188
                                                              • Instruction Fuzzy Hash: D3217362B08A8143FB21AB11E4607BA67D1AF89798F494335DABD0B6D9DF7CD5048B00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2990456728.00007FFDFF241000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFDFF240000, based on PE: true
                                                              • Associated: 00000001.00000002.2990429851.00007FFDFF240000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990638646.00007FFDFF3A4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990698641.00007FFDFF3EA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2990731119.00007FFDFF3ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ffdff240000_HxYqlJEUcq.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 5c46a2668cdef2e3405922a061d042cebb10964c71dfd54d6d0d6edb52368261
                                                              • Instruction ID: ddd7b7274222c0a0d550eb5ca176e8797657f0e45db79adaeb5a2bedf2d805c9
                                                              • Opcode Fuzzy Hash: 5c46a2668cdef2e3405922a061d042cebb10964c71dfd54d6d0d6edb52368261
                                                              • Instruction Fuzzy Hash: 7E112126B14F018AEB00EF61E8946B833A4FB59758F450E35DA7D4A7A8DF7CD5588340